首页 > 最新文献

Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices最新文献

英文 中文
Understanding the Service Life Cycle of Android Apps: An Exploratory Study 理解Android应用的服务生命周期:一项探索性研究
Kobra Khanmohammadi, M. Rejali, A. Hamou-Lhadj
The fast growing use of the Android platform has been accompanied with an increase of malwares in Android applications. A popular way in distributing malwares in the mobile world is through repackaging legitimate apps, embedding malicious code in them, and publishing them in app stores. Therefore, examining the similarity between the behavior of malicious and normal apps can help detect malwares due to repacking. Malicious apps operate by keeping their operations invisible to the user. They also run long enough to perform their malicious tasks. One way to detect malicious apps is to examine their service life cycle. In this paper, we examine the service life cycle of apps. We extract various features of app services. We use these features to classify over 250 normal and malicious apps. Our findings show that malicious apps tend to use services to do their malicious operation and have no communication with the other components of the app, whereas the services in normal apps are usually bound to other components and send messages to notify users about the operations they perform. The results of this exploratory study can be used in the future to design techniques for detecting malicious apps using the classification of their service features.
Android平台的快速增长伴随着Android应用程序中恶意软件的增加。在移动领域传播恶意软件的一种流行方式是重新包装合法应用,在其中嵌入恶意代码,然后在应用商店中发布。因此,检查恶意应用程序和正常应用程序的行为之间的相似性可以帮助检测由于重新包装而导致的恶意软件。恶意应用的运行方式是让用户看不到它们的操作。它们还会运行足够长的时间来执行恶意任务。检测恶意应用程序的一种方法是检查它们的服务生命周期。在本文中,我们研究了应用程序的服务生命周期。我们提取应用服务的各种功能。我们使用这些功能对250多个正常和恶意应用程序进行分类。我们的研究结果表明,恶意应用倾向于使用服务进行恶意操作,并且不与应用的其他组件进行通信,而正常应用中的服务通常与其他组件绑定并发送消息以通知用户他们执行的操作。这项探索性研究的结果可以在未来用于设计使用其服务特征分类来检测恶意应用程序的技术。
{"title":"Understanding the Service Life Cycle of Android Apps: An Exploratory Study","authors":"Kobra Khanmohammadi, M. Rejali, A. Hamou-Lhadj","doi":"10.1145/2808117.2808123","DOIUrl":"https://doi.org/10.1145/2808117.2808123","url":null,"abstract":"The fast growing use of the Android platform has been accompanied with an increase of malwares in Android applications. A popular way in distributing malwares in the mobile world is through repackaging legitimate apps, embedding malicious code in them, and publishing them in app stores. Therefore, examining the similarity between the behavior of malicious and normal apps can help detect malwares due to repacking. Malicious apps operate by keeping their operations invisible to the user. They also run long enough to perform their malicious tasks. One way to detect malicious apps is to examine their service life cycle. In this paper, we examine the service life cycle of apps. We extract various features of app services. We use these features to classify over 250 normal and malicious apps. Our findings show that malicious apps tend to use services to do their malicious operation and have no communication with the other components of the app, whereas the services in normal apps are usually bound to other components and send messages to notify users about the operations they perform. The results of this exploratory study can be used in the future to design techniques for detecting malicious apps using the classification of their service features.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications AutoPPG:迈向Android应用程序隐私政策的自动生成
Le Yu, Zhang Tao, Xiapu Luo, Lei Xue
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. However, writing privacy policy is tedious and error-prone, because the author may not well understand the source code, which could be written by others (e.g., outsourcing), or does not know the internals of third-party libraries without source codes. In this paper, we propose and develop a novel system named AutoPPG to automatically construct correct and readable descriptions to facilitate the generation of privacy policy for Android applications (i.e., apps). Given an app, AutoPPG first conducts various static code analyses to characterize its behaviors related to users' private information and then applies natural language processing techniques to generating correct and accessible sentences for describing these behaviors. The experimental results using real apps and crowdsourcing indicate that: (1) AutoPPG creates correct and easy-to-understand descriptions for privacy policies; and (2) the privacy policies constructed by AutoPPG usually reveal more operations related to users' private information than existing privacy policies.
