首页 > 最新文献

Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices最新文献

英文 中文
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking 针对手机银行网络钓鱼攻击的个性化安全指标强化设置
Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun
Application phishing attacks are rooted in users inability to distinguish legitimate applications from malicious ones. Previous work has shown that personalized security indicators can help users in detecting application phishing attacks in mobile platforms. A personalized security indicator is a visual secret, shared between the user and a security-sensitive application (e.g., mobile banking). The user sets up the indicator when the application is started for the first time. Later on, the application displays the indicator to authenticate itself to the user. Despite their potential, no previous work has addressed the problem of how to securely setup a personalized security indicator -- a procedure that can itself be the target of phishing attacks. In this paper, we propose a setup scheme for personalized security indicators. Our solution allows a user to identify the legitimate application at the time she sets up the indicator, even in the presence of malicious applications. We implement and evaluate a prototype of the proposed solution for the Android platform. We also provide the results of a small-scale user study aimed at evaluating the usability and security of our solution.
应用程序网络钓鱼攻击的根源在于用户无法区分合法应用程序和恶意应用程序。先前的工作表明,个性化的安全指标可以帮助用户检测移动平台上的应用网络钓鱼攻击。个性化安全指示器是用户和对安全敏感的应用程序(例如,移动银行)之间共享的可视化秘密。用户在第一次启动应用程序时设置指示器。稍后,应用程序显示指示符以向用户进行身份验证。尽管它们很有潜力,但之前的工作还没有解决如何安全地设置个性化安全指示器的问题——这一过程本身就可能成为网络钓鱼攻击的目标。本文提出了一种个性化安全指标的设置方案。我们的解决方案允许用户在设置指示器时识别合法应用程序,即使存在恶意应用程序。我们在Android平台上实现并评估了提出的解决方案的原型。我们还提供了一个小规模用户研究的结果,旨在评估我们的解决方案的可用性和安全性。
{"title":"Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking","authors":"Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun","doi":"10.1145/2994459.2994462","DOIUrl":"https://doi.org/10.1145/2994459.2994462","url":null,"abstract":"Application phishing attacks are rooted in users inability to distinguish legitimate applications from malicious ones. Previous work has shown that personalized security indicators can help users in detecting application phishing attacks in mobile platforms. A personalized security indicator is a visual secret, shared between the user and a security-sensitive application (e.g., mobile banking). The user sets up the indicator when the application is started for the first time. Later on, the application displays the indicator to authenticate itself to the user. Despite their potential, no previous work has addressed the problem of how to securely setup a personalized security indicator -- a procedure that can itself be the target of phishing attacks. In this paper, we propose a setup scheme for personalized security indicators. Our solution allows a user to identify the legitimate application at the time she sets up the indicator, even in the presence of malicious applications. We implement and evaluate a prototype of the proposed solution for the Android platform. We also provide the results of a small-scale user study aimed at evaluating the usability and security of our solution.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124575668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones 手机中的白兔:不安全时钟源对智能手机的影响
Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert
With its high penetration rate and relatively good clock accuracy, smartphones are replacing watches in several market segments. Modern smartphones have more than one clock source to complement each other: NITZ (Network Identity and Time Zone), NTP (Network Time Protocol), and GNSS (Global Navigation Satellite System) including GPS. NITZ information is delivered by the cellular core network, indicating the network name and clock information. NTP provides a facility to synchronize the clock with a time server. Among these clock sources, only NITZ and NTP are updated without user interaction, as location services require manual activation. In this paper, we analyze security aspects of these clock sources and their impact on security features of modern smartphones. In particular, we investigate NITZ and NTP procedures over cellular networks (2G, 3G and 4G) and Wi-Fi communication respectively. Furthermore, we analyze several European, Asian, and American cellular networks from NITZ perspective. We identify three classes of vulnerabilities: specification issues in a cellular protocol, configurational issues in cellular network deployments, and implementation issues in different mobile OS's. We demonstrate how an attacker with low cost setup can spoof NITZ and NTP messages to cause Denial of Service attacks. Finally, we propose methods for securely synchronizing the clock on smartphones.
