首页 > 最新文献

Proceedings of the 21st Workshop on Privacy in the Electronic Society最新文献

英文 中文
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies 数据保护法与多方计算:在执法机构间信息交换中的应用
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563192
Amos Treiber, Dirk Müllmann, T. Schneider, Indra Spiecker
Pushes for increased power of Law Enforcement (LE) for data retention and centralized storage result in legal challenges with data protection law and courts-and possible violations of the right to privacy. This is motivated by a desire for better cooperation and exchange between LE Agencies (LEAs), which is difficult due to data protection regulations, was identified as a main factor of major public security failures, and is a frequent criticism of LE. Secure Multi-Party Computation (MPC) is often seen as a technological means to solve privacy conflicts where actors want to exchange and analyze data that needs to be protected due to data protection laws. In this interdisciplinary work, we investigate the problem of private information exchange between LEAs from both a legal and technical angle. We give a legal analysis of secret-sharing based MPC techniques in general and, as a particular application scenario, consider the case of matching LE databases for lawful information exchange between LEAs. We propose a system for lawful information exchange between LEAs using MPC and private set intersection and show its feasibility by giving a legal analysis for data protection and a technical analysis for workload complexity. Towards practicality, we present insights from qualitative feedback gathered within exchanges with a major European LEA.
增加数据保留和集中存储的执法权力的努力导致了数据保护法和法院的法律挑战,并可能侵犯隐私权。这是因为,由于数据保护规定,LE机构之间很难进行更好的合作和交流,这被认为是重大公共安全失败的主要因素,也是LE经常受到批评的原因。安全多方计算(MPC)通常被视为解决隐私冲突的技术手段,参与者希望交换和分析由于数据保护法而需要保护的数据。在这项跨学科的工作中,我们从法律和技术的角度研究了lei之间的私有信息交换问题。我们对基于秘密共享的MPC技术进行了一般的法律分析,并作为一个特定的应用场景,考虑了在LEAs之间进行合法信息交换的匹配LE数据库的情况。本文提出了一种利用MPC和私集交叉口实现LEAs间合法信息交换的系统,并通过对数据保护的法律分析和对工作量复杂性的技术分析来论证其可行性。在实用性方面,我们从与欧洲主要LEA交流中收集的定性反馈中提出见解。
{"title":"Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies","authors":"Amos Treiber, Dirk Müllmann, T. Schneider, Indra Spiecker","doi":"10.1145/3559613.3563192","DOIUrl":"https://doi.org/10.1145/3559613.3563192","url":null,"abstract":"Pushes for increased power of Law Enforcement (LE) for data retention and centralized storage result in legal challenges with data protection law and courts-and possible violations of the right to privacy. This is motivated by a desire for better cooperation and exchange between LE Agencies (LEAs), which is difficult due to data protection regulations, was identified as a main factor of major public security failures, and is a frequent criticism of LE. Secure Multi-Party Computation (MPC) is often seen as a technological means to solve privacy conflicts where actors want to exchange and analyze data that needs to be protected due to data protection laws. In this interdisciplinary work, we investigate the problem of private information exchange between LEAs from both a legal and technical angle. We give a legal analysis of secret-sharing based MPC techniques in general and, as a particular application scenario, consider the case of matching LE databases for lawful information exchange between LEAs. We propose a system for lawful information exchange between LEAs using MPC and private set intersection and show its feasibility by giving a legal analysis for data protection and a technical analysis for workload complexity. Towards practicality, we present insights from qualitative feedback gathered within exchanges with a major European LEA.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PRSONA
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563197
Stan Gurtler, I. Goldberg
As an increasing amount of social activity moves online, online communities have become important outlets for their members to interact and communicate with one another. At times, these communities may identify opportunities where providing their members specific privacy guarantees would promote new opportunities for healthy social interaction and assure members that their participation can be conducted safely. On the other hand, communities also face the threat of bad actors, who may wish to disrupt their activities or bring harm to members. Reputation can help mitigate the threat of such bad actors, and there has been a wide body of work on privacy-preserving reputation systems. However, previous work has overlooked the needs of small, tight-knit communities, failing to provide important privacy guarantees or address shortcomings with common implementations of reputation. This work features a novel design for a privacy-preserving reputation system which provides these privacy guarantees and implements a more appropriate reputation function for this setting. Further, this work implements and benchmarks said system to determine its viability in real-world deployment. This novel construction addresses shortcomings with previous approaches and provides new opportunity to its target audience.