隐私政策是一份声明,告知用户他们的信息将如何被收集、使用和披露。未能提供正确的隐私政策可能会导致罚款。然而,编写隐私策略是乏味且容易出错的,因为作者可能不太了解源代码,这些源代码可能是由其他人编写的(例如,外包),或者不知道没有源代码的第三方库的内部。在本文中,我们提出并开发了一个名为AutoPPG的新系统,用于自动构建正确且可读的描述,以促进Android应用程序(即应用程序)隐私策略的生成。对于一个应用程序,AutoPPG首先通过各种静态代码分析来描述其与用户隐私信息相关的行为,然后应用自然语言处理技术生成正确且可访问的句子来描述这些行为。基于真实应用和众包的实验结果表明:(1)AutoPPG创建了正确且易于理解的隐私政策描述;(2)与现有隐私政策相比,AutoPPG构建的隐私政策通常会披露更多与用户隐私信息相关的操作。
{"title":"AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications","authors":"Le Yu, Zhang Tao, Xiapu Luo, Lei Xue","doi":"10.1145/2808117.2808125","DOIUrl":"https://doi.org/10.1145/2808117.2808125","url":null,"abstract":"A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. However, writing privacy policy is tedious and error-prone, because the author may not well understand the source code, which could be written by others (e.g., outsourcing), or does not know the internals of third-party libraries without source codes. In this paper, we propose and develop a novel system named AutoPPG to automatically construct correct and readable descriptions to facilitate the generation of privacy policy for Android applications (i.e., apps). Given an app, AutoPPG first conducts various static code analyses to characterize its behaviors related to users' private information and then applies natural language processing techniques to generating correct and accessible sentences for describing these behaviors. The experimental results using real apps and crowdsourcing indicate that: (1) AutoPPG creates correct and easy-to-understand descriptions for privacy policies; and (2) the privacy policies constructed by AutoPPG usually reveal more operations related to users' private information than existing privacy policies.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121607090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Supporting Privacy-Conscious App Update Decisions with User Reviews 支持具有隐私意识的应用程序更新决策和用户评论
Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, P. Tague, L. Cranor
Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps. However, occasionally apps turn malicious or radically change features in a way users dislike. Users should not necessarily always update in those circumstances, but current update processes are largely automatic. Therefore, it is important to understand user behaviors around updating apps and help them to make security-conscious choices. We conducted two related studies in this area. First, to understand users' current update decisions, we conducted an online survey of user attitudes toward updates. Based on the survey results, we then designed a notification scheme integrating user reviews, which we tested in a field study. Participants installed an Android app that simulated update notifications, enabling us to collect users' update decisions and reactions. We compared the effectiveness of our review-based update notifications with the permission-based notifications. Compared to notifications with permission descriptions only, we found our review-based update notification was more effective at alerting users of invasive or malicious app updates, especially for less trustworthy apps.
