ipshield: A Framework For Enforcing Context-Aware Privacy
|
|
- Richard McDowell
- 5 years ago
- Views:
Transcription
1 ipshield: A Framework For Enforcing Context-Aware Privacy Supriyo Chakraborty, Chenguang Shen, Kasturi Rangan Raghavan, Yasser Shoukry, Matt Millar, Mani Srivastava
2 2 From sensor data to inferences Sensor Data
3 2 From sensor data to inferences Apps Sensor Data
4 2 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensor Data
5 2 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensor Data Sensitive Location Password Media habits Physiological habits
6 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits
7 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits
8 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits
9 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits
10 4 Protecting inference privacy while providing utility Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Whitelist Sensitive Sensor Data Location Password Media habits Physiological habits Blacklist
11 4 Protecting inference privacy while providing utility Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Whitelist Inference firewall Sensitive Sensor Data Location Password Media habits Physiological habits Blacklist
12 4 Protecting inference privacy while providing utility Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Whitelist Inference firewall Sensitive Sensor Data Location Password Media habits Physiological habits Blacklist
13 Prior notions of privacy in databases Population Scale Database Sensor Data Capture Data Processing Sensor Data Capture Data Processing Sensor Data Capture Data Processing D := { P = personal identifiers, (name, ID) Q = quasi identifiers, (age, zip code) V = measurement values (sensor data)} 5
14 Prior notions of privacy in databases Population Scale Database Sensor Data Capture Data Processing 1. K-anonymity 2. L-Diversity 3. t-closeness Privacy M=<P,Q,V> inference = identity Information Recipient Sensor Data Capture Data Processing Sensor Data Capture Data Processing D := { P = personal identifiers, (name, ID) Q = quasi identifiers, (age, zip code) V = measurement values (sensor data)} 5
15 Prior notions of privacy in databases Population Scale Database Sensor Data Capture Data Processing 1. K-anonymity 2. L-Diversity 3. t-closeness Privacy M=<P,Q,V> inference = identity Information Recipient Sensor Data Capture Data Processing Privacy M=R(<P,Q,V>)+noise Sensor Data Capture Data Processing Information Recipient D := { P = personal identifiers, (name, ID) Q = quasi identifiers, (age, zip code) V = measurement values (sensor data)} Differential Privacy inference = membership 5
16 6 Prior notions of privacy in databases Sensor Data Capture Data Processing Aggregate Queries M:=<P, Q, V > Information Recipient Sensor Data Capture Data Processing Sharing an Individual s data Information Recipient
17 6 Prior notions of privacy in databases Privacy of Data (secrecy) Privacy of Identity (anonymity) Sensor Data Capture Data Processing Traditional Aggregate Queries M:=<P, Q, V > Information Recipient Sensor Data Capture Data Processing Sharing an Individual s data Information Recipient Privacy of Behavior
18 7 Controls provided by current systems are insufficient Android Manifest Binary Policies
19 7 Controls provided by current systems are insufficient pdroid Static Policies
20 7 Controls provided by current systems are insufficient ProtectMyPrivacy Share Random Data
21 8 Design requirements of ipshield Unrestricted Access Protected APIs
22 8 Design requirements of ipshield Combination of benign sensors can be used for privacy attack Sensor Monitoring Unrestricted Access Protected APIs
23 9 Design requirements of ipshield Sensor Monitoring GPS Network Accelerometer Microphone Light
24 9 Design requirements of ipshield Sensor Monitoring GPS Network Accelerometer Location Transportation Mode Password/PIN Privacy Abstraction Microphone Stress Light Media Watching
25 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Privacy Rules on Sensors Rule Enforcement
26 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Rule Recommender Privacy Rules on Sensors Rule Enforcement
27 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Privacy Rules on Sensors Rule Recommender Manual Override (Rules) Rule Enforcement
28 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Privacy Rules on Sensors Rule Recommender Manual Override (Rules) ipshield Rule Enforcement Rule Enforcement
29 Whitelist/Blacklist Rule Recommender Privacy rules on sensors
30 Recommender objective Generate a plan for context-aware obfuscation of sensor data depending on the prioritized whitelist and blacklist such that accuracy of whitelist is maximized and accuracy of blacklist is minimized. 12
31 Divide-and-conquer strategy Recommend a plan containing allow/deny rules for sensors depending on the prioritized whitelist and blacklist such that accuracy of whitelist is maximized and accuracy of blacklist is minimized. 13
32 Divide-and-conquer strategy Recommend a plan containing allow/deny rules for sensors depending on the prioritized whitelist and blacklist such that accuracy of whitelist is maximized and accuracy of blacklist is minimized. + Support manual override/configuration of fine-grained context-aware rules 13
