Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf ·...
Transcript of Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf ·...
Project Presentation
Addressing Privacy and Societal Challenges
from the Deployment of Emerging Biometrics
and Data Protection Technologies
Supervisors Name: Dr. Ajay Kumar Student Name: Au Ka Po
Student Number: 10593042D
Contents
Introduction
Popular security technologies in Mainland China
Privacy issues in emerging technologies
Organization of Survey Studies
Survey and Analysis
Recommendations
Conclusions
2
Introduction
Background ◦ New challenges from technologies
◦ Potential privacy issues versus Benefits
◦ Smartphone and Internet access becomes popular,
malicious App also increases
Objectives 1. Investigate and evaluate the emerging privacy issues related
to technologies
2. Raise the awareness on privacy related challenges in the use popular technologies
3. Study the privacy concerns and attitude of general public about the use of Smartphone
3
Situation of using latest technologies
in China CCTV ◦ Beijing – cinema, supermarket, shopping mall
◦ Shanghai – 24 hours monitoring by 4000 people
◦ Chongqing – Total 3.1 hundred thousands
Biometrics – Fingerprint Identification ◦ Stored in identification card starts at Jan 2013
◦ Record foreigners who work or study in China
4
Situation of using latest technologies
in China Smartphone users : over 250 million
Penetration rate: over 67.7%
5
Introduction
Malware grew 163% in 2012
Infected 32.8M Android device
Infection Rate is the highest in
China
6
Privacy issues of using Smartphones
Privacy Invasion without consent
Modification of App – Wechat
◦ Connect with Trojan horse
◦ More than 160 versions of Wechat are modified
Advertisement pop up, costing money and stealing
password
◦ Download App from unofficial channel
◦ Apk files sent by IM Apps
7
Privacy issues of using Smartphone
Wechat App is suspected of monitoring chat history ◦ “Restricted words” pop up if users send the message
containing political content
◦ Hu Jia who is activist suspects
he was monitored when using it
Real personal information is required when ◦ Sign-up communication services or
◦ Publish blog or comment in blog or forum
8
Privacy issues of using technologies
Registering new account in Wechat
Hold ID card and take photo
9
Privacy issues of using technologies
Smartphone Vulnerabilities
Bypass password using system bugs
◦ iOS 6.1 - iphone
◦ Android 4.1.2 – Sony Xperia Z
Spoofing attack of biometrics
◦ Face recognition in Android 4.0.x
Photo and facemask of owners
10
Study using Survey
Online survey – 177 respondents Developed by PHP, MySQL
Managed by phpMyAdmin
Offline survey – 235 respondents Interview with people by face to face
Distribute to classmates
Privacy concerns - not willing to provide personal information
Entered the offline survey data to online system
All data was backed-up and secured
11
Study using Survey
phpmyAdmin
12
Study using Survey
Respondent background
Age
Gender
Education level
13
Survey & Analysis
IBM SPSS statistics 19
14
Survey & Analysis
Two Stop Cluster
15
Survey & Analysis
Distribution of Smartphone Platform
16
iOS
27%
Android
68%
Window
Phone
1%
Symbiam
2%
BlackBerry
1%
Not a
Smartphone
user
1%
0
0.5
1
Survey & Analysis
Criteria of choosing Smartphone OS
1. More Apps
2. Trendy
3. User friendliness
Few users choose
security reason
17
Survey & Analysis
Downloading App from unofficial ways
More Android device users do so
More iOS users think that it is not safe
18
0%
5%
10%
15%
20%
25%
30%
35% 32%
7% 9%
31%
5%
12%
4%
23%
15%
7%
25%
5%
20%
5%
iOS Android
Survey & Analysis
Keep using App if real personal information is needed?