智能手机应用程序更新对用户安全和隐私至关重要。新版本可能会修复重要的安全漏洞,这就是为什么用户通常应该更新他们的应用程序。然而,应用程序偶尔也会以用户不喜欢的方式恶意或彻底改变功能。在这种情况下,用户不必总是更新,但当前的更新过程在很大程度上是自动的。因此,了解用户更新应用的行为并帮助他们做出安全意识的选择是很重要的。我们在这方面进行了两项相关研究。首先,为了了解用户当前的更新决策,我们对用户对更新的态度进行了在线调查。基于调查结果,我们设计了一个整合用户评论的通知方案,并在实地研究中进行了测试。参与者安装了一个模拟更新通知的Android应用程序,使我们能够收集用户的更新决定和反应。我们比较了基于评论的更新通知与基于许可的通知的有效性。与只有权限描述的通知相比,我们发现基于评论的更新通知在提醒用户入侵或恶意应用更新方面更有效,尤其是对于不太值得信赖的应用。
{"title":"Supporting Privacy-Conscious App Update Decisions with User Reviews","authors":"Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, P. Tague, L. Cranor","doi":"10.1145/2808117.2808124","DOIUrl":"https://doi.org/10.1145/2808117.2808124","url":null,"abstract":"Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps. However, occasionally apps turn malicious or radically change features in a way users dislike. Users should not necessarily always update in those circumstances, but current update processes are largely automatic. Therefore, it is important to understand user behaviors around updating apps and help them to make security-conscious choices. We conducted two related studies in this area. First, to understand users' current update decisions, we conducted an online survey of user attitudes toward updates. Based on the survey results, we then designed a notification scheme integrating user reviews, which we tested in a field study. Participants installed an Android app that simulated update notifications, enabling us to collect users' update decisions and reactions. We compared the effectiveness of our review-based update notifications with the permission-based notifications. Compared to notifications with permission descriptions only, we found our review-based update notification was more effective at alerting users of invasive or malicious app updates, especially for less trustworthy apps.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Session details: Privacy 会话详细信息:隐私
M. Contois
{"title":"Session details: Privacy","authors":"M. Contois","doi":"10.1145/3247577","DOIUrl":"https://doi.org/10.1145/3247577","url":null,"abstract":"","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Timing on the Salience of Smartphone App Privacy Notices 时间对智能手机应用隐私声明重要性的影响
Rebecca Balebako, F. Schaub, Idris Adjerid, A. Acquisti, L. Cranor
In a series of experiments, we examined how the timing impacts the salience of smartphone app privacy notices. In a web survey and a field experiment, we isolated different timing conditions for displaying privacy notices: in the app store, when an app is started, during app use, and after app use. Participants installed and played a history quiz app, either virtually or on their phone. After a distraction or delay they were asked to recall the privacy notice's content. Recall was used as a proxy for the attention paid to and salience of the notice. Showing the notice during app use significantly increased recall rates over showing it in the app store. In a follow-up web survey, we tested alternative app store notices, which improved recall but did not perform as well as notices shown during app use. The results suggest that even if a notice contains information users care about, it is unlikely to be recalled if only shown in the app store.
在一系列实验中,我们研究了时间是如何影响智能手机应用隐私通知的显著性的。在网络调查和现场实验中,我们分离出不同的显示隐私通知的时间条件:在应用商店中,在应用启动时,在应用使用过程中,以及在应用使用后。参与者安装并玩了一个历史测试应用程序,可以是虚拟的,也可以是在手机上的。在分散注意力或延迟之后,他们被要求回忆隐私通知的内容。召回被用作对通知的关注和显著性的代表。在应用程序使用过程中显示通知比在应用程序商店中显示通知显著提高了召回率。在后续的网络调查中,我们测试了另一种应用商店通知,这种通知可以提高用户的回忆率,但效果不如应用使用过程中显示的通知。结果表明,即使通知包含用户关心的信息,如果只在应用商店中显示,它也不太可能被召回。
{"title":"The Impact of Timing on the Salience of Smartphone App Privacy Notices","authors":"Rebecca Balebako, F. Schaub, Idris Adjerid, A. Acquisti, L. Cranor","doi":"10.1145/2808117.2808119","DOIUrl":"https://doi.org/10.1145/2808117.2808119","url":null,"abstract":"In a series of experiments, we examined how the timing impacts the salience of smartphone app privacy notices. In a web survey and a field experiment, we isolated different timing conditions for displaying privacy notices: in the app store, when an app is started, during app use, and after app use. Participants installed and played a history quiz app, either virtually or on their phone. After a distraction or delay they were asked to recall the privacy notice's content. Recall was used as a proxy for the attention paid to and salience of the notice. Showing the notice during app use significantly increased recall rates over showing it in the app store. In a follow-up web survey, we tested alternative app store notices, which improved recall but did not perform as well as notices shown during app use. The results suggest that even if a notice contains information users care about, it is unlikely to be recalled if only shown in the app store.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125401591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android NJAS:沙箱未修改的应用程序在非根设备运行的股票Android
Antonio Bianchi, Y. Fratantonio, Christopher Krügel, G. Vigna