33 Elements of the problem: accuracy 14
34 14 Elements of the problem: accuracy Activity Location OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
35 14 Elements of the problem: accuracy Activity Location OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% Sensor Combination GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
36 14 Elements of the problem: accuracy Activity Inference Location Type OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% Sensor Combination GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
37 14 Elements of the problem: accuracy Activity Inference Location Type OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% Sensor Combination Accuracy of Prediction GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
38 15 Elements of the problem: priority Priority (p) Priority =(p activity,p location,p tap ) priority = {10, 4, 10}
39 15 Elements of the problem: priority Priority (p) Priority =(p activity,p location,p tap ) priority = {10, 4, 10} Whitelisted inferences priority allow whitelisted inferences Blacklisted inferences priority block blacklisted inferences
40 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination
41 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations
42 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations maximize accuracy of prioritized whitelist and
43 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations maximize accuracy of prioritized whitelist and minimize accuracy of prioritized blacklist
44 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations maximize accuracy of prioritized whitelist and minimize accuracy of prioritized blacklist such that highest priority blacklists are always blocked.
45 17 Rule recommender at work Activity Location OnScreen Taps GPS+Acc+Gyro 95% 97% 80% GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
46 17 Rule recommender at work Activity Location OnScreen Taps GPS+Acc+Gyro 95% 97% 80% GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
47 17 Rule recommender at work Activity Location OnScreen Taps Priority1 {10, 4, 10} GPS+Acc+Gyro 95% 97% 80% 0 GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
48 17 Rule recommender at work Activity Location OnScreen Taps Priority1 {10, 4, 10} GPS+Acc+Gyro 95% 97% 80% 0 GPS+WiFi 83.1% 97% 0% Allow GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%
49 ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Enforcement Prototype implementation on Android
50 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes
51 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes
52 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes
53 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes
54 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Android Framework Location Manager }App and Managers run as part of the same process Sensor Data Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes
55 19 Sensor subsystem in android and data interception Sensor Manager Sensor Data Sensor Service Third Party Apps Android Framework System Server Android Native/Linux Kernel Hardware Location Manager Sensor Data LocationManager Service }App and Managers run as part of the same process } Services run in separate system owned processes System Processes User Processes
56 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Monitoring Privacy Abstraction Rule Recommender Sensor Manager Location Manager Fine-grained Rules Enforcement SensorService LocationManager Service System Processes System Server Native Runtime Hardware User Processes Trusted App (User Process)
57 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Semantic Firewall Configurator Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)
58 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Semantic Firewall Configurator Monitoring Privacy Abstraction Inference Database Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)
59 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Semantic Firewall Configurator Monitoring Privacy Abstraction Rule Recommender Inference Database Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)
60 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Context Engine Direct Configurator Semantic Firewall Configurator Rule Recommender Inference Database Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)
61 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Context Engine Direct Configurator Semantic Firewall Configurator Rule Recommender Inference Database Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService Obfuscator FirewallConfig Service System Server LocationManager Service Obfuscator Native Runtime Hardware System Processes User Processes Trusted App (User Process)
62 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules
63 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules
64 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Suppress Fine-grained Rules
65 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules
66 Feasibility of running ipshield on mobile platforms Time (in secs) time to load rules into memory time for the rules to take effect # rules 22
