Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing 2008. 5. 19 1 :

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Time Sheet Training Press the F5 Key to view the Presentation. It may be helpful to have a printed copy of this slide presentation for the practice sessions.
CLASSICAL ENCRYPTION TECHNIQUES
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
ISA 662 IKE Key management for IPSEC Prof. Ravi Sandhu.
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
Chapter 1 The Study of Body Function Image PowerPoint
Security Issues In Mobile IP
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Addition Facts
Cryptography encryption authentication digital signatures
RSA.
1 Pretty Good Privacy (PGP) Security for Electronic .
Public Key Cryptosystem
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Communicating over the Network
Microsoft®.
Website Design What is Involved?. Web Design ConsiderationsSlide 2Bsc Web Design Stage 1 Website Design Involves Interface Design Site Design –Organising.
Microsoft Office 2010 Basics and the Internet
Streaming Video over the Internet
Copyright ©2010 Pearson Education, Inc. publishing as Prentice Hall
1 Communication Methods Audio, video and chat. 2 Objectives Identify different methods of communication – non- verbal, audio, video, and chat Identify.
Block Cipher Modes of Operation and Stream Ciphers
ECE454/CS594 Computer and Network Security
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
ABC Technology Project
Customer Education .
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
© Paradigm Publishing, Inc Access 2010 Level 1 Unit 1Creating Tables and Queries Chapter 2Creating Relationships between Tables.
Microsoft Office Illustrated Fundamentals Unit K: Working with Data.
Megastore: Providing Scalable, Highly Available Storage for Interactive Services. Presented by: Hanan Hamdan Supervised by: Dr. Amer Badarneh 1.
Microsoft Access.
1 of 27 DA1241 Archive Companies Last updated: March-2004 DA1241 Archive Companies.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Do you have the Maths Factor?. Maths Can you beat this term’s Maths Challenge?
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
What’s New in WatchGuard Dimension v1.2
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
We will resume in: 25 Minutes.
L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
© Paradigm Publishing, Inc Access 2010 Level 2 Unit 2Advanced Reports, Access Tools, and Customizing Access Chapter 8Integrating Access Data.
Benchmark Series Microsoft Excel 2013 Level 2
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Off-the-Record Communication, or, Why Not To Use PGP
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Lecture 5: Cryptographic Hashes
1 Intercepting Mobile Communications: The Insecurity of …or “Why WEP Stinks” Dustin Christmann.
Benchmark Series Microsoft Excel 2013 Level 2
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing T. Scott Saponas Jonathan Lester Carl Hartung Sameer Agarwal Tadayoshi Kohno.
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era Authors: Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen,
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Security Of Wireless Sensor Networks
Security of Wireless Sensor Networks
Presentation transcript:

Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing :

Paper Information 2 Title : Devices That Tell On You: Privacy Trends in Consumer Ubiquitous Computing Authors : T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno Publish : 16th USENIX Security Symposium

Contents of Table Wireless multimedia environments Commercial product ( Sling box pro ) Information leakage Devices that we have on our persons all the time Commercial product ( Nike+iPod Sports kit ) Lack of location privacy Privacy-perserving mechanisms Devices promoting social activity Commercial product ( Microsoft Zune ) Circumventing Zune s blocking mechanism Conclusion 3

Wireless multimedia environments 4 The Slingbox Pro The Slingbox Pro is a networked video streaming device built by Sling Media, Inc. It allows users to remotely view (sling) the contents of their TV over the Internet. devices that permeate our environment and that stream or exchange information Vehicle to study the issues and challenges affecting next-generation wireless multime- dia environments

Wireless multimedia environments 5 Information leakage Re-encodes the video stream using a variable bitrate encoder. Provides encryption for its data stream regardless of any transport encryption like WPA. Private information could be potentially sensitive if the content is illegal, embarrassing, or is otherwise associated with some social stigma. Eavesdropper Re-encodes Encryption For data stream Private information

Wireless multimedia environments 6 Eavesdropping algorithms Using Wireshark protocol analyzer to capture all of the Slingbox encrypted packets to file. We use these 100-millisecond throughput traces as the basis for our eavesdrop- ping analysis. Encryption For data stream Wireshark protocol analyzer 100-millisecond throughput traces

Wireless multimedia environments 7 Eavesdropping algorithms 1) Building a Database of Reference Traces. we construct a database of reference traces. Each movie was represented by exactly one reference trace. 2) Matching a Query Trace to the Database. uses this database of reference traces to match against a previously unseen trace. Building Database Matching

Wireless multimedia environments 8 Eavesdropping algorithms 1) Building a database of movie signatures 1) The raw throughput traces corresponding to a movie are aligned and averaged to produce a single composite trace. 2) A windowed Fourier transform is performed on the single composite. 3) Database of movie signatures is constructed in this manner.

Wireless multimedia environments 9 Eavesdropping algorithms 2) Matching a Query Trace to the Database. 1) A query trace is transformed similarly into a signature. 2) The minimum sliding window distance between the movie signatures and the query signature is calculated. 3) The movie with the minimum distance is declared a match.

Wireless multimedia environments 10 Information leakage The implications of results that an adversary in close proximity to a users home might be able to infer information about what videos a user is watching. ! Slingbox results provide further evidence that encryption alone cannot fully conceal the contents of encrypted data.