{"title":"PRSONA","authors":"Stan Gurtler, I. Goldberg","doi":"10.1145/3559613.3563197","DOIUrl":"https://doi.org/10.1145/3559613.3563197","url":null,"abstract":"As an increasing amount of social activity moves online, online communities have become important outlets for their members to interact and communicate with one another. At times, these communities may identify opportunities where providing their members specific privacy guarantees would promote new opportunities for healthy social interaction and assure members that their participation can be conducted safely. On the other hand, communities also face the threat of bad actors, who may wish to disrupt their activities or bring harm to members. Reputation can help mitigate the threat of such bad actors, and there has been a wide body of work on privacy-preserving reputation systems. However, previous work has overlooked the needs of small, tight-knit communities, failing to provide important privacy guarantees or address shortcomings with common implementations of reputation. This work features a novel design for a privacy-preserving reputation system which provides these privacy guarantees and implements a more appropriate reputation function for this setting. Further, this work implements and benchmarks said system to determine its viability in real-world deployment. This novel construction addresses shortcomings with previous approaches and provides new opportunity to its target audience.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115213564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews 基于用户评论的移动支付应用隐私与安全评估
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563196
Urvashi Kishnani, Naheem Noah, Sanchari Das, Rinku Dewri
Mobile payment applications are crucial to ensure seamless day-to-day digital transactions. However, users' perceived privacy- and security-related concerns are continually rising. Users express such thoughts, complaints, and suggestions through app reviews. To this aim, we collected 1,886,352 reviews from the top 50 mobile payment applications. Furthermore, we conducted a mixed-methods in-depth evaluation of the privacy- and security-related reviews resulting in a total of 163,210 reviews. Finally, we implemented sentiment analysis and did a mixed-methods analysis of the resulting 52,749 negative reviews. Such large-scale evaluation through user reviews informs developers about the user perception of digital threats and app behaviors. Our analysis highlights that users share concerns about sharing sensitive information with the application, confidentiality of their data, and permissions requested by the apps. Users have shown significant concerns regarding the usability of these applications (48.47%), getting locked out of their accounts (38.73%), and being unable to perform successful digital transactions (31.52%). We conclude by providing actionable recommendations to address such user concerns to aid the development of secure and privacy-preserving mobile payment applications.
移动支付应用程序对于确保无缝的日常数字交易至关重要。然而,用户对隐私和安全的担忧正在不断上升。用户通过应用评论来表达这些想法、抱怨和建议。为此,我们从排名前50的移动支付应用中收集了1,886352条评论。此外,我们对隐私和安全相关的评论进行了混合方法的深入评估,总共有163,210条评论。最后,我们执行了情感分析,并对52,749条负面评论进行了混合方法分析。这种通过用户评论进行的大规模评估可以让开发者了解用户对数字威胁和应用行为的看法。我们的分析强调,用户对与应用程序共享敏感信息、数据的保密性以及应用程序请求的权限有共同的担忧。用户对这些应用程序的可用性(48.47%)、账户被锁定(38.73%)以及无法成功执行数字交易(31.52%)表现出极大的担忧。最后,我们提供了可行的建议,以解决这些用户关注的问题,以帮助开发安全和保护隐私的移动支付应用程序。
{"title":"Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews","authors":"Urvashi Kishnani, Naheem Noah, Sanchari Das, Rinku Dewri","doi":"10.1145/3559613.3563196","DOIUrl":"https://doi.org/10.1145/3559613.3563196","url":null,"abstract":"Mobile payment applications are crucial to ensure seamless day-to-day digital transactions. However, users' perceived privacy- and security-related concerns are continually rising. Users express such thoughts, complaints, and suggestions through app reviews. To this aim, we collected 1,886,352 reviews from the top 50 mobile payment applications. Furthermore, we conducted a mixed-methods in-depth evaluation of the privacy- and security-related reviews resulting in a total of 163,210 reviews. Finally, we implemented sentiment analysis and did a mixed-methods analysis of the resulting 52,749 negative reviews. Such large-scale evaluation through user reviews informs developers about the user perception of digital threats and app behaviors. Our analysis highlights that users share concerns about sharing sensitive information with the application, confidentiality of their data, and permissions requested by the apps. Users have shown significant concerns regarding the usability of these applications (48.47%), getting locked out of their accounts (38.73%), and being unable to perform successful digital transactions (31.52%). We conclude by providing actionable recommendations to address such user concerns to aid the development of secure and privacy-preserving mobile payment applications.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models 达尔文的审查理论:用动态话题模型分析审查话题的演变
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563206
Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg
We present a statistical analysis of changes in the Internet censorship policy of the government of India from 2016 to 2020. Using longitudinal observations of censorship collected by the ICLab censorship measurement project, together with historical records of web page contents collected by the Internet Archive, we find that machine classification techniques can detect censors' reactions to events without prior knowledge of what those events are. However, gaps in ICLab's observations can cause the classifier to fail to detect censored topics, and gaps in the Internet Archive's records can cause it to misidentify them.
