Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf ·...

Post on 25-May-2018

215 views 1 download

Transcript of Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf ·...

Project Presentation

Addressing Privacy and Societal Challenges

from the Deployment of Emerging Biometrics

and Data Protection Technologies

Supervisors Name: Dr. Ajay Kumar Student Name: Au Ka Po

Student Number: 10593042D

Contents

Introduction

Popular security technologies in Mainland China

Privacy issues in emerging technologies

Organization of Survey Studies

Survey and Analysis

Recommendations

Conclusions

2

Introduction

Background ◦ New challenges from technologies

◦ Potential privacy issues versus Benefits

◦ Smartphone and Internet access becomes popular,

malicious App also increases

Objectives 1. Investigate and evaluate the emerging privacy issues related

to technologies

2. Raise the awareness on privacy related challenges in the use popular technologies

3. Study the privacy concerns and attitude of general public about the use of Smartphone

3

Situation of using latest technologies

in China CCTV ◦ Beijing – cinema, supermarket, shopping mall

◦ Shanghai – 24 hours monitoring by 4000 people

◦ Chongqing – Total 3.1 hundred thousands

Biometrics – Fingerprint Identification ◦ Stored in identification card starts at Jan 2013

◦ Record foreigners who work or study in China

4

Situation of using latest technologies

in China Smartphone users : over 250 million

Penetration rate: over 67.7%

5

Introduction

Malware grew 163% in 2012

Infected 32.8M Android device

Infection Rate is the highest in

China

6

Privacy issues of using Smartphones

Privacy Invasion without consent

Modification of App – Wechat

◦ Connect with Trojan horse

◦ More than 160 versions of Wechat are modified

Advertisement pop up, costing money and stealing

password

◦ Download App from unofficial channel

◦ Apk files sent by IM Apps

7

Privacy issues of using Smartphone

Wechat App is suspected of monitoring chat history ◦ “Restricted words” pop up if users send the message

containing political content

◦ Hu Jia who is activist suspects

he was monitored when using it

Real personal information is required when ◦ Sign-up communication services or

◦ Publish blog or comment in blog or forum

8

Privacy issues of using technologies

Registering new account in Wechat

Hold ID card and take photo

9

Privacy issues of using technologies

Smartphone Vulnerabilities

Bypass password using system bugs

◦ iOS 6.1 - iphone

◦ Android 4.1.2 – Sony Xperia Z

Spoofing attack of biometrics

◦ Face recognition in Android 4.0.x

Photo and facemask of owners

10

Study using Survey

Online survey – 177 respondents Developed by PHP, MySQL

Managed by phpMyAdmin

Offline survey – 235 respondents Interview with people by face to face

Distribute to classmates

Privacy concerns - not willing to provide personal information

Entered the offline survey data to online system

All data was backed-up and secured

11

Study using Survey

phpmyAdmin

12

Study using Survey

Respondent background

Age

Gender

Education level

13

Survey & Analysis

IBM SPSS statistics 19

14

Survey & Analysis

Two Stop Cluster

15

Survey & Analysis

Distribution of Smartphone Platform

16

iOS

27%

Android

68%

Window

Phone

1%

Symbiam

2%

BlackBerry

1%

Not a

Smartphone

user

1%

0

0.5

1

Survey & Analysis

Criteria of choosing Smartphone OS

1. More Apps

2. Trendy

3. User friendliness

Few users choose

security reason

17

Survey & Analysis

Downloading App from unofficial ways

More Android device users do so

More iOS users think that it is not safe

18

0%

5%

10%

15%

20%

25%

30%

35% 32%

7% 9%

31%

5%

12%

4%

23%

15%

7%

25%

5%

20%

5%

iOS Android

Survey & Analysis

Keep using App if real personal information is needed?