凭借其高渗透率和相对较好的时钟精度,智能手机正在几个细分市场取代手表。现代智能手机有多个时钟源,可以相互补充:NITZ(网络身份和时区)、NTP(网络时间协议)和GNSS(全球导航卫星系统),包括GPS。NITZ信息由蜂窝核心网传递,包括网名和时钟信息。NTP提供了一种与时间服务器同步时钟的工具。在这些时钟源中,只有NITZ和NTP在没有用户交互的情况下更新,因为位置服务需要手动激活。在本文中,我们分析了这些时钟源的安全方面及其对现代智能手机安全功能的影响。特别是,我们分别研究了蜂窝网络(2G, 3G和4G)和Wi-Fi通信上的NITZ和NTP程序。此外,我们从NITZ的角度分析了几个欧洲、亚洲和美国的蜂窝网络。我们确定了三类漏洞:蜂窝协议中的规范问题,蜂窝网络部署中的配置问题,以及不同移动操作系统中的实现问题。我们演示了低成本设置的攻击者如何欺骗NITZ和NTP消息以引起拒绝服务攻击。最后,我们提出了在智能手机上安全地同步时钟的方法。
{"title":"White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones","authors":"Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert","doi":"10.1145/2994459.2994465","DOIUrl":"https://doi.org/10.1145/2994459.2994465","url":null,"abstract":"With its high penetration rate and relatively good clock accuracy, smartphones are replacing watches in several market segments. Modern smartphones have more than one clock source to complement each other: NITZ (Network Identity and Time Zone), NTP (Network Time Protocol), and GNSS (Global Navigation Satellite System) including GPS. NITZ information is delivered by the cellular core network, indicating the network name and clock information. NTP provides a facility to synchronize the clock with a time server. Among these clock sources, only NITZ and NTP are updated without user interaction, as location services require manual activation. In this paper, we analyze security aspects of these clock sources and their impact on security features of modern smartphones. In particular, we investigate NITZ and NTP procedures over cellular networks (2G, 3G and 4G) and Wi-Fi communication respectively. Furthermore, we analyze several European, Asian, and American cellular networks from NITZ perspective. We identify three classes of vulnerabilities: specification issues in a cellular protocol, configurational issues in cellular network deployments, and implementation issues in different mobile OS's. We demonstrate how an attacker with low cost setup can spoof NITZ and NTP messages to cause Denial of Service attacks. Finally, we propose methods for securely synchronizing the clock on smartphones.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the CCA (in)Security of MTProto MTProto的CCA (in)安全性研究
J. Jakobsen, Claudio Orlandi
Telegram is a popular messaging app which supports end-to-end encrypted communication. In Spring 2015 we performed an audit of Telegram's Android source code. This short paper summarizes our findings. Our main discovery is that the symmetric encryption scheme used in Telegram -- known as MTProto -- is not IND-CCA secure, since it is possible to turn any ciphertext into a different ciphertext that decrypts to the same message. We stress that this is a theoretical attack on the definition of security and we do not see any way of turning the attack into a full plaintext-recovery attack. At the same time, we see no reason why one should use a less secure encryption scheme when more secure (and at least as efficient) solutions exist. The take-home message (once again) is that well-studied, provably secure encryption schemes that achieve strong definitions of security (e.g., authenticated-encryption) are to be preferred to home-brewed encryption schemes.