Malware poses a serious threat to the Android ecosystem. Moreover, even benign applications can sometimes constitute security and privacy risks to their users, as they might contain vulnerabilities, or they might perform unwanted actions. Previous research has shown that the current Android security model is not sufficient to protect against these threats, and several solutions have been proposed to enable the specification and enforcing of finer-grained security policies. Unfortunately, many existing solutions suffer from several limitations: they require modifications to the Android framework, root access to the device, to create a modified version of an existing app that cannot be installed without enabling unsafe options, or they cannot completely sandbox native code components. In this work, we propose a novel approach that aims to sandbox arbitrary Android applications. Our solution, called NJAS, works by executing an Android application within the context of another one, and it achieves sandboxing by means of system call interposition. In this paper, we show that our solution overcomes major limitations that affect existing solutions. In fact, it does not require any modification to the framework, does not require root access to the device, and does not require the user to enable unsafe options. Moreover, the core sandboxing mechanism cannot be evaded by using native code components.
恶意软件对Android生态系统构成严重威胁。此外,即使是良性的应用程序有时也会对其用户构成安全和隐私风险,因为它们可能包含漏洞,或者可能执行不需要的操作。先前的研究表明,当前的Android安全模型不足以抵御这些威胁,并且已经提出了一些解决方案来实现规范和执行细粒度的安全策略。不幸的是,许多现有的解决方案都存在一些局限性:它们需要修改Android框架,对设备进行root访问,创建现有应用的修改版本(如果不启用不安全选项就无法安装),或者它们不能完全沙箱本地代码组件。在这项工作中,我们提出了一种新颖的方法,旨在对任意Android应用程序进行沙盒处理。我们的解决方案,称为NJAS,通过在另一个Android应用程序的上下文中执行Android应用程序来工作,并通过系统调用干预来实现沙箱。在本文中,我们证明了我们的解决方案克服了影响现有解决方案的主要限制。事实上,它不需要对框架进行任何修改,不需要对设备进行root访问,也不需要用户启用不安全的选项。此外,不能通过使用本机代码组件来规避核心沙箱机制。
{"title":"NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android","authors":"Antonio Bianchi, Y. Fratantonio, Christopher Krügel, G. Vigna","doi":"10.1145/2808117.2808122","DOIUrl":"https://doi.org/10.1145/2808117.2808122","url":null,"abstract":"Malware poses a serious threat to the Android ecosystem. Moreover, even benign applications can sometimes constitute security and privacy risks to their users, as they might contain vulnerabilities, or they might perform unwanted actions. Previous research has shown that the current Android security model is not sufficient to protect against these threats, and several solutions have been proposed to enable the specification and enforcing of finer-grained security policies. Unfortunately, many existing solutions suffer from several limitations: they require modifications to the Android framework, root access to the device, to create a modified version of an existing app that cannot be installed without enabling unsafe options, or they cannot completely sandbox native code components. In this work, we propose a novel approach that aims to sandbox arbitrary Android applications. Our solution, called NJAS, works by executing an Android application within the context of another one, and it achieves sandboxing by means of system call interposition. In this paper, we show that our solution overcomes major limitations that affect existing solutions. In fact, it does not require any modification to the framework, does not require root access to the device, and does not require the user to enable unsafe options. Moreover, the core sandboxing mechanism cannot be evaded by using native code components.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126185914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Context-Specific Access Control: Conforming Permissions With User Expectations 上下文特定的访问控制:符合用户期望的权限
Amir Rahmati, H. Madhyastha
Current mobile platforms take an all-or-nothing approach to assigning permissions to applications. Once a user grants an application permission to access a particular resource, the application can use that permission whenever it executes thereafter. This enables an application to access privacy sensitive resources even when they are not needed for it to perform its expected functions. In this paper, we introduce "Context-Specific Access Control" (CSAC) as a design approach towards enforcing the principle of least privilege. CSAC's goal is to enable a user to ensure that, at any point in time, an application has access to those resources which she expects are needed by the application component with which she is currently interacting. We study 100 popular applications from Google Play store and find that existing applications are amenable to CSAC as most applications' use of privacy sensitive resources is limited to a small number of contexts. Furthermore, via dynamic analysis of the 100 applications and a small-scale user study, we find that CSAC does not prohibitively increase the number of access control decisions that users need to make.