我们对2016年至2020年印度政府互联网审查政策的变化进行了统计分析。利用ICLab审查测量项目收集的审查制度的纵向观察,以及互联网档案馆收集的网页内容的历史记录,我们发现机器分类技术可以检测审查员对事件的反应,而无需事先知道这些事件是什么。然而,ICLab观察中的空白可能导致分类器无法检测到审查主题,而Internet Archive记录中的空白可能导致分类器错误识别它们。
{"title":"Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models","authors":"Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg","doi":"10.1145/3559613.3563206","DOIUrl":"https://doi.org/10.1145/3559613.3563206","url":null,"abstract":"We present a statistical analysis of changes in the Internet censorship policy of the government of India from 2016 to 2020. Using longitudinal observations of censorship collected by the ICLab censorship measurement project, together with historical records of web page contents collected by the Internet Archive, we find that machine classification techniques can detect censors' reactions to events without prior knowledge of what those events are. However, gaps in ICLab's observations can cause the classifier to fail to detect censored topics, and gaps in the Internet Archive's records can cause it to misidentify them.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Casing the Vault: Security Analysis of Vault Applications 保护保险库:保险库应用程序的安全性分析
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563204
Margie Ruffin, Israel Lopez-Toldeo, Kirill Levchenko, Gang Wang
Vault applications are a class of mobile apps used to store and hide users' sensitive files (e.g., photos, documents, and even another app) on the phone. In this paper, we perform an empirical analysis of popular vault apps under the scenarios of unjust search and filtration of civilians by authorities (e.g., during civil unrest). By limiting the technical capability of adversaries, we explore the feasibility of inferring the presence of vault apps and uncovering the hidden files without employing sophisticated forensics analysis. Our analysis of 20 popular vault apps shows that most of them do not adequately implement/configure their disguises, which can reveal their existence without technical analysis. In addition, adversaries with rudimentary-level knowledge of the Android system can already uncover the files stored in most of the vault apps. Our results indicate the need for more secure designs for vault apps.
Vault应用程序是一类移动应用程序,用于存储和隐藏用户在手机上的敏感文件(例如,照片,文档,甚至另一个应用程序)。在本文中,我们对流行的保险库应用程序在当局不公正搜索和过滤平民的情况下进行了实证分析(例如,在内乱期间)。通过限制对手的技术能力,我们探索了在不采用复杂取证分析的情况下推断保险库应用程序存在并发现隐藏文件的可行性。我们对20个流行的保险库应用程序的分析表明,它们中的大多数没有充分实现/配置它们的伪装,这可以在没有技术分析的情况下暴露它们的存在。此外,对Android系统有基本了解的攻击者已经可以发现存储在大多数保险库应用程序中的文件。我们的研究结果表明,需要为保险库应用程序设计更安全的设计。
{"title":"Casing the Vault: Security Analysis of Vault Applications","authors":"Margie Ruffin, Israel Lopez-Toldeo, Kirill Levchenko, Gang Wang","doi":"10.1145/3559613.3563204","DOIUrl":"https://doi.org/10.1145/3559613.3563204","url":null,"abstract":"Vault applications are a class of mobile apps used to store and hide users' sensitive files (e.g., photos, documents, and even another app) on the phone. In this paper, we perform an empirical analysis of popular vault apps under the scenarios of unjust search and filtration of civilians by authorities (e.g., during civil unrest). By limiting the technical capability of adversaries, we explore the feasibility of inferring the presence of vault apps and uncovering the hidden files without employing sophisticated forensics analysis. Our analysis of 20 popular vault apps shows that most of them do not adequately implement/configure their disguises, which can reveal their existence without technical analysis. In addition, adversaries with rudimentary-level knowledge of the Android system can already uncover the files stored in most of the vault apps. Our results indicate the need for more secure designs for vault apps.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR 你的保单是否符合规定?:基于深度学习的隐私政策遵从GDPR的实证研究
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563195
Tamjid Al Rahat, Minjun Long, Yuan Tian
Since the General Data Protection Regulation (GDPR) came into force in May 2018, companies have worked on their data practices to comply with the requirements of GDPR. In particular, since the privacy policy is the essential communication channel for users to understand and control their privacy when using companies' services, many companies updated their privacy policies after GDPR was enforced. However, most privacy policies are verbose, full of jargon, and vaguely describe companies' data practices and users' rights. In addition, our study shows that more than 32% of end users find it difficult to understand the privacy policies explaining GDPR requirements. Therefore, it is challenging for the end users and law enforcement authorities to manually check if companies' privacy policies comply with the requirements enforced by GDPR. In this paper, we create a privacy policy dataset of 1,080 websites annotated by experts with 18 GDPR requirements and develop a Convolutional Neural Network (CNN) based model that can classify the privacy policies into GDPR requirements with an accuracy of 89.2%. We apply our model to automatically measure GDPR compliance in the privacy policies of 9,761 most visited websites. Our results show that, even after four years since GDPR went into effect, 68% of websites still fail to comply with at least one requirement of GDPR.
