170 likes | 325 Views
Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1 Mini Project Final Presentation. Private Information Exposure in Online Social Networks with iOS , Android and Symbian Mobile Devices. Vassilis Agrafiotis – Communication Systems MA3.
E N D
Security and Cooperation in Wireless Networks Laboratory For Communications and Applications1 Mini Project Final Presentation Private Information Exposure in Online Social Networks with iOS, Android and Symbian Mobile Devices Vassilis Agrafiotis – Communication Systems MA3 Supervisors: Igor Bilogrevic Mathias Humbert
Roadmap • Motivation and Introduction • Set Up • Methodology • Results • Privacy Risk Scale • Results Summary • Conclusion and Improvements
Motivation • To which extent is Privacy respected within Online Social Networks (OSN) ? • Study by looking for Private information disclosure in mobile OSNs • For some mobile platforms, different social networks require unnecessary personal – private information in order to perform an action. • Simulation and traffic analysis project
Introduction • Selection of OSNs to investigate according to their popularity
Introduction • Mobile Platforms studied: iOS, Android, Symbian • Access OSN and record traffic from • mobile web browser • mobile Application if available
Methodology • Fake accounts for every OSN created • Set of possible actions defined within each OSN • Manually simulated execution for every OSN • Network traffic captured using WireShark
Methodology • Traffic traces analyzed using a Java parser • Specific format information ex. email • Coordinate like decimals • Further analysis with manual inspection of traces
Methodology • A lot of traces were encrypted • In this case, we collected also traffic by accessing the OSNs through a PC for comparison • During the sniffing stage, we recorded the usage of GPS by noticing the GPS flash indication on the Smartphone
Results • In overall no major privacy violation discovered • Most of the traffic was encrypted • Thus unable to accurately determine traffic content • Threat: what information is actually sent? • Type of information exchanged between SmartPhone and OSN are platform indepedent
Conclusion and Improvements • Popular OSNs are taking privacy seriously, but still place to improve Encrypted traffic may be a 2-headed feature • Extend our study to others OSNs • Use emulator to simulate the execution and the usage of OSNs TEMA project for Android platform • Record system calls in order to have more evidence about the type of information sent to OSNs servers