Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic

<p>Recent years have witnessed significant growth in the mobile device landscape as smartphones and tablet computers have become more affordable and more feature-rich. Users commonly extend the functionality built into these mobile devices by installing add-on applications, called apps. Many p...

Full description

Bibliographic Details
Main Authors: Taylor, V, Nurse, J, Hodges, D
Format: Working paper
Language:English
Published: Centre for Doctoral Training in Cyber Security 2014
Subjects:
_version_ 1797055742718509056
author Taylor, V
Nurse, J
Hodges, D
author_facet Taylor, V
Nurse, J
Hodges, D
author_sort Taylor, V
collection OXFORD
description <p>Recent years have witnessed significant growth in the mobile device landscape as smartphones and tablet computers have become more affordable and more feature-rich. Users commonly extend the functionality built into these mobile devices by installing add-on applications, called apps. Many popular apps adopt a client-server architecture and communicate with Internet-based services to provide users with a rich and dynamic experience. Worryingly, some of these apps need to access sensitive data such as phonebook entries, appointments, messages, or a user's geographic location, but precisely how apps use and transmit sensitive data over wireless networks has not been widely studied. We examine the traffic sent from 35 popular Android apps spread over 6 categories to explore what an attacker with a promiscuous wireless receiver could learn about a target. We discovered that the majority of the apps that were tested had a detrimental impact on privacy by sending sensitive data without encrypting it. We also discovered that in some cases, improper application design rendered SSL encryption useless at preventing privacy leaks. We discuss ways in which an attacker can use both active and passive attacks to identify and track a user or invade their privacy. Finally, we suggest and discuss several possible solutions to mitigate the privacy risks that were identified.</p>
first_indexed 2024-03-06T19:14:08Z
format Working paper
id oxford-uuid:17c44695-402c-4275-8dab-468966d8fe0b
institution University of Oxford
language English
last_indexed 2024-03-06T19:14:08Z
publishDate 2014
publisher Centre for Doctoral Training in Cyber Security
record_format dspace
spelling oxford-uuid:17c44695-402c-4275-8dab-468966d8fe0b2022-03-26T10:39:24ZAndroid apps and privacy risks : what attackers can learn by sniffing mobile device trafficWorking paperhttp://purl.org/coar/resource_type/c_8042uuid:17c44695-402c-4275-8dab-468966d8fe0bCyber SecurityComputingEnglishOxford University Research Archive - ValetCentre for Doctoral Training in Cyber Security2014Taylor, VNurse, JHodges, D<p>Recent years have witnessed significant growth in the mobile device landscape as smartphones and tablet computers have become more affordable and more feature-rich. Users commonly extend the functionality built into these mobile devices by installing add-on applications, called apps. Many popular apps adopt a client-server architecture and communicate with Internet-based services to provide users with a rich and dynamic experience. Worryingly, some of these apps need to access sensitive data such as phonebook entries, appointments, messages, or a user's geographic location, but precisely how apps use and transmit sensitive data over wireless networks has not been widely studied. We examine the traffic sent from 35 popular Android apps spread over 6 categories to explore what an attacker with a promiscuous wireless receiver could learn about a target. We discovered that the majority of the apps that were tested had a detrimental impact on privacy by sending sensitive data without encrypting it. We also discovered that in some cases, improper application design rendered SSL encryption useless at preventing privacy leaks. We discuss ways in which an attacker can use both active and passive attacks to identify and track a user or invade their privacy. Finally, we suggest and discuss several possible solutions to mitigate the privacy risks that were identified.</p>
spellingShingle Cyber Security
Computing
Taylor, V
Nurse, J
Hodges, D
Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
title Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
title_full Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
title_fullStr Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
title_full_unstemmed Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
title_short Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
title_sort android apps and privacy risks what attackers can learn by sniffing mobile device traffic
topic Cyber Security
Computing
work_keys_str_mv AT taylorv androidappsandprivacyriskswhatattackerscanlearnbysniffingmobiledevicetraffic
AT nursej androidappsandprivacyriskswhatattackerscanlearnbysniffingmobiledevicetraffic
AT hodgesd androidappsandprivacyriskswhatattackerscanlearnbysniffingmobiledevicetraffic