当前的移动平台采用全有或全无的方法来为应用程序分配权限。一旦用户授予应用程序访问特定资源的权限,该应用程序就可以在此后执行时使用该权限。这使应用程序能够访问隐私敏感资源,即使它们不需要用于执行其预期功能。在本文中,我们介绍了“特定于上下文的访问控制”(CSAC)作为一种执行最小特权原则的设计方法。CSAC的目标是使用户能够确保,在任何时间点,应用程序都可以访问她当前正在与之交互的应用程序组件所需的资源。我们研究了来自Google Play商店的100个流行应用程序,发现现有应用程序适用于CSAC,因为大多数应用程序对隐私敏感资源的使用仅限于少数上下文。此外,通过对100个应用程序的动态分析和小规模用户研究,我们发现CSAC并没有过度增加用户需要做出的访问控制决策的数量。
{"title":"Context-Specific Access Control: Conforming Permissions With User Expectations","authors":"Amir Rahmati, H. Madhyastha","doi":"10.1145/2808117.2808121","DOIUrl":"https://doi.org/10.1145/2808117.2808121","url":null,"abstract":"Current mobile platforms take an all-or-nothing approach to assigning permissions to applications. Once a user grants an application permission to access a particular resource, the application can use that permission whenever it executes thereafter. This enables an application to access privacy sensitive resources even when they are not needed for it to perform its expected functions. In this paper, we introduce \"Context-Specific Access Control\" (CSAC) as a design approach towards enforcing the principle of least privilege. CSAC's goal is to enable a user to ensure that, at any point in time, an application has access to those resources which she expects are needed by the application component with which she is currently interacting. We study 100 popular applications from Google Play store and find that existing applications are amenable to CSAC as most applications' use of privacy sensitive resources is limited to a small number of contexts. Furthermore, via dynamic analysis of the 100 applications and a small-scale user study, we find that CSAC does not prohibitively increase the number of access control decisions that users need to make.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125102405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Past, Present and Future of Digital Privacy 数字隐私的过去、现在和未来
A. Manea
Communication technologies have evolved immensely over the past 20 years, with the Internet removing physical borders and mobility keeping us always connected. But privacy technologies, standards and legislation have struggled to keep up. This talk will look at the evolution of online privacy through the lens of users, government and private industry. We will examine where we are today, how we got here, and most importantly how we move forward in a way that protects consumer privacy without stifling innovation. Last but not least, we will discuss the viability and importance of public/private partnerships in solving issues related to online privacy.
