Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,898 Hits in 3.3 sec

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis [article]

Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor
2018 arXiv   pre-print
For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information  ...  useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling).  ...  ., DNS, HTTP, IRC), which is not feasible if the analyzed app encrypts its network traffic.  ... 
arXiv:1708.03766v3 fatcat:ss6hqa7zsjcavkkwexftpowtku

Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis [article]

Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino V. Verde
2014 arXiv   pre-print
In this paper, we move a step forward: we investigate to which extent it is feasible to identify the specific actions that a user is doing on his mobile device, by simply eavesdropping the device's network  ...  Work in this latter direction aimed, for example, at inferring the apps a user has installed on his device, or identifying the presence of a specific user within a network.  ...  CONCLUSIONS We proposed a framework to analyze encrypted network traffic and to infer which particular actions the user executed on some apps installed on his mobile-phone.  ... 
arXiv:1407.7844v1 fatcat:suguskjxezabfk6nnq45obhzo4

POSTER

Xing Liu, Wei Wang, Jiqiang Liu
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
Smartphone users are facing serious threat of privacy leakage. This privacy leakage is caused not only by malicious applications (apps), but also by the most popular apps in one's pocket.  ...  Our goal is to find what information is exposed by each popular app, and then to focus on the following three questions in order to explore the influence of this kind of information leakage: (1) to what  ...  We analyze the network traffic data sent for collecting users' usage information to discover what information they leak.  ... 
doi:10.1145/2810103.2810127 dblp:conf/ccs/LiuWL15 fatcat:k2b7hzlcivdqrcp3mbr5bw62fi

Can't You Hear Me Knocking

Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde
2015 Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY '15  
In this thesis, we move a step forward: we investigate to which extent it is feasible to identify the specific actions that a user is doing on his mobile device, by simply eavesdropping the device's network  ...  In particular, we aim at identifying user actions like browsing someone's profile on a social network, posting a message on a friend's wall, or sending an email.  ...  Chapter 8 Conclusions In this thesis, we proposed a framework to analyze encrypted network traffic and to infer which particular actions the user executed on some apps installed on his mobile-phone.  ... 
doi:10.1145/2699026.2699119 dblp:conf/codaspy/ContiMSV15 fatcat:q5fglgz3ebeabdmzoagz2e42jq

Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App

Asmara Afzal, Mehdi Hussain, Shahzad Saleem, M. Khuram Shahzad, Anthony T. S. Ho, Ki-Hyun Jung
2021 Applied Sciences  
This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9).  ...  The analysis of the installed app was conducted over fully encrypted network traffic.  ...  Conclusions In this paper, the encrypted network traffic of the Signal app was analyzed.  ... 
doi:10.3390/app11177789 fatcat:wfwp27ybyjdxrij5j7fla7dy4q

Hidden in Plain Sight: Exploring Encrypted Channels in Android apps [article]

Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan
2022 arXiv   pre-print
As privacy features in Android operating system improve, privacy-invasive apps may gradually shift their focus to non-standard and covert channels for leaking private user/device information.  ...  Using ThirdEye, we analyzed 12,598 top-apps in various categories from Androidrank, and found that 2887/12,598 (22.92%) apps used custom encryption/decryption for network transmission and storing content  ...  ACKNOWLEDGMENTS We are grateful to all anonymous CCS2022 reviewers for their insightful suggestions, comments, and guiding us in the final version of this paper.  ... 
arXiv:2209.15107v1 fatcat:lyagga54tjffrnofj6mopivyva

Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption [article]

Lucky Onwuzurike, Emiliano De Cristofaro
2016 arXiv   pre-print
As social networking takes to the mobile world, smartphone apps provide users with ever-changing ways to interact with each other.  ...  Over the past couple of years, an increasing number of apps have entered the market offering end-to-end encryption, self-destructing messages, or some degree of anonymity.  ...  We wish to thank Balachander Krishnamurthy for motivating our research and for numerous helpful discussions, Ruba Abu-Salma for feedback on an earlier version of the manuscript, and PRES-SID for supporting  ... 
arXiv:1510.04083v3 fatcat:ssoxjtovvzaozapxpu6ddlqxgu

