Software Creates Privacy Mode to Help Secure Android Phones Author: Matt Shipman Researcher: Dr. Xuxian Jiang Presenter: Brett Shofner.

Slides:



Advertisements
Similar presentations
CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING
Advertisements

Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Muslem AL-Saidi. Outline Introduction Mobile Operating Systems Types Upcoming Operating Systems Popular Smartphone Operating Systems How secure are they?
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
 How Safe Are Smart Phones? By Sean Breslin. Can We Trust Our Phones?  Our cell phone, for most of us, is always by our side  If it is always with.
Team 7 Phil Overbeeke Keith Conrad Jeffrey Enahoro Andrew Stutzman Matt Gardner Semester Final Design Presentation.
E-Passports Threatens Your Privacy Nathan Sweet CSCE 390 Dr. Valtorta
Keeping Medical Data Private By Srivatsan Venkatesan.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
Introduction Our Topic: Mobile Security Why is mobile security important?
Enhancing User Privacy on Android Devices Bachelor of Computer Science (Honours) Name: Quang Do Supervisor: Raymond Choo Associate Supervisor: Ben Martini.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
Sample: 1,000 UK residents (February 2012) Nomophobia.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Decentralized multi-signature solutions for Bitcoin.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
IT concept Alex (WAB) Yae (BISS). Summary of the article Technology & tool for helping people from disaster /blog/communication.gif.
Why do we have projects Three stages of a project Defining and analysing the problem 04/05/11 Projects.
Mobility in Government Martin Grey, Solutions Architect Unit 18 April, 2013.
Security in autonomic communication Shuping Liu Networking Lab HUT.
CompSci 725 RiskRanker Authors Michael Grace - North Carolina State University, Raleigh, NC, USA & NQ Mobile Security Research Center, Beijing, China Yajin.
“Energy-Water-Health Nexus” (Fall 2014-Spring 2015) MT INBRE is A Program of the National Institutes of Health *Research reported in this publication was.
FireDroid: Hardening Security in Almost-Stock Android Presented By: Kenneth Siu.
Ethics and Conflict of Interest
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
CRePE: Context-Related Policy Enforcement for Android Mauro Conti, Vu Thien Nga Nguyen and Bruno Crispo Proceedings of the 13 th International Conference.
Ethical considerations for online mental health communication research By Elvira Perez Vallejos The Ethics of Online Research Methods.
Best Things Done in Managing Hybrid Clouds. Businesses are moving to cloud set-up. However the concerns are security issues, regulatory obstacles, abnormal.
Donald Lemaster CSCE 390.  Researchers at North Carolina State University have developed a software application for Android Smartphones that helps prevent.
Presentation Title Subheading goes here.
Smartphone Brands with the Highest Resale Value.
Solving the Audience Recognition Crisis in Mobile
Mobile Applications Applied to Information System
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Piracy, computer crime, and software misuse at universities
Phone: + 40 (728) | +40 (733)
How To Install Norton Security on Android Phone
Presentation Title Subheading goes here.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
© EIT, Author Gay Robertson, 2017
Protect Your Critical Business Applications With Website Security Testing.
BACK SOLUTION:
The Art of Deception.
Social Engineering No class today! Dr. X.
Presentation by [your name goes here]
Windows 10 is the Power Behind Mobile Sales Enablement Solution That Runs on Any Device “Sales reps can reach their highest potentials with blue-app running.
Title of the poster. Title of the poster. Title of the poster
What's in an Ad? Connor Leonhardt.
Mobile App Advertisements
Name of Poster Goes Here
Name of Poster Goes Here
Type your presentation title here
Data and Applications Security Developments and Directions
Smart Cars and Cybersecurity
Name of Poster Goes Here
Name of Poster Goes Here
Website Privacy: How much should we worry?
Name of Poster Goes Here
Name of Poster Goes Here
Final exam question format
Final exam question format
Presentation transcript:

Software Creates Privacy Mode to Help Secure Android Phones Author: Matt Shipman Researcher: Dr. Xuxian Jiang Presenter: Brett Shofner

Background Problem Problem –Android Smartphone application security –Potential for hackers to get access to your personal information via applications

Ethics The ethical issues here is personal information falling into the hands of hackers The ethical issues here is personal information falling into the hands of hackers Obviously, no one wants their personal information out in the open with the potential to be taken advantage of Obviously, no one wants their personal information out in the open with the potential to be taken advantage of

Solutions Extremes: Extremes: –Applications have no access to information –Applications have access to all information Compromise: Compromise: –Control what each application can and cannot access

TISSA Taming Information- Stealing Smartphone Applications Taming Information- Stealing Smartphone Applications Choices: Choices: –Trusted –Anonymized –Bogus –Empty

Summary Concerns about potential leaks of personal information from smartphones Concerns about potential leaks of personal information from smartphones Software that creates a privacy mode for Android smartphones with flexible control of what information goes to what applications Software that creates a privacy mode for Android smartphones with flexible control of what information goes to what applications