自《通用数据保护条例》(GDPR)于2018年5月生效以来,公司一直致力于其数据实践,以遵守GDPR的要求。特别是,由于隐私政策是用户在使用公司服务时了解和控制其隐私的重要沟通渠道,许多公司在GDPR实施后更新了隐私政策。然而,大多数隐私政策都是冗长的,充满了行话,模糊地描述了公司的数据实践和用户的权利。此外,我们的研究表明,超过32%的最终用户发现很难理解解释GDPR要求的隐私政策。因此,对于最终用户和执法机构来说,手动检查公司的隐私政策是否符合GDPR强制执行的要求是一项挑战。在本文中,我们创建了一个包含1,080个网站的隐私政策数据集,由专家根据18项GDPR要求进行注释,并开发了一个基于卷积神经网络(CNN)的模型,该模型可以将隐私政策分类为GDPR要求,准确率为89.2%。我们应用我们的模型自动衡量9761个访问量最大的网站的隐私政策是否符合GDPR。我们的研究结果表明,即使在GDPR生效四年后,68%的网站仍然不符合GDPR的至少一项要求。
{"title":"Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR","authors":"Tamjid Al Rahat, Minjun Long, Yuan Tian","doi":"10.1145/3559613.3563195","DOIUrl":"https://doi.org/10.1145/3559613.3563195","url":null,"abstract":"Since the General Data Protection Regulation (GDPR) came into force in May 2018, companies have worked on their data practices to comply with the requirements of GDPR. In particular, since the privacy policy is the essential communication channel for users to understand and control their privacy when using companies' services, many companies updated their privacy policies after GDPR was enforced. However, most privacy policies are verbose, full of jargon, and vaguely describe companies' data practices and users' rights. In addition, our study shows that more than 32% of end users find it difficult to understand the privacy policies explaining GDPR requirements. Therefore, it is challenging for the end users and law enforcement authorities to manually check if companies' privacy policies comply with the requirements enforced by GDPR. In this paper, we create a privacy policy dataset of 1,080 websites annotated by experts with 18 GDPR requirements and develop a Convolutional Neural Network (CNN) based model that can classify the privacy policies into GDPR requirements with an accuracy of 89.2%. We apply our model to automatically measure GDPR compliance in the privacy policies of 9,761 most visited websites. Our results show that, even after four years since GDPR went into effect, 68% of websites still fail to comply with at least one requirement of GDPR.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
All Eyes On Me: Inside Third Party Trackers' Exfiltration of PHI from Healthcare Providers' Online Systems 所有的目光都盯着我:第三方追踪器从医疗保健提供商的在线系统中窃取PHI的内幕
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563190
Mingjia Huo, M. Bland, Kirill Levchenko
In the United States, sensitive health information is protected under the Health Insurance Portability and Accountability Act (HIPAA). This act limits the disclosure of Protected Health Information (PHI) without the patient's consent or knowledge. However, as medical care becomes web-integrated, many providers have chosen to use third-party web trackers for measurement and marketing purposes. This presents a security concern: third-party JavaScript requested by an online healthcare system can read the website's contents, and ensuring PHI is not unintentionally or maliciously leaked becomes difficult. In this paper, we investigate health information breaches in online medical records, focusing on 459 online patient portals and 4 telehealth websites. We find 14% of patient portals include Google Analytics, which reveals (at a minimum) the fact that the user visited the health provider website, while 5 portals and 4 telehealth websites contained JavaScript-based services disclosing PHI, including medications and lab results, to third parties. The most significant PHI breaches were on behalf of Google and Facebook trackers. In the latter case, an estimated 4.5 million site visitors per month were potentially exposed to leaks of personal information (names, phone numbers) and medical information (test results, medications). We notified healthcare providers of the PHI breaches and found only 15.7% took action to correct leaks. Healthcare operators lacked the technical expertise to identify PHI breaches caused by third-party trackers. After notifying Epic, a healthcare portal vendor, of the PHI leaks, we received a prompt response and observed extensive mitigation across providers, suggesting vendor notification is an effective intervention against PHI disclosures.