67 Feasibility of running ipshield on mobile platforms 0.1 SENSOR_DELAY_NORMAL, SENSOR_DELAY_UI Time (in secs) time to load rules into memory time for the rules to take effect # rules 22
68 Feasibility of running ipshield on mobile platforms 0.1 SENSOR_DELAY_NORMAL, SENSOR_DELAY_UI Time (in secs) SENSOR_DELAY _GAME time to load rules into memory time for the rules to take effect # rules 22
69 Feasibility of running ipshield on mobile platforms 0.1 SENSOR_DELAY_NORMAL, SENSOR_DELAY_UI Time (in secs) SENSOR_DELAY _GAME SENSOR_DELAY _FASTEST time to load rules into memory time for the rules to take effect # rules 22
70 23 Feasibility of running ipshield on mobile platforms 26.7 Memory (in MB) AOSP Passthrough Constant Perturb Suppress
71 23 Feasibility of running ipshield on mobile platforms 26.7 Memory (in MB) AOSP Passthrough Constant Perturb Suppress
72 24 Concluding Remarks We designed and implemented ipshield which - proposes the use of inferences as the currency for privacy and utility specification. - advocates that the burden of configuring fine-grained privacy rules should be shifted from the user to the system. - provides insight into how and what data is being used by apps and better visibility into potential risks and consequences of sharing data. Going forward we want to... - develop the rule recommender to generate rules for obfuscating data. - augment ipshield with ability to perform static analysis of app code to better understand the risks presented by the apps. - allow crowd-sourcing for bootstrapping of rules. ipshield can be downloaded at
73 Thank You 25
74 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type
75 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type
76 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type
77 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type
78 ipshield Rules supported Monitoring Rule Contexts SensorType Privacy Abstraction Actual trace Spoofed trace Rule Recommender Action Fine-grained Rules Built-In Bar External Normal Constant Suppress Perturb Scalar Time Place App Day NameOfWeek OfDay Walking Running Vector Play-back Classroom Distribution Distribution Name Param... Classroom Enforcement Sensor Friend s Sensor SensorSource Source Home Type Friend s Home Starbucks Bar Restaurant My Home My Home Rule: If ((TimeOfDay in [12am-11:59pm]) and (Place=Bar) and (AppName=Saga) then apply action = Constant and Value = Restaurant on SensorType = GPS; 26
79 27 Sensor usage for apps % of apps # sensors
80 28 Distribution of sensors by type Accelerometer GPS Microphone WiFi Soft Sensors Bluetooth Gyroscope Cellular Camera Others % of apps
u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections, etc.
November 11, 2013 Presented by: Merhawit Habte 1. Introduc,on u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections,
More informationSieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime Jianmeng Huang 2017,1,12 Outline 1 Motivation Intro Current solutions Our goals 2 SieveDroid Our solution
More informationCS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many
More informationNESL. CAreDroid: Adaptation Framework for Android Context-Aware Applications. Salma Elmalaki Lucas Wanner Mani Srivastava
CAreDroid: Adaptation Framework for Android Context-Aware Applications Salma Elmalaki Lucas Wanner Mani Srivastava 1 Isolated Disconnected Unaware Photo Courtesy: Student Portal 2 Computing From Isolation
More informationBarracuda Cloud Archiving Service Mobile Application for Android
Barracuda Cloud Archiving Service Mobile Application for Android Requirements: Latest Android Message Archive application available for download from the Google Play Store. Android device running software
More informationPublic Sensing Using Your Mobile Phone for Crowd Sourcing
Institute of Parallel and Distributed Systems () Universitätsstraße 38 D-70569 Stuttgart Public Sensing Using Your Mobile Phone for Crowd Sourcing 55th Photogrammetric Week September 10, 2015 Stuttgart,
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationBeam: Ending Monolithic Applications for Connected Devices
Beam: Ending Monolithic Applications for Connected Devices Chenguang Shen (UCLA) Rayman Preet Singh (Univ. of Waterloo/Samsung Research) Amar Phanishayee, Aman Kansal, Ratul Mahajan (Microsoft Research)
More informationSony develops transparent lens eyewear SmartEyeglass - Announces availability of software development kit -
News & Information 1-7-1 Konan, Minato-ku, Tokyo 108-0075, Japan Sony Corporation No. 14-090E September 19, 2014 Sony develops transparent lens eyewear SmartEyeglass - Announces availability of software
More informationECE 1160/2160 Embedded Systems Design. Projects and Demos. Wei Gao. ECE 1160/2160 Embedded Systems Design
ECE 1160/2160 Embedded Systems Design Projects and Demos Wei Gao ECE 1160/2160 Embedded Systems Design 1 Project Group project 45% Proposal presentation 5% Midterm presentation/demo 10% Final presentation/demo
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More informationMobile and Ubiquitous Computing: Mobile Sensing
Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,
More informationSMART DEVICES: DO THEY RESPECT YOUR PRIVACY?
SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in
More informationFocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention
FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,
More informationPRISM: Platform for Remote Sensing using Smartphones
PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA
More informationTizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify
Tizen apps with 1 Context Awareness, powered by AI by Shashwat Pradhan, CEO Emberify Introduction Context refers to information that characterizes a situation, between: Apps People Surrounding environment
More informationContextion: A Framework for Developing Context-Aware Mobile Applications
Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract
More informationFusing Sensors into Mobile Operating Systems & Innovative Use Cases
Fusing Sensors into Mobile Operating Systems & Innovative Use Cases May 23, 2012 Tristan Joo (tristanjoo@wca.org) Board Director & Co-Chair of Mobile SIG Wireless Communications Alliance, Independent Executive
More informationBlackBerry BlackBerry 10 OS, version continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices.
BlackBerry 10.2.1 BlackBerry 10 OS, version 10.2.1 continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices. PINCH TO PRIORITIZE Don t miss important messages Pinch the Hub to
More informationSTEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION
STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION Maryam Mehrnezhad Ehsan Toreini Siamak F. Shahandashti Feng Hao Newcastle University, UK At EuroUSEC, July 2016 JavaScript-based attack
More informationDefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior
http://defdroid.org DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior Peng (Ryan) Huang, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou UC San Diego Growing number of (novice) app developers
More informationSense & Sensibility for Wireless Networks. Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari
Sense & Sensibility for Wireless Networks Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari The Era of Truly Mobile Computing 2000 Internet Users (Millions) 1600 1200 800 400
More informationRAD Studio XE4 in Action LIVE! 14th May, 2013 Taipei Malcolm Groves
RAD Studio XE4 in Action LIVE! 14th May, 2013 Taipei Malcolm Groves Embarcadero Technologies Founded 1993 3.2 Million Customers 500+ Employees in 29 Countries 5 R&D Centers of Excellence World Wide Sales
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose
More informationTale of a mobile application ruining the security of global solution because of a broken API design. SIGS Geneva 21/09/2016 Jérémy MATOS
Tale of a mobile application ruining the security of global solution because of a broken API design SIGS Geneva 21/09/2016 Jérémy MATOS whois securingapps Developer background Spent last 10 years working
More informationPrivacy by Design in an IoT Environment. Alfred Kobsa
Privacy by Design in an IoT Environment Alfred Kobsa D o n a l d B re n S c h o o l o f I n fo r m at i o n a n d C o m p u te r S c i e n c e s U n i ve rs i t y o f C a l i fo r n i a, I r v i n e DARPA
More information9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input
MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationSecurity Philosophy. Humans have difficulty understanding risk
Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy
More informationAnalysis of Privacy and Security Exposure in Mobile Dating Applications
Analysis of Privacy and Security Exposure in Mobile Dating Applications Constantinos Patsakis, Athanasios Zigomitros and Agusti Solanas International Conference on Mobile, Secure and Programmable Networking
More informationAAD - ASSET AND ANOMALY DETECTION DATASHEET
21 October 2018 AAD - ASSET AND ANOMALY DETECTION DATASHEET Meaningful Insights with Zero System Impact Classification: [Protected] 2018 Check Point Software Technologies Ltd. All rights reserved. This
More informationMobile Computing Meets Research Data
Mobile Computing Meets Research Data Engineer Bainomugisha Pilot Research Data Center Workshop Mombasa/Kenya Software Languages Lab. Department of Computer Science Vrije Universiteit Brussel, Belgium Department
More informationAd Hoc Networks - Applications and System Design
Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,
More informationMOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationData Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University
Data Analytics for IoT: Applications to Security and Privacy Nick Feamster Princeton University Growing Market for IoT Analytics More than 25 billion devices by 2020 Each of these devices generates data.