Male are not willing to use

19

0%

10%

20%

30%

40%

50%

60%

70%

Yes No Not sure

Male

Female

Survey & Analysis

Altitude towards using privacy invasion App

20

0%

10%

20%

30%

40%

50%

60%

Whatsapp Line Wechat

Yes

No

Use carefully

Survey & Analysis

21

Checking permissions of App before downloading

• Half of iOS users

do not check

• None of Symbian users

will check

0%

10%

20%

30%

40%

50%

60%

Yes No Sometimes Not support this

function

16%

47%

33%

4%

16%

40% 41%

3% 0%

60%

20% 20%

iOS Android Symbiam

Survey & Analysis

Sharing location via Smartphone

1. Do not share

2. Restaurant

3. Travel Attractions

22

0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50% 47%

10% 9%

15%

1%

7%

11%

40%

16%

7%

11%

4% 6%

16%

Male Female

Survey & Analysis

23

Security lock preferred

1. Password

2. Simple

3. Fingerprint

0%

5%

10%

15%

20%

25%

30%

35%

40%

Simple

screen/key lock

Password Pattern Face

Recognition

Fingerprint

Identification

Iris Recognition Finger knuckle

25% 25%

0%

25%

0%

25%

0%

24%

11%

16%

11%

38%

0% 0%

28% 26%

29%

3%

12%

1% 1%

34%

38%

19%

5% 2%

0% 2%

Primary Secondary College or University Above University

Survey & Analysis

Reason of choosing biometrics lock

General - more secure

Primary & University

Not want to use

24

Survey & Analysis

Install Anti-virus App or not?

More Android users intalled

84% iOS users

do not install

25

Conclusions

Most Popular Reason for Selecting Smartphone OS mainly because of numbers of available Apps

More than half of the people do not delete the data in previous Smartphone after they have purchased a new Smartphone More chance of privacy violations

People with secondary education level prefer using Biometrics security lock for their Smartphone People with higher education may have

more concerns on Biometrics Privacy

26

Conclusions

20% of people do download App from

unofficial avenues and which gain the

privileged control of the phone

More Vulnerable !

26% of people do not enable any security

lock on the phone

More Vulnerable!

27

Recommendations

Apply Security Lock

Backup data regularly

Check update regularly to fix system bugs

Avoid modification of system unnecessarily

Carefully read the permission right of suspected Apps before downloading them

Download Apps from official avenues

◦ If not, make sure to install anti-virus App

Turn off unnecessary networking functions

◦ NFC, GPS, location services

28

References 1. “comScore Releases the ‘2012 Mobile Future in Focus’ Report - comScore, Inc.”[Online]. Available:

http://www.comscore.com/Insights/Press_Releases/2012/2/comScore_Releases_the_2012_Mobile_Future_in_Focus_Report. [Accessed: 25-April-2013].

2. “Social Media and Mobile in China: Smartphone users in China already exceeded 250 million people.” [Online]. Available: http://socialmediainasia.blogspot.hk/2012/06/smartphone-users-in-china-already.html. [Accessed: 16-March-2013].

3.

4. “Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says | TechCrunch.” [Online]. Available: http://techcrunch.com/2013/04/15/malware-on-mobile-grew-163-in-2012-infecting-around-32-8m-android-devices-report-says/. [Accessed: 23-April-2013].

5.

6. “Jailbreak! New Rules Allow Unapproved iPhone Apps | Fox News.” [Online]. Available: http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/. [Accessed: 07-April-2013].

7.

8. “Hack your Android like a pro: Rooting and ROMs explained | Android Atlas - CNET Reviews.” [Online]. Available: http://reviews.cnet.com/8301-19736_7-57578709-251/hack-your-android-like-a-pro-rooting-and-roms-explained/. [Accessed: 11-April-2013].

9.

10. “Custom ROMs For Android Explained - Here Is Why You Want Them.” [Online]. Available: http://www.androidpolice.com/2010/05/01/custom-roms-for-android-explained-and-why-you-want-them/. [Accessed: 19-April-2013].

29

Q & A section

Thank You!

30