private information exposure in online social networks with ios, android and symbian mobile devices...
TRANSCRIPT
![Page 1: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/1.jpg)
PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES
Security and Cooperation in Wireless NetworksLaboratory For Communications and Applications1Mini Project Final PresentationSupervisors: Igor Bilogrevic
Mathias Humbert
Vassilis Agrafiotis – Communication
Systems MA3
1/17
![Page 2: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/2.jpg)
Roadmap
Motivation and Introduction Set Up Methodology Results
Privacy Risk Scale Results Summary
Conclusion and Improvements
2
![Page 3: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/3.jpg)
Motivation
To which extent is Privacy respected within Online Social Networks (OSN) ?
Study by looking for Private information disclosure in mobile OSNs
For some mobile platforms, different social networks require unnecessary personal – private information in order to perform an action.
Simulation and traffic analysis project
3
![Page 4: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/4.jpg)
Introduction
Selection of OSNs to investigate according to their popularity
4
![Page 5: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/5.jpg)
Introduction
Mobile Platforms studied:iOS, Android, Symbian
Access OSN and record traffic from mobile web browser mobile Application if available
5
![Page 6: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/6.jpg)
Set Up6
![Page 7: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/7.jpg)
Set Up7
![Page 8: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/8.jpg)
Methodology
Fake accounts for every OSN created
Set of possible actions defined within each OSN
Manually simulated execution for every OSN
Network traffic captured using WireShark
8
![Page 9: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/9.jpg)
Methodology
Traffic traces analyzed using a Java parser
Specific format information ex. email Coordinate like decimals
Further analysis with manual inspection of traces
9
![Page 10: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/10.jpg)
Methodology
A lot of traces were encrypted In this case, we collected also traffic by
accessing the OSNs through a PC for comparison
During the sniffing stage, we recorded the usage of GPS by noticing the GPS flash indication on the Smartphone
10
![Page 11: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/11.jpg)
Privacy Risk Scale11
![Page 12: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/12.jpg)
Results
In overall no major privacy violation discovered
Most of the traffic was encrypted Thus unable to accurately determine traffic
content Threat: what information is actually sent?
Type of information exchanged between SmartPhone and OSN are platform indepedent
12
![Page 13: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/13.jpg)
13
![Page 14: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/14.jpg)
Results 14
![Page 15: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/15.jpg)
Results15
![Page 16: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/16.jpg)
Results16
![Page 17: PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory](https://reader036.vdocuments.site/reader036/viewer/2022062805/5697bff81a28abf838cbf547/html5/thumbnails/17.jpg)
Conclusion and Improvements Popular OSNs are taking privacy seriously, but
still place to improveEncrypted traffic may be a 2-headed feature
Extend our study to others OSNs
Use emulator to simulate the execution and the usage of OSNs
TEMA project for Android platform
Record system calls in order to have more evidence about the type of information sent to OSNs servers
17