1 / 17

Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1

Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1 Mini Project Final Presentation. Private Information Exposure in Online Social Networks with iOS , Android and Symbian Mobile Devices. Vassilis Agrafiotis – Communication Systems MA3.

bryce
Download Presentation

Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1 Mini Project Final Presentation Private Information Exposure in Online Social Networks with iOS, Android and Symbian Mobile Devices Vassilis Agrafiotis – Communication Systems MA3 Supervisors: Igor Bilogrevic Mathias Humbert

  2. Roadmap • Motivation and Introduction • Set Up • Methodology • Results • Privacy Risk Scale • Results Summary • Conclusion and Improvements

  3. Motivation • To which extent is Privacy respected within Online Social Networks (OSN) ? • Study by looking for Private information disclosure in mobile OSNs • For some mobile platforms, different social networks require unnecessary personal – private information in order to perform an action. • Simulation and traffic analysis project

  4. Introduction • Selection of OSNs to investigate according to their popularity

  5. Introduction • Mobile Platforms studied: iOS, Android, Symbian • Access OSN and record traffic from • mobile web browser • mobile Application if available

  6. Set Up

  7. Set Up

  8. Methodology • Fake accounts for every OSN created • Set of possible actions defined within each OSN • Manually simulated execution for every OSN • Network traffic captured using WireShark

  9. Methodology • Traffic traces analyzed using a Java parser • Specific format information ex. email • Coordinate like decimals • Further analysis with manual inspection of traces

  10. Methodology • A lot of traces were encrypted • In this case, we collected also traffic by accessing the OSNs through a PC for comparison • During the sniffing stage, we recorded the usage of GPS by noticing the GPS flash indication on the Smartphone

  11. Privacy Risk Scale

  12. Results • In overall no major privacy violation discovered • Most of the traffic was encrypted • Thus unable to accurately determine traffic content • Threat: what information is actually sent? • Type of information exchanged between SmartPhone and OSN are platform indepedent

  13. Results

  14. Results

  15. Results

  16. Conclusion and Improvements • Popular OSNs are taking privacy seriously, but still place to improve Encrypted traffic may be a 2-headed feature • Extend our study to others OSNs • Use emulator to simulate the execution and the usage of OSNs TEMA project for Android platform • Record system calls in order to have more evidence about the type of information sent to OSNs servers

More Related