More information6.S062: Mobile and Sensor Computing aka IoT Systems
6.S062: Mobile and Sensor Computing aka IoT Systems http://6s062.github.io/6mob Lecturers Hari Balakrishnan (hari@csail.mit.edu) Fadel Adib (fadel@mit.edu) TA Hyunjoon (Richard) Song (rsong@mit.edu) Course
More informationManaging and Optimising for numerous Android Devices
Managing and Optimising for numerous Android Devices Hello Andrew Innes Old-school console developer Android fanboi Works for Unity Japan Console R&D Support Manager Unitron Dog-fooding Unity s 2D pipeline
More informationAndroid. Lesson 1. Introduction. Android Developer Fundamentals. Android Developer Fundamentals. to Android 1
Android Lesson 1 1 1 1.0 to Android 2 Contents Android is an ecosystem Android platform architecture Android Versions Challenges of Android app development App fundamentals 3 Android Ecosystem 4 What is
More informationImperfections of Sensors Make Smartphone Users Trackable. Srihari Nelakuditi
Imperfections of Sensors Make Smartphone Users Trackable Srihari Nelakuditi Privacy is hot in the press Privacy is not a new concern Source: 3M privacy filter for laptops promotional campaign Privacy is
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationMobility meets Web. Al Johri & David Elutilo
Mobility meets Web Al Johri & David Elutilo Origin-Based Access Control in Hybrid Application Frameworks Outline 1. Introduction Hybrid Apps & Frameworks 2. Security Models 3. Bridges 4. Fracking 5. Existing
More informationHUAWEI MediaPad T1 8.0 FAQ HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 06/30
HUAWEI MediaPad T1 8.0 FAQ Issue 01 Date 06/30 HUAWEI TECHNOLOGIES CO., LTD. 1 System and update... 1-1 1.1 Why does my HUAWEI MediaPad T1 8.0 constantly crash?... 1-1 1.2 Will data be erased if I update
More information37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS
37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS TABLE OF CONTENTS INTRODUCTION 3 QUESTIONS BEFORE YOU BUY 4 USING CELLCONTROL 9 iphone-specific QUESTIONS 14 ANDROID AND WINDOWS PHONE-SPECIFIC
More informationCSCI 420: Mobile Application Security. Lecture 15. Prof. Adwait Nadkarni
CSCI 420: Mobile Application Security Lecture 15 Prof. Adwait Nadkarni 1 Running scripts from home apktool instructions: Move both files (apktool.jar & apktool) to /usr/local/bin (root needed) No-root
More informationOpen Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010
Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced
More informationMobile Derived Credentials Purebred Information Brief
Mobile Derived Credentials Purebred Information Brief Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute a commitment on behalf of the
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationOpportunistic CrowdSensing. Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA)
Opportunistic CrowdSensing Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA) On-going Large-scale Opportunistic CrowdSensing Investigations in MASS Lowering Energy Consumed
More informationMedigate and Palo Alto Networks Integration
Medigate and Palo Alto Networks Integration A Superior Security Solution for Connected Medical Devices Medigate and Palo Alto Networks have teamed together to deliver a best-in-class solution that addresses
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationAndroid. Operating System and Architecture. Android. Screens. Main features
Android Android Operating System and Architecture Operating System and development system from Google and Open Handset Alliance since 2008 At the lower level is based on the Linux kernel and in a higher
More informationAtLongLat. Location aggregation and developer platform. Jeff Weinstein. Stephen Pike. Faculty Advisor: Zachary G. Ives
AtLongLat Location aggregation and developer platform Jeff Weinstein Stephen Pike Faculty Advisor: Zachary G. Ives April 24, 2009 Abstract AtLongLat (http://atlonglat.scpike.net) lets users share their
More informationDefining Security for an AWS EKS deployment
Defining Security for an AWS EKS deployment Cloud-Native Security www.aporeto.com Defining Security for a Kubernetes Deployment Kubernetes is an open-source orchestrator for automating deployment, scaling,
More informationGPS FOR CAREGIVERS Overview To use GPS visit verification, you must use a device that can access the internet and has GPS-enabled. GPS location services is typically offered on Android and iphone phones,
More informationMOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationQUICK START GUIDE NTS HOSTED PBX CALL MANAGER. Welcome. Getting Oriented
QUICK START GUIDE NTS HOSTED PBX Welcome Welcome to NTS Hosted PBX! This guide is intended to get you up and running with the basic features associated with the product. For more in-depth information,
More informationGetting Started on the Tablet
Updated 02/28/2017 Table of Contents Getting Started Setting up the Tablet (BYOD)...1 Settings...1 Adding Settings App to Home Screen...1 Bluetooth...2 Data...3 Display...3 Location Services...4 Date &
More informationVehicle To Android Communication Mode
Technical Disclosure Commons Defensive Publications Series May 12, 2017 Vehicle To Android Communication Mode Tanmay Wadhwa Neil Dhillon Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationFirewall. Firewall For further information on installing the Remote Control app please refer to page 3 of this document.