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
This paper proposes a framework to categorize the research works on analyzing encrypted network traffic related to mobile devices.  ...  To that end, researchers are trying to develop techniques to classify encrypted mobile traffic at different levels of granularity, with the objectives of performing mobile user profiling, network performance  ...  [56] investigates that at what extend, an eavesdropper can identify the actions performed on a mobile application by mobile users, by analyzing the encrypted traffic.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

Network and device forensic analysis of Android social-messaging applications

Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
2015 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android.  ...  This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or  ...  In our research group, we have been working on a project to analyze the activity of applications installed on a device to determine network traffic encryption and what services the applications are communicating  ... 
doi:10.1016/j.diin.2015.05.009 fatcat:jyn6mssaircdpdxx2vqru5vdfu

Mobile Social Service User Identification Framework Based on Action-Characteristic Data Retention

Chen-Yu Li, Chien-Cheng Huang, Feipei Lai, San-Liang Lee, Jingshown Wu, Rong-Chi Chang, Hsiang-Wei Huang
2020 IEEE Access  
SUMMARY This study found that, although the traffic is encrypted, some characteristics can be used to identify the MSSs used, the actions, and the communication party of the user.  ...  Thus, more characteristics need to be considered to identify the action the user performed.  ... 
doi:10.1109/access.2020.3009010 fatcat:t4h3wzft4vemtmeryoyn6xovpe

Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic

Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian
2016 Workshop on Offensive Technologies  
In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the wireless network traffic generated by apps.  ...  By learning the subtle traffic behavioral differences between activities (e.g., "browsing" versus "chatting" in a dating app), NetScope is able to perform robust inference of users' activities, for both  ...  Besides website fingerprinting there are many other works which analyze encrypted network traffic to uncover numerous other information leakages.  ... 
dblp:conf/woot/SaltaformaggioC16 fatcat:gkgbvsxhz5bpxj2xdw2zjfrf6a

Security Concerns in Android mHealth Apps

Dongjing He, Muhammad Naveed, Carl A Gunter, Klara Nahrstedt
2014 AMIA Annual Symposium Proceedings  
However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients.  ...  Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data.  ...  we installed and ran each of the apps while capturing network traffic using the "Shark for Root" Android app, and used WireShark to see if the traffic is encrypted.  ... 
pmid:25954370 pmcid:PMC4419898 fatcat:rx7eodml25g7zi25nyud4q4f4m

Android OS Privacy Under the Loupe – A Tale from the East [article]

Haoyu Liu, Douglas J. Leith, Paul Patras
2023 arXiv   pre-print
network-related identifiers), user profile (phone number, app usage) and social relationships (e.g., call history), without consent or even notification.  ...  Through traffic analysis, we find these packages transmit to many third-party domains privacy sensitive information related to the user's device (persistent identifiers), geolocation (GPS coordinates,  ...  preinstalled applications and system services. 3) We only collect and analyze the network traffic generated by system apps and by basic applications such as the dialer and messages apps.  ... 
arXiv:2302.01890v1 fatcat:i4z7xxhrozcjze2o2lcpcbeuii

Towards automated privacy compliance checking of applications in Cloud and Fog environments

Mozhdeh Farhadi, Guillaume Pierre, Daniele Miorandi
2021 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)  
We present a procedure based on machinelearning techniques to identify the type of data being shared by applications with external third-parties even if the application uses encrypted communications.  ...  Our classifiers identify traffic samples of applications with 86% accuracy.  ...  With the proliferation of applications which encrypt their network traffic and users who utilize Virtual Private Networks, it becomes necessary to analyze and classify encrypted data rather than plain  ... 
doi:10.1109/ficloud49777.2021.00010 fatcat:3z3pxpgrpzhxjbi6x5qqupxslm

ProfileDroid

Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos
2012 Proceedings of the 18th annual international conference on Mobile computing and networking - Mobicom '12  
than their paid counterparts, due to an order of magnitude increase in traffic, (c) most network traffic is not encrypted, (d) apps communicate with many more sources than users might expect-as many as  ...  Our approach is arguably the first to profile apps at four layers: (a) static, or app specification, (b) user interaction, (c) operating system, and (d) network.  ...  Acknowledgements We would like to thank the anonymous reviewers and our shepherd Srdjan Capkun for their feedback.  ... 
doi:10.1145/2348543.2348563 dblp:conf/mobicom/WeiGNF12 fatcat:c46tx5sb55ebfna4ehd7bw6ob4
« Previous Showing results 1 — 15 out of 2,898 results