Telegram是一款流行的即时通讯应用,支持端到端加密通信。2015年春季,我们对Telegram的Android源代码进行了审计。这篇短文总结了我们的发现。我们的主要发现是,Telegram中使用的对称加密方案(称为MTProto)不是IND-CCA安全的,因为有可能将任何密文转换为解密为同一消息的不同密文。我们强调,这是对安全定义的理论攻击,我们没有看到任何将攻击转变为完整的明文恢复攻击的方法。与此同时,当存在更安全(至少同样有效)的解决方案时,我们没有理由使用不太安全的加密方案。关键的信息(再一次)是,经过充分研究、可证明安全的加密方案(例如,经过身份验证的加密)要优于自研的加密方案。
{"title":"On the CCA (in)Security of MTProto","authors":"J. Jakobsen, Claudio Orlandi","doi":"10.1145/2994459.2994468","DOIUrl":"https://doi.org/10.1145/2994459.2994468","url":null,"abstract":"Telegram is a popular messaging app which supports end-to-end encrypted communication. In Spring 2015 we performed an audit of Telegram's Android source code. This short paper summarizes our findings. Our main discovery is that the symmetric encryption scheme used in Telegram -- known as MTProto -- is not IND-CCA secure, since it is possible to turn any ciphertext into a different ciphertext that decrypts to the same message. We stress that this is a theoretical attack on the definition of security and we do not see any way of turning the attack into a full plaintext-recovery attack. At the same time, we see no reason why one should use a less secure encryption scheme when more secure (and at least as efficient) solutions exist. The take-home message (once again) is that well-studied, provably secure encryption schemes that achieve strong definitions of security (e.g., authenticated-encryption) are to be preferred to home-brewed encryption schemes.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps 你所看到的并不总是你所得到的:Android应用程序使用欺诈的测量研究
W. Liu, Yueqian Zhang, Zhou Li, Haixin Duan
We studied a new type of fraudulent activities, usage fraud, on Android platform in this paper. Different from previous fraud on mobile platforms targeting advertisers or mobile users, usage fraud was invented to boost usage statistics on third-party analytics platforms like Google Analytics to cheat investors. To understand the business model and infrastructures employed by the fraudsters, we infiltrated two underground services, Laicaimao and Anzhibao. A number of insights have been gained during this course, including the use of emulators and manipulation of user identifiers. In addition, we evaluated the efficacy of the existing fraud services and the defense status quo on 8 popular analytics platforms. Our result indicates that the fraud services are indeed capable of crafting valid usage numbers and the basic checks are missed by analytics platforms. We give several recommendations in the end and call for the contribution from the community to fight against this new type of fraud.
本文研究了Android平台上的一种新型欺诈行为——使用欺诈。与之前针对广告商或移动用户的移动平台欺诈不同,使用欺诈的发明是为了提高第三方分析平台(如Google analytics)的使用统计数据,以欺骗投资者。为了了解欺诈者的商业模式和基础设施,我们潜入了两家地下服务机构——“来财贷”和“安居宝”。在本课程中获得了许多见解,包括模拟器的使用和用户标识符的操作。此外,我们在8个流行的分析平台上评估了现有欺诈服务的有效性和防御现状。我们的结果表明,欺诈服务确实能够伪造有效的使用数字,而分析平台却忽略了基本的检查。最后,我们提出了几点建议,并呼吁社会各界共同努力,打击这种新型的欺诈行为。
{"title":"What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps","authors":"W. Liu, Yueqian Zhang, Zhou Li, Haixin Duan","doi":"10.1145/2994459.2994472","DOIUrl":"https://doi.org/10.1145/2994459.2994472","url":null,"abstract":"We studied a new type of fraudulent activities, usage fraud, on Android platform in this paper. Different from previous fraud on mobile platforms targeting advertisers or mobile users, usage fraud was invented to boost usage statistics on third-party analytics platforms like Google Analytics to cheat investors. To understand the business model and infrastructures employed by the fraudsters, we infiltrated two underground services, Laicaimao and Anzhibao. A number of insights have been gained during this course, including the use of emulators and manipulation of user identifiers. In addition, we evaluated the efficacy of the existing fraud services and the defense status quo on 8 popular analytics platforms. Our result indicates that the fraud services are indeed capable of crafting valid usage numbers and the basic checks are missed by analytics platforms. We give several recommendations in the end and call for the contribution from the community to fight against this new type of fraud.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis SecuRank:使用上下文权限分析的饥渴应用
Vincent F. Taylor, I. Martinovic
Competition among app developers has caused app stores to be permeated with many groups of general-purpose apps that are functionally-similar. Examples are the many flashlight or alarm clock apps to choose from. Within groups of functionally-similar apps, however, permission usage by individual apps sometimes varies widely. Although (run-time) permission warnings inform users of the sensitive access required by apps, many users continue to ignore these warnings due to conditioning or a lack of understanding. Thus, users may inadvertently expose themselves to additional privacy and security risks by installing a more permission-hungry app when there was a functionally-similar alternative that used less permissions. We study the variation in permission usage across 50,000 Google Play Store search results for 2500 searches each yielding a group of 20 functionally-similar apps. Using fine-grained contextual analysis of permission usage within groups of apps, we identified over 3400 (potentially) over-privileged apps, approximately 7% of the studied dataset. We implement our contextual permission analysis framework as a tool, called SecuRank, and release it to the general public in the form of an Android app and website. SecuRank allows users to audit their list of installed apps to determine whether any of them can be replaced with a functionally-similar alternative that requires less sensitive access to their device. By running SecuRank on the entire Google Play Store, we discovered that up to 50% of apps can be replaced with preferable alternative, with free apps and very popular apps more likely to have such alternatives.
