PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory.

Slides:



Advertisements
Similar presentations
An Agent Framework for Effective Data Transfer Stijn Bernaer Patrick De Causmaecker Joris Maervoet Greet Vanden Berghe ECUMICT 2004 Gent, 1-2 April 2004.
Advertisements

What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
Implementation of an Android Phone Based Video Streamer 2010 IEEE/ACM International Conference on Green Computing and Communications 2010 IEEE/ACM International.
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
 Guy Jacob  Roee Shapiro Project B Spring, 2009 Cloudio  Project Supervisor: Eddie Bortnikov  Lab Chief Engineer: Dr. Ilana David.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Project 4 U-Pick – A Project of Your Own Design Proposal Due: April 14 th (earlier ok) Project Due: April 25 th.
Wireless networking Roger Treweek Oxford University Computing Services.
Gas Tracker 9000 Semester Project EEL 6788 Spring 2010 Chris Giles EEL April-2010 University of Central Florida.
V0.01 © 2009 Research In Motion Limited Introduction to Java Application Development for the BlackBerry Smartphone Trainer name Date.
V0.01 © 2009 Research In Motion Limited Understanding Java APIs for Mobile Devices Trainer name Date.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Security issues for mobile devices Cvetko Andreeski.
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Unsafe Exposure Analysis of Mobile In-App Advertisements Offense: Rachel Stonehirsch.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
A Framework for Web and Mobile Volunteered Geographic Information Applications Clodoveu Davis, Hugo Vellozo, Michele Pinheiro Departamento de Ciência da.
Android Introduction Platform Overview.
This work was supported by the TRUST Center (NSF award number CCF ) Methods Data Collection: 1. Start Sever on the host OS: This creates a sanitized.
Identification of Mobile Devices from Network Traffic Measurements - a HTTP User Agent Method Master’s Thesis August 2 8, 2012 Supervisor – Prof. Heikki.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Cyber Crimes.
GPS Tracking An overview of the i730 GPS tracking application and web service Eamon Moore CPSC 463 8/4/2004.
Company Confidential © 2008 Nokia V1-Filename.ppt / YYYY-MM-DD / Initials 1 Mobile emulator technology: S60 Platform Software Development Kit for Symbian.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
What is FORENSICS? Why do we need Network Forensics?
A Measurement Study of Tracking in Paid Mobile Applications Suranga Seneviratne  ✪, Harini Kolamunna, Aruna Seneviratne  ✪ UNSW  NICTA, Australia ✪
Investigation in the development of Standalone Location Based Services Nkululeko Gojela Supervisor: Dr Hannah Thinyane FINAL PROJECT PRESENTATIONS.
ReCapture A Pattern-aware Benchmark Tool for Smartphones.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Rick Conrad Efrain Lopez III Saeed Noori. What is Experience Sampling? Survey method People’s experiences Real-time Format Paper and Pencil Handheld devices.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.
Heidelberg, 25 February 1999 MTM’99 Workshop Terminal and Application Aspects of the Evolution of Broadband Mobile Services EURESCOM P809 Mobility in.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Open and Collaborative Innovation in US Healthcare: The Case of Health Insurance Exchange (HIX), Sudeep Krishnan, IIM Ahmedabad (IIMA), ICEIM 2014, Durban, SA, Conference Presentation
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Introduction to Mobile Applications. Wireless Applications Personal Time and KnowledgeManagemnt Personal Health & Security PersonalNavigation Remote Monitoring.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Cooperative Robotics and Sensor Networks Isaac Rieksts My web site
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
Mobile Application Testing Mobile Application Testing.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
A Software Energy Analysis Method using Executable UML for Smartphones Kenji Hisazumi System LSI Research Center Kyushu University.
1. Data Platform Solution Architect at Microsoft Working with SQL Server for past 15 years Author of SQL Server and Business Intelligence Books Blog a.
ANDROID AS A SERVER PLATFORM ON CLOUD COMPUTING SONA COLLEGE OF TECHNOLOGY SUBMITTED BY: NAGADEVI PRIYA.G DIVYA PURNIMA.S.S
Jenny Knackmuß, Thomas Möller, Wilfried Pommerien & Reiner Creutzburg Brandenburg University of Applied Sciences, IT- and Media Forensics Lab, P.O.Box.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
WELCOME Mobile Applications Testing
Web Programming Language
VPN Joshua Turner.
Outline Introduction Standards Project General Idea
IbVPN: Ensures Your Online Safety and Access Blocked Websites
Article Source- Toll Free
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Find your friend – An Android application
Wireless Spoofing Attacks on Mobile Devices
Chapter 3 Software.
Presentation transcript:

PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1 Mini Project Final Presentation Supervisors: Igor Bilogrevic Mathias Humbert Vassilis Agrafiotis – Communication Systems MA3 1/17

Roadmap  Motivation and Introduction  Set Up  Methodology  Results  Privacy Risk Scale  Results Summary  Conclusion and Improvements 2

Motivation  To which extent is Privacy respected within Online Social Networks (OSN) ?  Study by looking for Private information disclosure in mobile OSNs  For some mobile platforms, different social networks require unnecessary personal – private information in order to perform an action.  Simulation and traffic analysis project 3

Introduction  Selection of OSNs to investigate according to their popularity 4

Introduction  Mobile Platforms studied: iOS, Android, Symbian  Access OSN and record traffic from  mobile web browser  mobile Application if available 5

Set Up 6

7

Methodology  Fake accounts for every OSN created  Set of possible actions defined within each OSN  Manually simulated execution for every OSN  Network traffic captured using WireShark 8

Methodology  Traffic traces analyzed using a Java parser Specific format information ex. Coordinate like decimals  Further analysis with manual inspection of traces 9

Methodology  A lot of traces were encrypted  In this case, we collected also traffic by accessing the OSNs through a PC for comparison  During the sniffing stage, we recorded the usage of GPS by noticing the GPS flash indication on the Smartphone 10

Privacy Risk Scale 11

Results  In overall no major privacy violation discovered  Most of the traffic was encrypted  Thus unable to accurately determine traffic content  Threat: what information is actually sent?  Type of information exchanged between SmartPhone and OSN are platform indepedent 12

13

Results 14

Results 15

Results 16

Conclusion and Improvements  Popular OSNs are taking privacy seriously, but still place to improve Encrypted traffic may be a 2-headed feature  Extend our study to others OSNs  Use emulator to simulate the execution and the usage of OSNs TEMA project for Android platform  Record system calls in order to have more evidence about the type of information sent to OSNs servers 17