在美国,敏感的健康信息受到《健康保险流通与责任法案》(HIPAA)的保护。该法案限制在未经患者同意或知情的情况下披露受保护的健康信息(PHI)。然而,随着医疗服务与网络的整合,许多供应商选择使用第三方网络追踪器来进行测量和营销。这带来了一个安全问题:在线医疗保健系统请求的第三方JavaScript可以读取网站的内容,并且确保PHI不会无意或恶意泄露变得困难。本文以459个在线患者门户网站和4个远程医疗网站为研究对象,对在线医疗记录中的健康信息泄露进行了调查。我们发现14%的患者门户网站包括Google Analytics(谷歌分析),它(至少)揭示了用户访问过医疗服务提供者网站的事实,而5个门户网站和4个远程医疗网站包含基于javascript的服务,向第三方披露PHI,包括药物和实验室结果。最严重的PHI泄露是代表谷歌和Facebook的跟踪器。在后一种情况下,估计每月有450万网站访问者可能面临个人信息(姓名、电话号码)和医疗信息(检查结果、药物)泄露的风险。我们将PHI泄露通知了医疗保健提供者,发现只有15.7%的人采取了纠正泄漏的行动。医疗保健运营商缺乏技术专长,无法识别第三方跟踪器造成的PHI泄露。在向医疗保健门户供应商Epic通报PHI泄漏后,我们收到了迅速的响应,并观察到供应商之间的广泛缓解,这表明供应商通知是针对PHI泄露的有效干预措施。
{"title":"All Eyes On Me: Inside Third Party Trackers' Exfiltration of PHI from Healthcare Providers' Online Systems","authors":"Mingjia Huo, M. Bland, Kirill Levchenko","doi":"10.1145/3559613.3563190","DOIUrl":"https://doi.org/10.1145/3559613.3563190","url":null,"abstract":"In the United States, sensitive health information is protected under the Health Insurance Portability and Accountability Act (HIPAA). This act limits the disclosure of Protected Health Information (PHI) without the patient's consent or knowledge. However, as medical care becomes web-integrated, many providers have chosen to use third-party web trackers for measurement and marketing purposes. This presents a security concern: third-party JavaScript requested by an online healthcare system can read the website's contents, and ensuring PHI is not unintentionally or maliciously leaked becomes difficult. In this paper, we investigate health information breaches in online medical records, focusing on 459 online patient portals and 4 telehealth websites. We find 14% of patient portals include Google Analytics, which reveals (at a minimum) the fact that the user visited the health provider website, while 5 portals and 4 telehealth websites contained JavaScript-based services disclosing PHI, including medications and lab results, to third parties. The most significant PHI breaches were on behalf of Google and Facebook trackers. In the latter case, an estimated 4.5 million site visitors per month were potentially exposed to leaks of personal information (names, phone numbers) and medical information (test results, medications). We notified healthcare providers of the PHI breaches and found only 15.7% took action to correct leaks. Healthcare operators lacked the technical expertise to identify PHI breaches caused by third-party trackers. After notifying Epic, a healthcare portal vendor, of the PHI leaks, we received a prompt response and observed extensive mitigation across providers, suggesting vendor notification is an effective intervention against PHI disclosures.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fingerprinting and Personal Information Leakage from Touchscreen Interactions 触屏交互中的指纹识别和个人信息泄露
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563193
Martin Georgiev, Simon Eberz, I. Martinovic
The study aims to understand and quantify the privacy threat landscape of touch-based biometrics. Touch interactions from mobile devices are ubiquitous and do not require additional permissions to collect. Two privacy threats were examined - user tracking and personal information leakage. First, we designed a practical fingerprinting simulation experiment and executed it on a large publicly available touch interactions dataset. We found that touch-based strokes can be used to fingerprint users with high accuracy and performance can be further increased by adding only a single extra feature. The system can distinguish between new and returning users with up to 75% accuracy and match a new session to the user it originated from with up to 74% accuracy. In the second part of the study, we investigated the possibility of predicting personal information attributes through the use of touch interaction behavior. The attributes we investigated were age, gender, dominant hand, country of origin, height, and weight. We found that our model can predict the age group and gender of users with up to 66% and 62% accuracy respectively. Finally, we discuss countermeasures, limitations and provide suggestions for future work in the field.