应用开发商之间的竞争导致应用商店充斥着许多功能相似的通用应用。例如,许多手电筒或闹钟应用程序可供选择。然而,在一组功能相似的应用程序中,单个应用程序的权限使用有时差异很大。尽管(运行时)权限警告告知用户应用程序所需的敏感访问权限,但由于条件反射或缺乏理解,许多用户继续忽略这些警告。因此,当有一个功能相似的替代方案使用更少的权限时,用户可能会无意中安装一个更需要权限的应用程序,从而使自己暴露在额外的隐私和安全风险中。我们研究了50,000个Google Play Store搜索结果中的权限使用变化,每个搜索结果中有2500个搜索结果,每个搜索结果产生20个功能相似的应用。通过对应用程序组内的权限使用情况进行细粒度上下文分析,我们确定了超过3400个(潜在的)特权过度的应用程序,约占研究数据集的7%。我们将上下文权限分析框架作为一个名为SecuRank的工具来实现,并以Android应用程序和网站的形式向公众发布。SecuRank允许用户审核他们已安装的应用程序列表,以确定是否有任何应用程序可以替换为功能相似的替代方案,而不需要对其设备进行敏感访问。通过在整个Google Play Store运行SecuRank,我们发现多达50%的应用可以被更可取的选择所取代,免费应用和非常受欢迎的应用更有可能有这样的选择。
{"title":"SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis","authors":"Vincent F. Taylor, I. Martinovic","doi":"10.1145/2994459.2994474","DOIUrl":"https://doi.org/10.1145/2994459.2994474","url":null,"abstract":"Competition among app developers has caused app stores to be permeated with many groups of general-purpose apps that are functionally-similar. Examples are the many flashlight or alarm clock apps to choose from. Within groups of functionally-similar apps, however, permission usage by individual apps sometimes varies widely. Although (run-time) permission warnings inform users of the sensitive access required by apps, many users continue to ignore these warnings due to conditioning or a lack of understanding. Thus, users may inadvertently expose themselves to additional privacy and security risks by installing a more permission-hungry app when there was a functionally-similar alternative that used less permissions. We study the variation in permission usage across 50,000 Google Play Store search results for 2500 searches each yielding a group of 20 functionally-similar apps. Using fine-grained contextual analysis of permission usage within groups of apps, we identified over 3400 (potentially) over-privileged apps, approximately 7% of the studied dataset. We implement our contextual permission analysis framework as a tool, called SecuRank, and release it to the general public in the form of an Android app and website. SecuRank allows users to audit their list of installed apps to determine whether any of them can be replaced with a functionally-similar alternative that requires less sensitive access to their device. By running SecuRank on the entire Google Play Store, we discovered that up to 50% of apps can be replaced with preferable alternative, with free apps and very popular apps more likely to have such alternatives.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"385 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Hardware Isolation for Trusted Execution 可信执行的硬件隔离
Jan-Erik Ekberg
For more than a decade, Trusted Execution Environments (TEEs), found primarily in mobile phone and tablets, have been used to implement operator and third-party secure services like payment clients, electronic identities, rights management and device-local attestation. For many years, ARM TrustZone A (TM) (TZA) primitives were more or less the only available hardware mechanism to build a TEE, but in recent years alternative hardware security solutions have emerged for the same general purpose --- some are more tailored to the upcoming IoT device market whereas we also now have hardware that potentially can bring TEEs into the cloud infrastructure. In my talk I will introduce the contemporary TEE as is being deployed in today's devices, but one focal point of the presentation is on a functional comparison between the hardware support provided by TZA and the recently released and deployed Intel SGX(TM) and ARM TrustZone M (TM) architectures. Each solution has its relative strengths and drawbacks that reflects its main deployment purpose, and as a result, the software stack that completes the TEE environment will have to significantly adapt to each individual hardware platform. The final part of the talk will present a few conducted tests and research prototypes where we have gone beyond the TEE as it typically is set up today -- e.g. exploring problems emerging in a cloud environment with migrating workloads as well as policy enforcement in IoT devices.