Firewall For further information on installing the Remote Control app please refer to page 3 of this document. By enabling this feature you can create one or more blacklists to block calls and messages
More informationDistributed Systems - Mertz & McCarthy
Design Issues in Distributed Mobile Applications Association Sensing and Context Awareness Security and Privacy Adaptation Devices Appear and disappear from the space. Do so unpredictably May be totally
More information2 Experience Surround Wifi
USER GUIDE 2 Experience Surround Wifi Table of Contents ABOUT LUMA 4 INSTALL LUMA 6 Get started 7 Get the Luma app 8 Create an account 9 Customize for your home 10 Set up Luma system 11 WIFI 14 Your network
More informationMobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest
More informationMi Home Security Camera Connection Guide. (ios)
Mi Home Security Camera Connection Guide (ios) 1. Navigate to the APP Store with your iphone and search for Mi Home, or scan the QR code below to download and install Mi Home APP. 2. Plug in the Mi Home
More informationSensors. Mobile Application Development in ios School of EECS Washington State University Instructor: Larry Holder
Sensors Mobile Application Development in ios School of EECS Washington State University Instructor: Larry Holder Mobile Application Development in ios 1 Outline Sensor types Sensor availability Accessing
More informationSensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps Yanyan Zhuang University of Colorado, Colorado Springs Albert Rafetseder New York University Yu Hu New York University ABSTRACT
More informationMobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.
Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment
More informationAchieving k-anonmity* Privacy Protection Using Generalization and Suppression
UT DALLAS Erik Jonsson School of Engineering & Computer Science Achieving k-anonmity* Privacy Protection Using Generalization and Suppression Murat Kantarcioglu Based on Sweeney 2002 paper Releasing Private
More informationOverview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!
Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research
More informationTime Distortion Anonymization for the Publication of Mobility Data with High Utility
Time Distortion Anonymization for the Publication of Mobility Data with High Utility Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux and Lionel Brunie Mobility data usefulness Real-time traffic,
More informationMobile Millennium Using Smartphones as Traffic Sensors
Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology
More informationCHARLES DARWIN, CYBERSECURITY VISIONARY
SESSION ID: SPO1-W12 CHARLES DARWIN, CYBERSECURITY VISIONARY Dan Schiappa SVP and GM, Products Sophos @dan_schiappa It is not the strongest of the species that survives, nor the most intelligent that survives.
More informationXin Pan. CSCI Fall
Xin Pan CSCI5448 2011 Fall Outline Introduction of Android System Four primary application components AndroidManifest.xml Introduction of Android Sensor Framework Package Interface Classes Examples of
More informationScippa: System-Centric IPC Provenance on Android
Scippa: System-Centric IPC Provenance on Android Michael Backes, Sven Bugiel, Sebastian Gerling Saarland Univeristy, Germany 2014 Annual Computer Security Applications Conference Presenter: Qi Wang 1 Android
More informationEnterprise Security Solutions by Quick Heal. Seqrite.
Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices
More informationIntroduction to Samsung KNOX Tizen
Introduction to Samsung KNOX Tizen Name Company Agenda Why B2B matters in China Why should developers care about B2B? The importance of Mobile Device Management KNOX Tizen introduction What is KNOX Tizen
More informationPowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time
PowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time Chulhong Min 1 Youngki Lee 2 Chungkuk Yoo 1 Seungwoo Kang 3 Sangwon Choi 1 Pillsoon Park
More informationEMBEDDED SYSTEMS 2017 IEEE PROJECT
EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.