该研究旨在了解和量化基于触摸的生物识别技术的隐私威胁情况。来自移动设备的触摸交互无处不在,不需要额外的许可就可以收集。研究了用户跟踪和个人信息泄露两种隐私威胁。首先,我们设计了一个实际的指纹模拟实验,并在一个大型的公开的触摸交互数据集上执行。我们发现,基于触控的笔触可以用于指纹识别用户,准确度很高,而且只需增加一个额外的功能,性能就可以进一步提高。该系统能够以高达75%的准确率区分新用户和老用户,并以高达74%的准确率将新会话与其原始用户进行匹配。在研究的第二部分,我们研究了通过使用触摸交互行为来预测个人信息属性的可能性。我们调查的属性是年龄、性别、惯用手、原产国、身高和体重。我们发现我们的模型可以预测用户的年龄组和性别,准确率分别高达66%和62%。最后,讨论了该领域的对策和局限性,并对今后的工作提出了建议。
{"title":"Fingerprinting and Personal Information Leakage from Touchscreen Interactions","authors":"Martin Georgiev, Simon Eberz, I. Martinovic","doi":"10.1145/3559613.3563193","DOIUrl":"https://doi.org/10.1145/3559613.3563193","url":null,"abstract":"The study aims to understand and quantify the privacy threat landscape of touch-based biometrics. Touch interactions from mobile devices are ubiquitous and do not require additional permissions to collect. Two privacy threats were examined - user tracking and personal information leakage. First, we designed a practical fingerprinting simulation experiment and executed it on a large publicly available touch interactions dataset. We found that touch-based strokes can be used to fingerprint users with high accuracy and performance can be further increased by adding only a single extra feature. The system can distinguish between new and returning users with up to 75% accuracy and match a new session to the user it originated from with up to 74% accuracy. In the second part of the study, we investigated the possibility of predicting personal information attributes through the use of touch interaction behavior. The attributes we investigated were age, gender, dominant hand, country of origin, height, and weight. We found that our model can predict the age group and gender of users with up to 66% and 62% accuracy respectively. Finally, we discuss countermeasures, limitations and provide suggestions for future work in the field.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122735677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy 局部差分隐私下频率估计的Fisher信息效用度量
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563194
Milan Lopuhaä-Zwakenberg, B. Škorić, Ninghui Li
Local Differential Privacy (LDP) is the de facto standard technique to ensure privacy for users whose data is collected by a data aggregator they do not necessarily trust. This necessarily involves a tradeoff between user privacy and aggregator utility, and an important question is to optimize utility (under a given metric) for a given privacy level. Unfortunately, existing utility metrics are either hard to optimize for, or they only indirectly relate to an aggregator's goal, leading to theoretically optimal protocols that are unsuitable in practice. In this paper, we introduce a new utility metric for when the aggregator tries to estimate the true data's distribution in a finite set. The new metric is based on Fisher information, which expresses the aggregators information gain through the protocol. We show that this metric relates to other utility metrics such as estimator accuracy and mutual information and to the LDP parameter varepsilon. Furthermore, we show that under this metric, we can approximate the optimal protocols as varepsilon rightarrow 0 and varepsilon rightarrow infty, and we show how the optimal protocol can be found for a fixed varepsilon, although the latter is computationally infeasible for large input spaces.