十多年来,主要用于手机和平板电脑的可信执行环境(tee)已被用于实现运营商和第三方安全服务,如支付客户端、电子身份、权限管理和设备本地认证。多年来,ARM TrustZone A (TM) (TZA)原语或多或少是构建TEE的唯一可用硬件机制,但近年来,为了同样的通用目的,出现了其他硬件安全解决方案——其中一些更适合即将到来的物联网设备市场,而我们现在也有了可能将TEE带入云基础设施的硬件。在我的演讲中,我将介绍在当今设备中部署的当代TEE,但演讲的一个重点是TZA提供的硬件支持与最近发布和部署的英特尔SGX(TM)和ARM TrustZone M (TM)架构之间的功能比较。每个解决方案都有其相对的优点和缺点,这反映了其主要的部署目的,因此,完成TEE环境的软件堆栈必须显著地适应每个单独的硬件平台。演讲的最后一部分将展示一些已进行的测试和研究原型,我们已经超越了TEE,因为它通常是今天设置的,例如探索云环境中迁移工作负载出现的问题,以及物联网设备中的策略执行。
{"title":"Hardware Isolation for Trusted Execution","authors":"Jan-Erik Ekberg","doi":"10.1145/2994459.2994460","DOIUrl":"https://doi.org/10.1145/2994459.2994460","url":null,"abstract":"For more than a decade, Trusted Execution Environments (TEEs), found primarily in mobile phone and tablets, have been used to implement operator and third-party secure services like payment clients, electronic identities, rights management and device-local attestation. For many years, ARM TrustZone A (TM) (TZA) primitives were more or less the only available hardware mechanism to build a TEE, but in recent years alternative hardware security solutions have emerged for the same general purpose --- some are more tailored to the upcoming IoT device market whereas we also now have hardware that potentially can bring TEEs into the cloud infrastructure. In my talk I will introduce the contemporary TEE as is being deployed in today's devices, but one focal point of the presentation is on a functional comparison between the hardware support provided by TZA and the recently released and deployed Intel SGX(TM) and ARM TrustZone M (TM) architectures. Each solution has its relative strengths and drawbacks that reflects its main deployment purpose, and as a result, the software stack that completes the TEE environment will have to significantly adapt to each individual hardware platform. The final part of the talk will present a few conducted tests and research prototypes where we have gone beyond the TEE as it typically is set up today -- e.g. exploring problems emerging in a cloud environment with migrating workloads as well as policy enforcement in IoT devices.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Recognizers for Rich Video Applications 保护丰富视频应用程序的识别器
Christopher Thompson, D. Wagner
Cameras have become nearly ubiquitous with the rise of smartphones and laptops. New wearable devices, such as Google Glass, focus directly on using live video data to enable augmented reality and contextually enabled services. However, granting applications full access to video data exposes more information than is necessary for their functionality, introducing privacy risks. We propose a privilege-separation architecture for visual recognizer applications that encourages modularization and least privilege---separating the recognizer logic, sandboxing it to restrict filesystem and network access, and restricting what it can extract from the raw video data. We designed and implemented a prototype that separates the recognizer and application modules and evaluated our architecture on a set of 17 computer-vision applications. Our experiments show that our prototype incurs low overhead for each of these applications, reduces some of the privacy risks associated with these applications, and in some cases can actually increase the performance due to increased parallelism and concurrency.