在过去的20年里,通信技术发生了巨大的变化,互联网消除了物理边界,移动性使我们始终保持联系。但隐私技术、标准和立法都难以跟上。本次演讲将从用户、政府和私营企业的角度来审视网络隐私的演变。我们将审视我们今天所处的位置,我们是如何走到这一步的,最重要的是,我们如何在不扼杀创新的情况下保护消费者隐私。最后但并非最不重要的是,我们将讨论在解决与网上私隐有关的问题时,公私伙伴关系的可行性和重要性。
{"title":"The Past, Present and Future of Digital Privacy","authors":"A. Manea","doi":"10.1145/2808117.2808127","DOIUrl":"https://doi.org/10.1145/2808117.2808127","url":null,"abstract":"Communication technologies have evolved immensely over the past 20 years, with the Internet removing physical borders and mobility keeping us always connected. But privacy technologies, standards and legislation have struggled to keep up. This talk will look at the evolution of online privacy through the lens of users, government and private industry. We will examine where we are today, how we got here, and most importantly how we move forward in a way that protects consumer privacy without stifling innovation. Last but not least, we will discuss the viability and importance of public/private partnerships in solving issues related to online privacy.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices 第五届ACM CCS智能手机和移动设备安全与隐私研讨会论文集
D. Lie, Glenn Wurster
It is our great pleasure to welcome you to the 5th annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2015). The workshop was created to organize and foster discussion of security in the emerging area of smartphone and mobile device computing. As organizers of top security venues, we've observed a consistently large number of submissions describing novel approaches to solving the challenges of this area. We wanted to provide a dedicated venue to discuss these challenges and promising approaches for future research directions. The call for papers attracted submissions from Canada, China, Germany, Hong Kong, India, Israel, Mexico, Switzerland, United Arab Emirates, United Kingdom, and the United States. The program committee reviewed and accepted 9 of 25 submitted papers. We are also honored to have a keynote speech by Alex Manea, Director, BlackBerry Security on The Past, Present and Future of Digital Privacy. We hope that you will find this program interesting and thought-provoking and that the workshop will provide you with a valuable opportunity to share ideas with other researchers and practitioners from institutions around the world.
我们非常高兴地欢迎您参加第五届ACM CCS智能手机和移动设备安全与隐私研讨会(SPSM 2015)。该研讨会旨在组织和促进对智能手机和移动设备计算这一新兴领域的安全问题的讨论。作为顶级安全场所的组织者,我们观察到持续不断的大量提交描述解决该领域挑战的新方法。我们希望提供一个专门的场所来讨论这些挑战和未来研究方向的有希望的方法。本次征稿活动吸引了来自加拿大、中国、德国、香港、印度、以色列、墨西哥、瑞士、阿拉伯联合酋长国、英国和美国的论文。计划委员会审查并接受了25篇提交的论文中的9篇。我们也很荣幸邀请到黑莓安全总监Alex Manea就数字隐私的过去、现在和未来发表主题演讲。我们希望您会发现这个项目有趣且发人深省,并且研讨会将为您提供一个与来自世界各地机构的其他研究人员和实践者分享想法的宝贵机会。
{"title":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","authors":"D. Lie, Glenn Wurster","doi":"10.1145/2808117","DOIUrl":"https://doi.org/10.1145/2808117","url":null,"abstract":"It is our great pleasure to welcome you to the 5th annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2015). The workshop was created to organize and foster discussion of security in the emerging area of smartphone and mobile device computing. As organizers of top security venues, we've observed a consistently large number of submissions describing novel approaches to solving the challenges of this area. We wanted to provide a dedicated venue to discuss these challenges and promising approaches for future research directions. \u0000 \u0000The call for papers attracted submissions from Canada, China, Germany, Hong Kong, India, Israel, Mexico, Switzerland, United Arab Emirates, United Kingdom, and the United States. The program committee reviewed and accepted 9 of 25 submitted papers. We are also honored to have a keynote speech by Alex Manea, Director, BlackBerry Security on The Past, Present and Future of Digital Privacy. \u0000 \u0000We hope that you will find this program interesting and thought-provoking and that the workshop will provide you with a valuable opportunity to share ideas with other researchers and practitioners from institutions around the world.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123932135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices PrivacyGuard:基于vpn的Android设备信息泄露检测平台
Yihang Song, U. Hengartner
More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people's devices. Although today's smartphone operating systems are trying to provide a secure environment, they fail to provide users with adequate control over and visibility into how third-party applications use their private data. Whereas there are a few tools that alert users when applications leak private information, these tools are often hard to use by the average user or have other problems. To address these problems, we present PrivacyGuard, an open-source VPN-based platform for intercepting the network traffic of applications. PrivacyGuard requires neither root permissions nor any knowledge about VPN technology from its users. PrivacyGuard does not significantly increase the trusted computing base since PrivacyGuard runs in its entirety on the local device and traffic is not routed through a remote VPN server. We implement PrivacyGuard on the Android platform by taking advantage of the VPNService class provided by the Android SDK. PrivacyGuard is configurable, extensible, and useful for many different purposes. We investigate its use for detecting the leakage of multiple types of sensitive data, such as a phone's IMEI number or location data. PrivacyGuard also supports modifying the leaked information and replacing it with crafted data for privacy protection. According to our experiments, PrivacyGuard can detect more leakage incidents by applications and advertisement libraries than TaintDroid. We also demonstrate that PrivacyGuard has reasonable overhead on network performance and almost no overhead on battery consumption.