Devices that we have on our persons all the time 11 Nike+iPod Sports kit It is a wireless exercise accessory for the iPod Nano The kit consists of two components a wireless sensor and a receiver. The basis for assessing the issues and challenges with devices that we have on our persons all the time Provide interactive audio feedback to the user about her workout.

Devices that we have on our persons all the time 12 Lack of location privacy receiver Range 1)When one begins to walk or run with the sensor in their shoe, the sensor begins transmitting. 2) While the sensor is awake and nearby we observed that it transmits one packet every second (containing the UID) 3) Seven sensors indicated the receiver still hears every sensor UID at least once in a ten second window. transmitting

Devices that we have on our persons all the time 13 Lack of location privacy The Nike+iPods use of a globally unique persistent identifier. Nike+iPod sensors we observed approximately a 10 meter range indoors and a 10–20 meter range outdoors. An adversary to exploit the Nike+iPod Sport Kits lack of location privacy protection An attacker might also establish patterns of presence. receiver Range transmitting ! location information

Devices that we have on our persons all the time 14 Privacy preserving mechanism 1) Exploiting (Largely) Static Associations. the cryptographic key could be written on the backs of the sensors, and a user could manually enter that key into their iPods before using that new sensor special button on it that, when pressed, causes the sensor to actually broadcasts a cryptographic key for some short duration of time + cryptographic key + special button

Devices that we have on our persons all the time 15 Privacy preserving mechanism 2) Un-Sniffable Unique Identifiers. K (shared key) Assume now that both the sensor and the receiver are preprogrammed with the same shared 128-bit cryptographic key K. Generating X by using AES in CTR mode with a second, non-shared 128-bit AES key K during the one-second idle time between broadcasts. X (pseudorandom value) sensorreceiver K (non-shared key)

Devices that we have on our persons all the time 16 Privacy preserving mechanism 2) Un-Sniffable Unique Identifiers. K (shared key) X (pseudorandom value) sensorreceiver K (non-shared key) Also during this one-second idle time between broadcast, the sensor could pre-generate a keystream S using AES in CTR mode, this time with the initial counter X and the shared key K. S (keystream)

Devices that we have on our persons all the time 17 Privacy preserving mechanism 2) Un-Sniffable Unique Identifiers. K (shared key) X (pseudorandom value) sensorreceiver K (non-shared key) S (keystream) when the sensor wishes to send a message M to the corresponding receiver, send the pair (X,M S), where denotes the exclusive-or operation. Upon receiving a message (X,Y) M (Message) (X,M S)=(X,Y)

Devices that we have on our persons all the time 18 Privacy preserving mechanism 2) Un-Sniffable Unique Identifiers. K (shared key) X (pseudorandom value) sensorreceiver K (non-shared key) S (key stream) M (Message) (X,M S)=(X,Y) S (key stream) (X,Y)(X,Y) receiver would re-generate S from X and the shared key K recover M as Y S, and then accept M as coming from the paired sensor if M contains the desired UID M (Recovered message)

Devices promoting social activity 19 Microsoft Zune It is a portable digital media player with one wireless capabilities. The intended goal is to let users share pictures and songs with other nearby Zunes. A foothold into understanding the issues and challenges with devices promoting social activity

Devices promoting social activity 20 Circumventing Zunes blocking mechanism Consider a scenario consisting of two users, Alice and Bob, and assume that Alice and Bob respectively name their Zunes AliceZune and BobZune; AliceZuneBobZune If Bob wishes to share a song or picture with his neighbors, he must first select the song or picture and then select the send option. share a song or picture send

Devices promoting social activity 21 Circumventing Zunes blocking mechanism AliceZuneBobZune share a song or picture send Alice has two choices: to accept the content or to not accept the content. If Alice accepts the song and later decides that she would like to prevent Bob from ever sending her a song in the future, she can navigate to her Zunes menu, select BobZune, and then select the block option. 1.Accept 2.Not accept 3.Block (after Accept)

Devices promoting social activity 22 Circumventing Zunes blocking mechanism AliceZuneBobZune send 1) Disappearing attack Zune inappropriate image The crux of the problem is that Alice will not be able to block Bobs Zune if BobZune is no longer nearby or discoverable Alice may remember the name of Bobs Zune, and thereby simply deny messages from BobZune in the future

Devices promoting social activity 23 Circumventing Zunes blocking mechanism AliceZuneBobZune CharlieZune send 1) Disappearing attack Zune inappropriate image Bob can change the name of his Zune before trying to beam Alice additional content. Bob could scan his nearby community, find a nearby Zune named CharlieZune and then name his Zune CharlieZune. CharlieZune scan

Devices promoting social activity 24 Circumventing Zunes blocking mechanism AliceZune send 1) Disappearing attack Zune inappropriate image CharlieZune scan BobZune CharlieZune If Bob sends inappropriate content to Alice and then turns off his wireless, he might trick Alice into blocking the real CharlieZune. blocking

Devices promoting social activity 25 Circumventing Zunes blocking mechanism 2) Fake MAC addresses Bob could therefore use a Linux laptop to fool Alice into thinking that she has blocked BobZune when in fact she has not. The Zune neighbor discovery process and blocking mechanism is based on Zunes MAC addresses.

Conclusion 26 We technically explore privacy and security properties of several commercial UbiComp products. Need to provide strong levels of privacy protection.

Thank you 27 Question and Answer