随着智能手机和笔记本电脑的兴起,相机几乎无处不在。新的可穿戴设备,如谷歌眼镜,直接专注于使用实时视频数据来实现增强现实和上下文支持的服务。然而,授予应用程序对视频数据的完全访问权暴露了比其功能所需的更多信息,从而引入了隐私风险。我们为视觉识别程序应用程序提出了一种特权分离架构,它鼓励模块化和最小特权——分离识别程序逻辑,沙箱化以限制文件系统和网络访问,并限制它可以从原始视频数据中提取的内容。我们设计并实现了一个原型,将识别器和应用模块分开,并在17个计算机视觉应用程序上评估了我们的架构。我们的实验表明,我们的原型为每个应用程序带来了较低的开销,减少了与这些应用程序相关的一些隐私风险,并且在某些情况下,由于增加了并行性和并发性,实际上可以提高性能。
{"title":"Securing Recognizers for Rich Video Applications","authors":"Christopher Thompson, D. Wagner","doi":"10.1145/2994459.2994461","DOIUrl":"https://doi.org/10.1145/2994459.2994461","url":null,"abstract":"Cameras have become nearly ubiquitous with the rise of smartphones and laptops. New wearable devices, such as Google Glass, focus directly on using live video data to enable augmented reality and contextually enabled services. However, granting applications full access to video data exposes more information than is necessary for their functionality, introducing privacy risks. We propose a privilege-separation architecture for visual recognizer applications that encourages modularization and least privilege---separating the recognizer logic, sandboxing it to restrict filesystem and network access, and restricting what it can extract from the raw video data. We designed and implemented a prototype that separates the recognizer and application modules and evaluated our architecture on a set of 17 computer-vision applications. Our experiments show that our prototype incurs low overhead for each of these applications, reduces some of the privacy risks associated with these applications, and in some cases can actually increase the performance due to increased parallelism and concurrency.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Picasso: Lightweight Device Class Fingerprinting for Web Clients 用于Web客户端的轻量级设备类指纹识别
Elie Bursztein, Artem Malyshev, Tadek Pietraszek, Kurt Thomas
In this work we present Picasso: a lightweight device class fingerprinting protocol that allows a server to verify the software and hardware stack of a mobile or desktop client. As an example, Picasso can distinguish between traffic sent by an authentic iPhone running Safari on iOS from an emulator or desktop client spoofing the same configuration. Our fingerprinting scheme builds on unpredictable yet stable noise introduced by a client's browser, operating system, and graphical stack when rendering HTML5 canvases. Our algorithm is resistant to replay and includes a hardware-bound proof of work that forces a client to expend a configurable amount of CPU and memory to solve challenges. We demonstrate that Picasso can distinguish 52 million Android, iOS, Windows, and OSX clients running a diversity of browsers with 100% accuracy. We discuss applications of Picasso in abuse fighting, including protecting the Play Store or other mobile app marketplaces from inorganic interactions; or identifying login attempts to user accounts from previously unseen device classes.