越来越多的人依靠移动设备访问互联网,这也增加了可以从人们的设备收集的私人信息的数量。尽管今天的智能手机操作系统试图提供一个安全的环境,但它们无法为用户提供足够的控制和可见性,以了解第三方应用程序如何使用他们的私人数据。虽然有一些工具可以在应用程序泄漏私有信息时提醒用户,但这些工具通常很难被普通用户使用,或者存在其他问题。为了解决这些问题,我们提出了PrivacyGuard,一个基于开源vpn的平台,用于拦截应用程序的网络流量。PrivacyGuard既不需要root权限,也不需要用户了解VPN技术。PrivacyGuard不会显著增加可信计算基础,因为PrivacyGuard完全运行在本地设备上,流量不会通过远程VPN服务器路由。我们利用Android SDK提供的VPNService类在Android平台上实现PrivacyGuard。PrivacyGuard是可配置的、可扩展的,对许多不同的目的都很有用。我们调查了它用于检测多种类型的敏感数据泄漏的用途,例如手机的IMEI号码或位置数据。PrivacyGuard还支持修改泄露的信息,并将其替换为精心制作的数据,以保护隐私。根据我们的实验,PrivacyGuard可以比TaintDroid检测到更多的应用程序和广告库泄漏事件。我们还证明了PrivacyGuard在网络性能上有合理的开销,在电池消耗上几乎没有开销。
{"title":"PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices","authors":"Yihang Song, U. Hengartner","doi":"10.1145/2808117.2808120","DOIUrl":"https://doi.org/10.1145/2808117.2808120","url":null,"abstract":"More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people's devices. Although today's smartphone operating systems are trying to provide a secure environment, they fail to provide users with adequate control over and visibility into how third-party applications use their private data. Whereas there are a few tools that alert users when applications leak private information, these tools are often hard to use by the average user or have other problems. To address these problems, we present PrivacyGuard, an open-source VPN-based platform for intercepting the network traffic of applications. PrivacyGuard requires neither root permissions nor any knowledge about VPN technology from its users. PrivacyGuard does not significantly increase the trusted computing base since PrivacyGuard runs in its entirety on the local device and traffic is not routed through a remote VPN server. We implement PrivacyGuard on the Android platform by taking advantage of the VPNService class provided by the Android SDK. PrivacyGuard is configurable, extensible, and useful for many different purposes. We investigate its use for detecting the leakage of multiple types of sensitive data, such as a phone's IMEI number or location data. PrivacyGuard also supports modifying the leaked information and replacing it with crafted data for privacy protection. According to our experiments, PrivacyGuard can detect more leakage incidents by applications and advertisement libraries than TaintDroid. We also demonstrate that PrivacyGuard has reasonable overhead on network performance and almost no overhead on battery consumption.","PeriodicalId":311973,"journal":{"name":"Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
期刊
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1