PrivacyShield: Real-time Monitoring and Detection of Android Privacy Leakage Review and Discussion Yan Chen Lab of Internet and Security Technology Northwestern.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Protection Overview
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
7 Effective Habits when using the Internet Philip O’Kane 1.
GREATER THAN EVER. TODAY, RISK OF DATA FALLING IN THE WRONG HANDS IS QUITE OFTEN THIS RISK IS NOT FROM EXTERNAL ATTACKERS. IT COMES FROM WITHIN.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Lexmark Print Management
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
KASPERSKY SECURITY FOR STORAGE Product Launch Presentation Global B2B Product Marketing Teams.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang Department of Computer Science North Carolina State University CCS 2013.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
PrivacyShield: Real-time Monitoring and Detection of Android Privacy Leakage For Potential Collaboration 1 Yan Chen Lab of Internet and Security Technology.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Dell Connected Security Solutions Simplify & unify.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
AppShield: A Virtual File System in Enterprise Mobility Management Zhengyang Qu 1 Northwestern University, IL, US,
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Checking More Alerting Less PRESENTED BY: AMIN ROIS SINUNG NUGROHO.
Winning with Check point
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Kaspersky Small Office Security INTRODUCING New for 2014!
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
AppAudit Effective Real-time Android Application Auditing Andrew Jeong
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Complete Cloud Security Anyone, anywhere, any app, any device.
Total Enterprise Mobility Comprehensive Management and Security
Android forensics: Automated data collection and reporting from a mobile device Justin Grover Digital Investigation Volume 10, Supplement, August 2013,
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
WELCOME Mobile Applications Testing
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Mobile Devices in the Corporate World
The time to address enterprise mobility is now
Three steps to prevent Malware infection
How to Define a Successful Mobility Strategy
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Sadiq Basha.
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management Zhengyang Qu1, Guanyu Guo2, Zhengyue Shao2, Vaibhav Rastogi3,
Computer Virus and Antivirus
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Android Training in Chandigarh The best Android antivirus in 2018.
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
16. Account Monitoring and Control
Microsoft Data Insights Summit
Presentation transcript:

PrivacyShield: Real-time Monitoring and Detection of Android Privacy Leakage Review and Discussion Yan Chen Lab of Internet and Security Technology Northwestern University President, NetShield LLC

My Research PhD. In Computer Science from UC Berkeley, Associate Prof. of EECS Dept at Northwestern Director of Lab for Internet and Security Technology DOE Early CAREER Award, 2005 DOD Young Investigator Award, 2007 Microsoft Trustworthy Computing Award, 2004 & 2005 Over 80 publications with more than 5700 citations, H- index 30 (Google Scholar) 2

Origin of PrivacyShield (1) Multi-year investigation of security and privacy in Android smartphones Security – Systematic evaluation of state-of-the-art Android anti- malware against transformation attacks – Apps evaluated included AVG, Symantec, Lookout, ESET, Dr. Web, Kaspersky, Trend Micro, ESTSoft (ALYac), Zoner, Webroot, and many others – Results: Found that all the studied tools found vulnerable to common transformations 3

Origin of PrivacyShield (2) Privacy – Systematic evaluation of leakage of private data from Android apps – Studied 3,968 apps from Android Market (Google Play) – Results: Found that 25% of Google Play apps leak data 946 leak some info 844 leak phone identifiers 212 leak geographic location – Leaks to a number of ad and analytics domains  No solutions that are truly effective 4

5 Recognition 5 Interest from vendors

Overview of Our Solutions AppsPlayground (ACM CODASPY’13) – Automatic, large-scale dynamic analysis of Android apps DroidChamelon (ACM ASIACCS’13) – Evaluation of latest Android anti-malware tools  AutoCog – Check whether sensitive permissions requested by app are consistent with its natural-language description – Reveal suspicious sensitive permissions – Alpha version released  PrivacyShield – Solves the problem of private data leakage – Does not modify the Android platform – Alpha version release in progress 6

The Privacy Problem Apps regularly leak private info for ad targeting and tracking Users can (sometimes) control access to secure information, but can’t control leakage – Example 1: an app might access location to provide a legitimate service to the user, but then secretly share this information with advertisers and analytics services True for even very popular apps An example: Booking.com (> 5M downloads) – Example 2: malware apps may steal private data TapSnake malware: A GPS spy in the garb of a game Existing privacy apps only control permissions, not the flow of private data No existing techniques to access whether the behavior of app oversteps user expectation 7

PrivacyShield Solution 8 Principles – Give the user visibility and control over private data flow – Real-time monitoring

Two Business Markets Enterprise market: Mobile Data Management (MDM) Consumer market: privacy protection apps 9

Mobile Data Management (MDM) Bring Your Own Device (BYOD) – The current trend in mobile device management – The IT administrator has limited control over devices now Supporting 3 rd party apps – Employees need them for personal use – Enterprises may use them to improve productivity – Chat, dropbox, backup apps… 10

MDM Challenges How do apps handle data that they access – Does it remain within the device or the enterprise? – Is it leaked out to unknown third parties? – Can an employee upload confidential data to a remote server – No current solution addresses these concerns PrivacyShield addresses these challenges 11

PrivacyShield for MDM Sophisticated app wrapping to track privacy leaks in real time Ability to configure global and per-app policies with respect to data handling A unified view across all devices and apps for the IT administrators 12

13 PrivacyShield Dashboard

More Comparison with Existing MDM Examples that existing MDM products (e.g., Airwatch) fail: – A chat application has access to contacts to provide its services but should not send them to anywhere outside the enterprise – A backup service should back up files and documents only to a location within the enterprise and should not leak them out 14

PrivacyShield for Consumers 15 By vendor or 3 rd party service

Competitive Landscape 16 SegmentApproachExample vendors SecurityAnti-virus; Privacy settings audit AVG, BitDefender, think Android, MyPermissions, Xeudoxus, Pdroid, Trend, Lamian, PlaceMask, and others Personal PrivacyPrivacy settings audit; File “Locking” AVG, NQMobile, Armor, Avast, Lookout, Mapwarebytes, McAfee, Trend Micro, Kaspersky, MyMobile, TrustGo, and others Enterprise Mobile Device Management Anti-virus; Separate user and enterprise data; Containerize apps Samsung, Blackberry, Airwatch, Citrix, MobileIron, Symantec, McAfee, Divide, Touchdown, Kaspersky, and others  We believe PrivacyShield offers a distinct and more complete solution to data leakage  None of them except PrivacyShield can protect against the aforementioned leakage

Questions Is the problem of private data leakage recognized? How is the solution different or similar to what's already out there? Any ideas on marketing PrivacyShield to individuals or enterprises? Any suggestions of others who would be interested to learn about PrivacyShield? 17

AutoCog Usage End user: understand if an application is over- privileged and risky to use. Developer: receive an early feedback on the quality of description of revealing security- related aspects of the applications 18

AutoCog Solution 19