本地差分隐私(LDP)是一种事实上的标准技术,用于确保数据由用户不一定信任的数据聚合器收集的用户的隐私。这必然涉及到用户隐私和聚合器实用程序之间的权衡,一个重要的问题是为给定的隐私级别优化实用程序(在给定指标下)。不幸的是,现有的效用指标要么很难优化,要么它们只是间接地与聚合器的目标相关,从而导致理论上最优的协议在实践中不适合。在本文中,我们引入了一种新的效用度量,用于聚合器在有限集合中估计真实数据的分布。新度量基于Fisher信息,Fisher信息表示聚合器通过协议获得的信息。我们表明,该度量与其他实用度量相关,如估计器精度和互信息以及LDP参数varepsilon。此外,我们表明,在这个度量下,我们可以将最优协议近似为varepsilonrightarrow 0和varepsilonrightarrowinfty,并且我们展示了如何为固定varepsilon找到最优协议,尽管后者在计算上对于大输入空间是不可行的。
{"title":"Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy","authors":"Milan Lopuhaä-Zwakenberg, B. Škorić, Ninghui Li","doi":"10.1145/3559613.3563194","DOIUrl":"https://doi.org/10.1145/3559613.3563194","url":null,"abstract":"Local Differential Privacy (LDP) is the de facto standard technique to ensure privacy for users whose data is collected by a data aggregator they do not necessarily trust. This necessarily involves a tradeoff between user privacy and aggregator utility, and an important question is to optimize utility (under a given metric) for a given privacy level. Unfortunately, existing utility metrics are either hard to optimize for, or they only indirectly relate to an aggregator's goal, leading to theoretically optimal protocols that are unsuitable in practice. In this paper, we introduce a new utility metric for when the aggregator tries to estimate the true data's distribution in a finite set. The new metric is based on Fisher information, which expresses the aggregators information gain through the protocol. We show that this metric relates to other utility metrics such as estimator accuracy and mutual information and to the LDP parameter varepsilon. Furthermore, we show that under this metric, we can approximate the optimal protocols as varepsilon rightarrow 0 and varepsilon rightarrow infty, and we show how the optimal protocol can be found for a fixed varepsilon, although the latter is computationally infeasible for large input spaces.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking the Evolution of Cookie-based Tracking on Facebook 追踪Facebook上基于cookie的追踪的演变
Pub Date : 2022-11-07 DOI: 10.1145/3559613.3563200
Yana Dimova, Gertjan Franken, V. Pochat, W. Joosen, Lieven Desmet
We analyze in depth and longitudinally how Facebook's cookie-based tracking behavior and its communication about tracking have evolved from 2015 to 2022. More stringent (enforcement of) regulation appears to have been effective at causing a reduction in identifier cookies for non-users and a more prominent cookie banner. However, several technical measures to reduce Facebook's tracking potential are not implemented, communication through the cookie banner and cookie policies remains incomplete and may be deceptive, and opt-out mechanisms seem to have no effect.
我们深入和纵向地分析了Facebook基于cookie的跟踪行为及其关于跟踪的沟通从2015年到2022年的演变。更严格的(执行)法规似乎有效地减少了非用户的标识符cookie和更突出的cookie横幅。然而,一些减少Facebook跟踪可能性的技术措施并未实施,通过cookie横幅和cookie政策进行的沟通仍然不完整,可能具有欺骗性,选择退出机制似乎没有效果。
{"title":"Tracking the Evolution of Cookie-based Tracking on Facebook","authors":"Yana Dimova, Gertjan Franken, V. Pochat, W. Joosen, Lieven Desmet","doi":"10.1145/3559613.3563200","DOIUrl":"https://doi.org/10.1145/3559613.3563200","url":null,"abstract":"We analyze in depth and longitudinally how Facebook's cookie-based tracking behavior and its communication about tracking have evolved from 2015 to 2022. More stringent (enforcement of) regulation appears to have been effective at causing a reduction in identifier cookies for non-users and a more prominent cookie banner. However, several technical measures to reduce Facebook's tracking potential are not implemented, communication through the cookie banner and cookie policies remains incomplete and may be deceptive, and opt-out mechanisms seem to have no effect.","PeriodicalId":416548,"journal":{"name":"Proceedings of the 21st Workshop on Privacy in the Electronic Society","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 21st Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1