Visible to the public Eavesdropping and Obfuscation Techniques for Smartphones

TitleEavesdropping and Obfuscation Techniques for Smartphones
Publication TypeConference Paper
Year of Publication2016
AuthorsChakraborty, Supriyo, Tripp, Omer
Conference NameProceedings of the International Conference on Mobile Software Engineering and Systems
Date PublishedMay 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4178-3
Keywordsandroid, android encryption, Collaboration, Encryption, Human Behavior, Metrics, mobile phones, privacy, pubcrawl, Resiliency, Scalability
Abstract

Mobile apps often collect and share personal data with untrustworthy third-party apps, which may lead to data misuse and privacy violations. Most of the collected data originates from sensors built into the mobile device, where some of the sensors are treated as sensitive by the mobile platform while others permit unconditional access. Examples of privacy-prone sensors are the microphone, camera and GPS system. Access to these sensors is always mediated by protected function calls. On the other hand, the light sensor, accelerometer and gyroscope are considered innocuous. All apps have unrestricted access to their data. Unfortunately, this gap is not always justified. State-of-the-art privacy mechanisms on Android provide inadequate access control and do not address the vulnerabilities that arise due to unmediated access to so-called innocuous sensors on smartphones. We have developed techniques to demonstrate these threats. As part of our demonstration, we illustrate possible attacks using the innocuous sensors on the phone. As a solution, we present ipShield, a framework that provides users with greater control over their resources at runtime so as to protect against such attacks. We have implemented ipShield by modifying the AOSP.

URLhttp://doi.acm.org/10.1145/2897073.2897715
DOI10.1145/2897073.2897715
Citation Keychakraborty_eavesdropping_2016