在这项工作中,我们提出了Picasso:一个轻量级的设备类指纹协议,允许服务器验证移动或桌面客户端的软件和硬件堆栈。例如,Picasso可以区分在iOS上运行Safari的正版iPhone发送的流量与模拟器或欺骗相同配置的桌面客户端。当渲染HTML5画布时,我们的指纹识别方案建立在客户端浏览器、操作系统和图形堆栈引入的不可预测但稳定的噪声上。我们的算法可以抵抗重放,并且包括一个硬件绑定的工作量证明,它迫使客户端花费可配置的CPU和内存来解决挑战。我们证明了Picasso可以100%准确地区分5200万个运行各种浏览器的Android、iOS、Windows和OSX客户端。我们讨论了Picasso在打击滥用中的应用,包括保护Play Store或其他移动应用市场免受无机互动的影响;或者识别从以前未见过的设备类登录用户帐户的尝试。
{"title":"Picasso: Lightweight Device Class Fingerprinting for Web Clients","authors":"Elie Bursztein, Artem Malyshev, Tadek Pietraszek, Kurt Thomas","doi":"10.1145/2994459.2994467","DOIUrl":"https://doi.org/10.1145/2994459.2994467","url":null,"abstract":"In this work we present Picasso: a lightweight device class fingerprinting protocol that allows a server to verify the software and hardware stack of a mobile or desktop client. As an example, Picasso can distinguish between traffic sent by an authentic iPhone running Safari on iOS from an emulator or desktop client spoofing the same configuration. Our fingerprinting scheme builds on unpredictable yet stable noise introduced by a client's browser, operating system, and graphical stack when rendering HTML5 canvases. Our algorithm is resistant to replay and includes a hardware-bound proof of work that forces a client to expend a configurable amount of CPU and memory to solve challenges. We demonstrate that Picasso can distinguish 52 million Android, iOS, Windows, and OSX clients running a diversity of browsers with 100% accuracy. We discuss applications of Picasso in abuse fighting, including protecting the Play Store or other mobile app marketplaces from inorganic interactions; or identifying login attempts to user accounts from previously unseen device classes.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125146455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
On a (Per)Mission: Building Privacy Into the App Marketplace (Per)任务:将隐私构建到应用程序市场
Hannah Quay-de la Vallee, Paige Selby, S. Krishnamurthi
App-based systems are typically supported by marketplaces that provide easy discovery and installation of third-party apps. To mitigate risks to user privacy, many app systems use permissions to control apps' access to user data. It then falls to users to decide which apps to install and how to manage their permissions, which many users lack the expertise to do in a meaningful way. Marketplaces are ideally positioned to inform users about privacy, but they do not take advantage of this. This lack of privacy guidance makes it difficult for users to make informed privacy decisions. We present both an app marketplace and a permission management assistant that incorporate privacy information as a key element, in the form of permission ratings. We discuss gathering this rating information from both human and automated sources, presenting the ratings in a way that users can understand, and using this information to promote privacy-respecting apps and help users manage permissions.
基于应用程序的系统通常由市场支持,这些市场提供了方便的第三方应用发现和安装。为了降低用户隐私风险,许多应用系统使用权限来控制应用对用户数据的访问。然后由用户来决定安装哪些应用程序以及如何管理它们的权限,许多用户缺乏以有意义的方式完成这些工作的专业知识。市场的理想定位是告知用户隐私,但他们没有利用这一点。缺乏隐私指导使得用户很难做出明智的隐私决定。我们提供了一个应用程序市场和一个权限管理助手,将隐私信息作为一个关键元素,以权限评级的形式。我们讨论了从人工和自动来源收集这些评级信息,以用户可以理解的方式呈现评级,并使用这些信息来推广尊重隐私的应用程序并帮助用户管理权限。
{"title":"On a (Per)Mission: Building Privacy Into the App Marketplace","authors":"Hannah Quay-de la Vallee, Paige Selby, S. Krishnamurthi","doi":"10.1145/2994459.2994466","DOIUrl":"https://doi.org/10.1145/2994459.2994466","url":null,"abstract":"App-based systems are typically supported by marketplaces that provide easy discovery and installation of third-party apps. To mitigate risks to user privacy, many app systems use permissions to control apps' access to user data. It then falls to users to decide which apps to install and how to manage their permissions, which many users lack the expertise to do in a meaningful way. Marketplaces are ideally positioned to inform users about privacy, but they do not take advantage of this. This lack of privacy guidance makes it difficult for users to make informed privacy decisions. We present both an app marketplace and a permission management assistant that incorporate privacy information as a key element, in the form of permission ratings. We discuss gathering this rating information from both human and automated sources, presenting the ratings in a way that users can understand, and using this information to promote privacy-respecting apps and help users manage permissions.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Detecting Misuse of Google Cloud Messaging in Android Badware 检测滥用谷歌云消息在Android恶意软件
