David Choffnes, Northeastern University Jingjing Ren, Northeastern University Ashwin Rao, University of Helsinki Martina Lindorfer, Vienna Univ. of Technology.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Centre de Comunicacions Avançades de Banda Ampla (CCABA) Universitat Politècnica de Catalunya (UPC) Identification of Network Applications based on Machine.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps Bin Liu (SRA), Bin Liu (CMU), Hongxia Jin (SRA), Ramesh Govindan (USC)
Common Alerting Protocol (CAP) Implementation Workshop – 2014 ArcGIS Geotrigger for CAP Implementation by Nalaka Kodippili Geo Technical Manager GIS Solutions.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
* Hassan Khan,Aaron Atwater,and Urs Hengartner. Outline Background Introduction for IA Previous work on IA challenge Introduction to Itus Itus for app.
What is PaperCut MF? What is PaperCut MF? What is PaperCut MF?
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Windows 7 Firewall.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
U.S. Department of the Interior U.S. Geological Survey Web Presence, Data Sharing, Real- time Analysis and Crowdsourcing GFSAD30 Sixth Workshop – July.
Communicate with All Workers Involved in the Process of Delivering High-Quality Health Care by Choosing Dossier365 on the Azure Platform MICROSOFT AZURE.
Built on Microsoft Azure Platform, CareWhen by August Systems Offers Private-Duty Home-Care Scheduling Application That is Fully Featured MICROSOFT AZURE.
An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Developer TECH REFRESH 15 Junho 2015 #pttechrefres h Understand your end-users and your app with Application Insights.
Network security Product Group 2 McAfee Network Security Platform.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Basics of testing mobile apps
2015 NetSymm Overview NETSYMM OVERVIEW December
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
User and Device Management
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
MICROSOFT AZURE ISV PROFILE: eMyPA BUSINESS SOLUTIONS eMyPA is a cloud-based, mobile-enabled digital business card holder. It allows users to access their.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
WELCOME. Mobile Application Development Dreamsoft4u.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
What are Background Checking Applications? By: Intelifi Screening Technology.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
AppAudit Effective Real-time Android Application Auditing Andrew Jeong
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Opinionmeter International, Ltd OPMETER Real-time Customer Feedback Tools for achieving Quality Improvement and Service Excellence.
DreamFactory for Microsoft Azure Is an Open Source REST API Platform That Enables Mobilization of Data in Minutes across Frameworks and Storage Methods.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
AntMonitor: A System for Monitoring from Mobile Devices
The Price of Free Privacy Leakage in Personalized Mobile In-App Ads
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Uncovering Social Spammers: Social Honeypots + Machine Learning
Presentation by Jun Hao Xu
ReCon: Revealing and Controlling PII Leaks in Mobile Network Systems
Mobile Application Test Case Automation
Modernizing your Remote Access
Practical Censorship Evasion Leveraging Content Delivery Networks
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
NSE4-5.4 Dumps
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Running on the Powerful Microsoft Azure Platform,
Securely run and grow your business with Microsoft 365 Business
Purdue University Fort Wayne
Quasardb Is a Fast, Reliable, and Highly Scalable Application Database, Built on Microsoft Azure and Designed Not to Buckle Under Demand MICROSOFT AZURE.
Purdue University Fort Wayne
Mobile Security Evangelos Markatos FORTH-ICS and University of Crete
COMPLETE BUSINESS TEXTING SOLUTION
Modern benefits administration and HR software, supported by us.
Mark Quirk Head of Technology Developer & Platform Group
Presentation transcript:

David Choffnes, Northeastern University Jingjing Ren, Northeastern University Ashwin Rao, University of Helsinki Martina Lindorfer, Vienna Univ. of Technology Arnaud Legout, INRIA Sophia-Antipolis ReCon: Revealing and Controling PII Leaks in Mobile Network Systems DTL Workshop, Nov Sponsored by:

Motivation 2  Mobile devices  Rich sensors  Ubiquitous connectivity  Key questions  What personal information is transmitted?  To whom does it go?  What can average users do about it?

How Frequently Is PII Leaked? 3 Basic tracking is common Significant fraction of very personal information leaked across all platforms PII leakage is pervasive! Fraction of top 100 apps leaking PII (Tested in September, 2015)

How to Detect PII Leaks in Mobile? 4  At the OS  Information flow analysis (static/dynamic/hybrid)  Ok solutions, but not perfect or easily deployable  In the network  Independent of OS, app store  Easy to detect if you know what PII to search for What if you don’t know the PII a priori?