Male are not willing to use
19
0%
10%
20%
30%
40%
50%
60%
70%
Yes No Not sure
Male
Female
Survey & Analysis
Altitude towards using privacy invasion App
20
0%
10%
20%
30%
40%
50%
60%
Whatsapp Line Wechat
Yes
No
Use carefully
Survey & Analysis
21
Checking permissions of App before downloading
• Half of iOS users
do not check
• None of Symbian users
will check
0%
10%
20%
30%
40%
50%
60%
Yes No Sometimes Not support this
function
16%
47%
33%
4%
16%
40% 41%
3% 0%
60%
20% 20%
iOS Android Symbiam
Survey & Analysis
Sharing location via Smartphone
1. Do not share
2. Restaurant
3. Travel Attractions
22
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50% 47%
10% 9%
15%
1%
7%
11%
40%
16%
7%
11%
4% 6%
16%
Male Female
Survey & Analysis
23
Security lock preferred
1. Password
2. Simple
3. Fingerprint
0%
5%
10%
15%
20%
25%
30%
35%
40%
Simple
screen/key lock
Password Pattern Face
Recognition
Fingerprint
Identification
Iris Recognition Finger knuckle
25% 25%
0%
25%
0%
25%
0%
24%
11%
16%
11%
38%
0% 0%
28% 26%
29%
3%
12%
1% 1%
34%
38%
19%
5% 2%
0% 2%
Primary Secondary College or University Above University
Survey & Analysis
Reason of choosing biometrics lock
General - more secure
Primary & University
Not want to use
24
Survey & Analysis
Install Anti-virus App or not?
More Android users intalled
84% iOS users
do not install
25
Conclusions
Most Popular Reason for Selecting Smartphone OS mainly because of numbers of available Apps
More than half of the people do not delete the data in previous Smartphone after they have purchased a new Smartphone More chance of privacy violations
People with secondary education level prefer using Biometrics security lock for their Smartphone People with higher education may have
more concerns on Biometrics Privacy
26
Conclusions
20% of people do download App from
unofficial avenues and which gain the
privileged control of the phone
More Vulnerable !
26% of people do not enable any security
lock on the phone
More Vulnerable!
27
Recommendations
Apply Security Lock
Backup data regularly
Check update regularly to fix system bugs
Avoid modification of system unnecessarily
Carefully read the permission right of suspected Apps before downloading them
Download Apps from official avenues
◦ If not, make sure to install anti-virus App
Turn off unnecessary networking functions
◦ NFC, GPS, location services
28
References 1. “comScore Releases the ‘2012 Mobile Future in Focus’ Report - comScore, Inc.”[Online]. Available:
http://www.comscore.com/Insights/Press_Releases/2012/2/comScore_Releases_the_2012_Mobile_Future_in_Focus_Report. [Accessed: 25-April-2013].
2. “Social Media and Mobile in China: Smartphone users in China already exceeded 250 million people.” [Online]. Available: http://socialmediainasia.blogspot.hk/2012/06/smartphone-users-in-china-already.html. [Accessed: 16-March-2013].
3.
4. “Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says | TechCrunch.” [Online]. Available: http://techcrunch.com/2013/04/15/malware-on-mobile-grew-163-in-2012-infecting-around-32-8m-android-devices-report-says/. [Accessed: 23-April-2013].
5.
6. “Jailbreak! New Rules Allow Unapproved iPhone Apps | Fox News.” [Online]. Available: http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/. [Accessed: 07-April-2013].
7.
8. “Hack your Android like a pro: Rooting and ROMs explained | Android Atlas - CNET Reviews.” [Online]. Available: http://reviews.cnet.com/8301-19736_7-57578709-251/hack-your-android-like-a-pro-rooting-and-roms-explained/. [Accessed: 11-April-2013].
9.
10. “Custom ROMs For Android Explained - Here Is Why You Want Them.” [Online]. Available: http://www.androidpolice.com/2010/05/01/custom-roms-for-android-explained-and-why-you-want-them/. [Accessed: 19-April-2013].
29
Q & A section
Thank You!
30