Mansour Ahmadi, B. Biggio, Steven Arzt, Davide Ariu, G. Giacinto
Google Cloud Messaging (GCM) is a widely-used and reliable mechanism that helps developers to build more efficient Android applications; in particular, it enables sending push notifications to an application only when new information is available for it on its servers. For this reason, GCM is now used by more than 60% among the most popular Android applications. On the other hand, such a mechanism is also exploited by attackers to facilitate their malicious activities; e.g., to abuse functionality of advertisement libraries in adware, or to command and control bot clients. However, to our knowledge, the extent to which GCM is used in malicious Android applications (badware, for short) has never been evaluated before. In this paper, we do not only aim to investigate the aforementioned issue, but also to show how traces of GCM flows in Android applications can be exploited to improve Android badware detection. To this end, we first extend Flowdroid to extract GCM flows from Android applications. Then, we embed those flows in a vector space, and train different machine-learning algorithms to detect badware that use GCM to perform malicious activities. We demonstrate that combining different classifiers trained on the flows originated from GCM services allows us to improve the detection rate up to 2.4%, while decreasing the false positive rate by 1.9%, and, more interestingly, to correctly detect 14 never-before-seen badware applications.
Google Cloud Messaging (GCM)是一种广泛使用且可靠的机制,可帮助开发人员构建更高效的Android应用程序;特别是,只有当应用程序的服务器上有新信息可用时,它才能向应用程序发送推送通知。由于这个原因,GCM现在在最流行的Android应用程序中被超过60%的人使用。另一方面,这种机制也会被攻击者利用,为其恶意活动提供便利;例如,滥用广告软件中的广告库功能,或命令和控制bot客户端。然而,据我们所知,GCM在恶意Android应用程序(简称恶意软件)中使用的程度以前从未被评估过。在本文中,我们不仅旨在研究上述问题,而且还展示了如何利用Android应用程序中GCM流的痕迹来改进Android恶意软件检测。为此,我们首先扩展Flowdroid以从Android应用程序中提取GCM流。然后,我们将这些流嵌入到向量空间中,并训练不同的机器学习算法来检测使用GCM执行恶意活动的恶意软件。我们证明,结合来自GCM服务的流训练的不同分类器,可以将检测率提高到2.4%,同时将假阳性率降低1.9%,更有趣的是,可以正确检测14个从未见过的恶意应用程序。
{"title":"Detecting Misuse of Google Cloud Messaging in Android Badware","authors":"Mansour Ahmadi, B. Biggio, Steven Arzt, Davide Ariu, G. Giacinto","doi":"10.1145/2994459.2994469","DOIUrl":"https://doi.org/10.1145/2994459.2994469","url":null,"abstract":"Google Cloud Messaging (GCM) is a widely-used and reliable mechanism that helps developers to build more efficient Android applications; in particular, it enables sending push notifications to an application only when new information is available for it on its servers. For this reason, GCM is now used by more than 60% among the most popular Android applications. On the other hand, such a mechanism is also exploited by attackers to facilitate their malicious activities; e.g., to abuse functionality of advertisement libraries in adware, or to command and control bot clients. However, to our knowledge, the extent to which GCM is used in malicious Android applications (badware, for short) has never been evaluated before. In this paper, we do not only aim to investigate the aforementioned issue, but also to show how traces of GCM flows in Android applications can be exploited to improve Android badware detection. To this end, we first extend Flowdroid to extract GCM flows from Android applications. Then, we embed those flows in a vector space, and train different machine-learning algorithms to detect badware that use GCM to perform malicious activities. We demonstrate that combining different classifiers trained on the flows originated from GCM services allows us to improve the detection rate up to 2.4%, while decreasing the false positive rate by 1.9%, and, more interestingly, to correctly detect 14 never-before-seen badware applications.","PeriodicalId":420892,"journal":{"name":"Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1