ReCon: Automatically Identifying PII Leaks 5  Hypothesis: PII leaks have distinguishing characteristics  Is it just simple key/value pairs (e.g., “ user=R3C0N ”)? Nope, this leads to high FP/FN rates  Need to learn the structure of PII leaks  Approach: Build ML classifiers to reliably detect leaks  Does not require knowing PII in advance  Resilient to changes in PII leak formats over time  We built ReCon  Machine learning to reveal PII leaks from mobile devices  Software middleboxes to intercept and control leaks  Works on all major platforms (iOS, Android, Windows Phone)

ReCon: Viewing detected leaks 6  PII Category Device Identifiers Contact Information User Identifiers Credentials  User Feedback Correct Incorrect Not sure Not about me

Where They Know You’ve Been 7  Location information is hard to digest using text alone  WTKYB shows just how pervasive location tracking is  Creepiness factor to help users care more about privacy(?)

Mitigating PII Leaks 8  ReCon gives users control over leaks  Example simple strategies Block PII Modify PII Randomize identifiers Coarsen locations  Advanced mitigation (under dev) Mock user profiles Provide k-anonymity

How does ReCon work? 9  Key challenges for ML-based PII detection  Which classifier do we use? C4.5 Decision Tree is best trade-off between speed and accuracy  How do we train the classifier? Use traces from real users and controlled experiments Break flows into separate words that may indicate a leak Feature selection for scalability  How well are we doing? Controlled experiments In the wild: Only the users themselves know for sure! Crowdsourced reinforcement

Key Results: ReCon accuracy 10  How accurate is ReCon?  99% overall accuracy from controlled experiments  FPR: 2.2%, FNR: 3.5%  Why? Per-domain classifiers Decision tree captures non-trivial cases

Key Results: ReCon Has Good Coverage 11  How does it compare to other solutions? ReCon finds significantly more PII than IFA solutions ReCon successfully idenifies missing leaks after retraining Fraction of total leaks found

Key Results: User study 12  IRB-approved user study  24 iOS, 13 Android devices  20/26 responses: system useful & behavior change  165 cases of credential leaks, 94 verified  Average leaks: iOS > Android   Unexpected, suspicious leaks Recipe/cooking app tracks location Video/Game/News app leaks gender  And more… Check out

Summary 13  ReCon: Provides transparency/control over PII leaks  Relies only on access to network traffic (OS independent)  Machine learning to automatically identify PII leaks  Crowdsourced reinforcement with user feedback  Works today! Check out Sponsor: Questions? David Choffnes

Backups 14

Encryption and ReCon 15  What is your answer for increasing use of encryption?  Recon needs access only to plaintext flows  mcTLS, BlindBox  Route to trusted middlebox that can do MITM Works for most apps, but usually not logins  Haystack (on Android device)

Encryption: What is leaked? 16  Leaks over SSL (not much)  Send PII to trackers over SSL (100 apps/device) 6 iOS 2 Android 1 Windows  Problem with SSL Certification pining Not working with VPN enabled  Obfuscation  Little evidence in controlled experiment using IFA

Other applications of ReCon 17  K-anonymity  Explicit sharing  Allow users to control how much shared to third-parties  Obfuscation  Retrain classifiers to identify obfuscated leaks  Use static/dynamic to analysis tools that are resilient to evasion techniques

Deployment models 18  ReCon only needs access to network flows  VPN proxy (current deployment): tunnel to proxy server Currently supported by all mobile OSes Can run VMs anywhere in the world  Raspberry Pi In home network Enables HTTPS decryption with minimal additional risks  On device Haystack on Android  In network Awazza and other APN/middlebox deployment models

Methodology Details 19  Controlled experiments as ground truth  Text classification approaches  Problem: Given a network flow, whether it contains PII information or not?  Feature Extraction: Bag-of-word model Example.com /someevent?x=1&y=2 Words: someevent, x, 1, y, 2, z,  Per-Domain classifiers (e.g. Google-Analytics) Faster (compared to one-for-all) More accurate  Library: weka

Why Run ReCon? 20  User incentives  Control over data leaks!  Blocking unwanted content  k-anonymity for increased privacy