What mobile ads know about mobile users

Slides:



Advertisements
Similar presentations
Silverlight is a cross-browser, cross-platform plug-in* * An auxiliary program that works with a software package to enhance its capability. For example,
Advertisements

Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
An Evaluation of the Google Chrome Extension Security Architecture
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security of Mobile Applications Vitaly Shmatikov CS 6431.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Presented by…. Group 2 1. Programming language 2Introduction.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
CAEL 5012 Rich Internet Applications. What you need For this part of the course you will need access to a server with PHP and MYSQL which will be supplied.
SANS Technology Institute - Candidate for Master of Science Degree
박 종 혁 컴퓨터 보안 및 운영체제 연구실 Workshop on Mobile Security Technologies (MoST)
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Microsoft Silverlight An Introduction. Silverlight is a cross-browser, cross-platform plug-in* * An auxiliary program that works with a software package.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
ON THE SECURITY OF ANDROID COMMUNICATION APPS September 2015 By Shasi Pokharel Bachelor Of Information Technology (Honours) Supervisors: Dr. Raymond Choo,
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
丁建文 國立高雄應用科大資管系副教授 兼任計網中心軟體發展組組長 跨平台行動應用軟體開發技術 : HTML5 & Mobile JavaScript Framework 暨南大學.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Introduction to Digital Analytics Keith MacDonald Guest Presentation.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
PPC MARKETING AND ITS GREAT ADVANTAGES
Chapter 17 The Need for HTML 5.
Presented By – Nikhil PAwar
Advanced Endpoint Security Data Connectors-Charlotte January 2016
IAEWS Global Benchmark Survey Results
The Price of Free Privacy Leakage in Personalized Mobile In-App Ads
Fan Engagement Solution
What Mobile Ads know about mobile users
Essential tools for implementing and testing websites
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Chapter 7 E-commerce Marketing Communications. Chapter 7 E-commerce Marketing Communications.
Presentation by Jun Hao Xu
Introduction to Operating Systems
PIWIK JUNIOR TIDAL ASSOCIATE PROF., WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY.
Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang and Carl A
Automated Experiments on Ad Privacy Settings
RESTful Sevices Distributed Objects Presented by: Shivank Malik
The world’s most advanced mobile platform
Are these ads safe? Detecting hidden attacks through the mobile app-web interface Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan.
Ad-blocker circumvention System
Android System Security
Rajesh Lal ( ) Microsoft Silverlight An Introduction Rajesh Lal ( )
Rajesh Lal ( ) Microsoft Silverlight An Introduction 51PPT模板网 搜集整理 Rajesh Lal (
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management Zhengyang Qu1, Guanyu Guo2, Zhengyue Shao2, Vaibhav Rastogi3,
Platform as a Service.
The Improvement of PaaS Platform ZENG Shu-Qing, Xu Jie-Bin 2010 First International Conference on Networking and Distributed Computing SQUARE.
Article Authors – Oleksii Starov & Nick Nikiforakas
ICT in Our Everyday Lives:
Whether you decide to use hidden frames or XMLHttp, there are several things you'll need to consider when building an Ajax application. Expanding the role.
Chapter 15: App Monetization Strategies
What Mobile Ads Know About Mobile Users
PHP / MySQL Introduction
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Introduction to Operating Systems
Analyzing WebView Vulnerabilities in Android Applications
Moodle Mobile offline features Daniel #mootus16.
JavaScript.
WebSpector: JavaScript Execution Monitor Minyeop Choi
Recitation on AdFisher
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Introduction to JavaScript
Report from the trenches of an HTML5 game provider
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Web Application Development Using PHP
Exposing Private Information by Timing Web Applications
Presentation transcript:

What mobile ads know about mobile users Sooel Son – Google, Daehyeok Kim – KAIST, Vitaly Shmatikov – Cornell Tech Presented by Isabel Zhuang

introduction Mobile advertising allows many mobile applications to obtain revenue without directly charging users May incorporate ad libraries called AdSDKs to support advertising To increase user response, demand for modern AdSDKs to support media rich content with active JavaScript, images and videos AdSDKs need to provide caching of ad content and access to external storage

Problem Why is this a problem? Ads are fetched dynamically They originate from other advertising networks Ad content can be redirected and obfuscated Difficult for AdSDKs to analyse or sanitize their ads They could be untrusted and damage the user’s device or extract private information Ad isolation required

Motivation Mobile advertising is very popular More opportunities for an attacker Greater chance of creatives to be displayed on user devices Do not have to evade app store filters (eg, Google Bouncer) as seen with applications Realistic threat in mobile advertising ecosystem The question: What can an advertisement learn about the user of the device they are displayed on?

Key Words Creative Advertising impression AdSDK An image that can be rendered as an advertisement on an ad serving platform Advertising impression A creative that is delivered and displayed on a mobile device AdSDK An advertising library developers can use to integrate ads into their application Fetches and displays ads when the application is running

Experiment set up Assumptions: Environment: Application is benign AdSDK is benign Advertisers untrusted Impressions contain malicious content Environment: Ads shown in a embedded WebView browser that prevents JavaScript reading content from other origins Different permissions to host app and AdSDK

Experiment set up Cont. 4 popular AdSDKs: 4 Target Apps AdMob - Google MoPub - Twitter AirPush - Private AdMarvel – Opera Software 4 Target Apps Applications that create files in external storage on a user’s device (Do not need to use AdSDKs) 4 Attack-Vector Apps Any ad-supporting application using one of the AdSDKs previously mentioned to show malicious ads

Mobile advertising ecosystem Experiment Aim: To determine what information AdSDKs sent to AdSDK Providers and make available to advertisers Method: Integrate AdSDKs into android test apps Use proxy server to analyse ad requests sent by AdSDK Mobile advertising ecosystem

Inference Attacks Data mining technique to infer sensitive information about users As a result, can allow advertisers to target users with ads based on user profiles In this context, achieved by reading or inferring existence of local resource files to find out information about the user

Simulating Malicious Advertisers Intercept creatives sent to mobile devices Add a script element to fetch another JavaScript file Fetched file runs in context of advertising creative to attempt to collect or infer sensitive information

Results Successfully determine drugs user searched for Means that an app using that AdSDK, displays the attack ad which can find out which medications the user shopped for Results Successfully determine drugs user searched for Can infer gender preference Correctly identified all site visited by Dolphin Identified presence and absence of friends thumbnail images

Defence Developer No way to restrict privileges of AdSDK Isolation of external storage subspace not supported in Android OS AdSDK Provider Ban scripts in creatives – impractical / contradicts trend towards richer interactive ads Scan creatives - evasion of malicious code detection by obfuscation Block local resource loading – unnecessary mobile data usage Mobile OS Designers Add facilitates to restrict WebView to dedicated storage subspace Provide built in “jail” functionality invoked via API call

Issues and improvements Good focus on capabilities of malicious advertisers Addresses defence for AdSDK Providers and Mobile OS Designer More information for defence for users Provide Adblockers similar to online browsers? Play Store to explicitly state which permissions required by app and AdSDK? – Allow the user to be informed and choose whether to download app Comparison of different OS Repeat for IOS or Windows devices and compare the effectiveness inference attacks Use more popular applications as target apps Users more likely to have these apps on their devices – assess what kind of information attack vector apps can infer

Thank you for listening Presented by Isabel Zhuang