What's in an Ad? Connor Leonhardt.

Slides:



Advertisements
Similar presentations
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Advertisements

The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Chapter Nine Maintaining a Computer Part III: Malware.
Unsafe Exposure Analysis of Mobile In-App Advertisements Offense: Rachel Stonehirsch.
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps Bin Liu (SRA), Bin Liu (CMU), Hongxia Jin (SRA), Ramesh Govindan (USC)
Sophos Mobile Security
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Students in our 5 th grade classrooms are going to receive their own iPad to use during the school day. This allows for even more opportunities for creativity,
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Instructions for Administrators Choose the Enrollment slide decks that match your environment, either for SaaS or On Premise. Edit the red text to match.
Source: VisionMobile, January 2013.
Information explosion 1.4X 44X Empower the UserEnable the Compliance Officer In Place and Extensible Easy for IT Exchange, SharePoint, Windows Outlook,
Computer Skills and Applications Computer Security.
PicFolio App By: Brett Carpenter, Kathryn Erlich, & Jason Spencer.
TARGETED INTERNET ADVERTISING VIIANEN JONNE KAVÉN EETU.
Keeping Updated Ensuring hospital IT systems support ePortfolio.
PRESENTERS: AMOL KOKJE, STEVEN OSBURN, SUNIT VERMA, TOSHA SHAH, KALP PARIKH Vetting Mobile Apps.
Medical Center Management System Group One Jeremy Raul Phillip.
Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Android and IOS Permissions Why are they here and what do they want from me?
Mini Law Lesson: Law of Apps Brian Heidelberger
Mobile Devices in the Corporate World
Sean Mulvany, Ph.D Technology Transfer Case Manager
Smartphone Security Evaluation
Securing Network Servers
Understanding Android Security
Digital Engagement What Is Your Digital Strategy?
3.6 Fundamentals of cyber security
Android System Security
HARDENING CLIENT COMPUTERS
Contact Norton Support by Phone if your Antivirus is not working.
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
Security of Mobile Operating Systems
Chapter 15: App Monetization Strategies
What Mobile Ads Know About Mobile Users
Setting up REEF: REEF Web
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Fix Microsoft Office Error 1325 Call Support Number
How to Fix Windows 10 Update Error 0x ?.
Mohammed Alhusein.
What enhances physical fitness?
Physical activities and activity tracker
Microsoft Intune MAM without Device Enrollment
Pradeo Security Systems
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Analyzing WebView Vulnerabilities in Android Applications
Scan this code with a QR reader to easily download the app.
Defending against Sybil Devices in Crowdsourced Mapping Services
This presentation has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational purposes.
Task recorder in Dynamics AX


Agenda OAuth Concepts Programming OAuth.
Connecting Remotely Winter 2014.
Google Search Not Working Google Search Not Working On Pc
Mobile App Advertisements
SharePoint Foundation 2010
Understanding Android Security
Computer Security By: Muhammed Anwar.
How to Stay Safe Online Rollie Edwards.
Mobile Security Evangelos Markatos FORTH-ICS and University of Crete
OWASP Joomla! (CMS) Vulnerability Scanner Project Flyer
Vulnerability in an Android App I Found last November - Attack and Countermeasure - Ken Okuyama Sony Digital Network Applications.

SysKit Security Manager
Presentation transcript:

What's in an Ad? Connor Leonhardt

Mobile App Ads Usually found in free or trial versions of mobile apps. Generate revenue for developers, who promise to remove ads if you buy a full version. Many access user location to generate ads for nearby businesses.

Security risk? Ads may come from Google, Apple, or even third-party groups. Ad libraries receive the same permissions that the user granted to the app itself when installed. Ad libraries can bypass security measures and access user information. Ad libraries are embedded directly into apps.

How affects the user. Privacy Malicious code Ads may access personal data or track user by GPS to better target ads toward user. Malicious code Ads could steal information like passwords or other data from user.

How to fix this? Remove ads entirely Developers lose revenue gained from ads May not have free apps anymore, only paid apps to generate revenue for developers. Thoroughly inspect the code of all ads to ensure no malicious intent. Time-consuming Code can easily be altered later. Isolate ads from apps Do not have same permissions as apps. Ads cannot install new code after installation without permission.

Research Shipman, Matt. "Study: Including Ads in Mobile Apps Poses Privacy, Security Risks." NC State News. NC State University, 19 Mar. 2012. Web. 11 Apr. 2012. <http://news.ncsu.edu/releases/wms-jiang-app-ads/>.