More informationdevice management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)]
Knox container device management policy The following policies can be applied to Knox container of Samsung devices. System group Screen capture Clipboard Share list Google account synchronization App crash
More informationVendor Held Equipment (VHE) Project
Issue February 2018 Vendor Held Equipment (VHE) Project New App Depot Container 2.0 for both Android and ios devices Job Aid Page 1 of 6 Contents Overview:... 2 Purpose:... 2 VAST Scanning App:... 3 APP
More informationThe IBM MobileFirst Platform
The IBM MobileFirst Platform Curtis Miles IBM MobileFirst Solution Architect April 14, 2015 What is the IBM MobileFirst Platform? A modular set " of libraries, tools, and runtimes " that help you " easily
More informationCS 4518 Mobile and Ubiquitous Computing Lecture 10: Location-Aware Computing Emmanuel Agu
CS 4518 Mobile and Ubiquitous Computing Lecture 10: Location-Aware Computing Emmanuel Agu Reminder: Final Project 1-slide from group next Monday (2/6): 2/40 of final project grade Slide should contain
More information20/20 Insight and WebResponse Whitelist & Settings Information
Overview: 20/20 Insight is comprised of a Desktop component and a web-based component: WebResponse. Surveys are created in the desktop component and then uploaded to the web-based component. The web-based
More informationThe C-Suite Guide to Mobile Technologies for mhealth Development. Medical Web ExpertsTM
The C-Suite Guide to Mobile Technologies for mhealth Development Medical Web ExpertsTM January 2017 Executive Summary mhealth technologies are forming a more integral part of many healthcare organizations
More informationMurphy resource policy engine
Murphy resource policy engine Janos Kovacs Intel / Open Source Technology Center October, 2013 2 Introduction What is Murphy? Policy Management framework Open source project http://01.org/murphy Started
More informationMobile Computing LECTURE # 1
Mobile Computing LECTURE # 1 The Course Course Code: IT-4545 Course Title: Mobile Computing Instructor: JAWAD AHMAD Email Address: jawadahmad@uoslahore.edu.pk Web Address: http://csandituoslahore.weebly.com/mc.html
More informationCOMPUTING SUBJECT KNOWLEDGE AUDIT
COMPUTING SUBJECT KNOWLEDGE AUDIT Use this needs analysis to help self-assess and track your computing subject knowledge. Topic Area 1 Computational thinking Define, explain and use these concepts with
More informationSENSOR SYSTEMS AND THE ART
SENSOR SYSTEMS AND THE ART OF EFFECTIVELY DEPLOYING SENSOR NETWORKS PAT PANNUTO UNIVERSITY OF MICHIGAN TECHCHANGE TC111 CellPump: Using sensors to improve efficacy 30-80% of water pumps fail within 1 year
More informationATC Android Application Development
ATC Android Application Development 1. Android Framework and Android Studio b. Android Platform Architecture i. Linux Kernel ii. Hardware Abstraction Layer(HAL) iii. Android runtime iv. Native C/C++ Libraries
More informationSelf-driving Datacenter: Analytics
Self-driving Datacenter: Analytics George Boulescu Consulting Systems Engineer 19/10/2016 Alvin Toffler is a former associate editor of Fortune magazine, known for his works discussing the digital revolution,
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationGeoLocation Overview
GeoLocation Overview Location-as-a-Service How Mobile, igaming and Lottery Markets can Advance with Layered Location Intelligence LocationSmart 2035 Corte del Nogal, Suite 110 Carlsbad, CA 92011 White
More informationXHound: Quantifying the Fingerprintability of Browser Extensions. Priyankit Bangia Software Engineering. By Oleksii Starov & Nick Nikiforakis
XHound: Quantifying the Fingerprintability of Browser Extensions By Oleksii Starov & Nick Nikiforakis Priyankit Bangia Software Engineering INTRODUCTION What are browser extensions? Browsers are designed
More informationSyllabus- Java + Android. Java Fundamentals
Introducing the Java Technology Syllabus- Java + Android Java Fundamentals Key features of the technology and the advantages of using Java Using an Integrated Development Environment (IDE) Introducing
More informationMarkLogic 8 Overview of Key Features COPYRIGHT 2014 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED.
MarkLogic 8 Overview of Key Features Enterprise NoSQL Database Platform Flexible Data Model Store and manage JSON, XML, RDF, and Geospatial data with a documentcentric, schemaagnostic database Search and
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationMalware, , Database Security
Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)
More informationFeature Extraction in Wireless Personal and Local Area Networks
Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content
More informationLanguages for SDN (Frenetic)
Languages for SDN (Frenetic) Software Defined Networking: The Data Centre Perspective Seminar Informatikdienste A. Pantelopoulos 20.05.2016 1 SDN is useful Direct network control. Enables new applications,
More informationPrivacy Challenges in Big Data and Industry 4.0
Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/
More informationAndroid 5.1 operating system update for your
Android 5.1 operating system update for your Software Version: 23.11.39.quark_verizon.verizon.en.USvzw Verizon Wireless is excited to announce a new software update for the Droid Turbo by Motorola. This
More information