Talking Behind Your Back Attacks & Countermeasures of Ultrasonic Cross-Device Tracking Federico ico Maggi Vasil ilio ios Mavroud udis is Assistant Professor POLIMI Doctoral Researcher UCL Visiting Researcher UCSB
Who we are
The Story of a Product
The Story of a Product
The Story of a Product
FTC Cross-Device Tracking Workshop, Nov 16, 2015 (Washington, DC)
The Story of a Product
Unhappy Proactive
Unhappy Proactive Unconcerned
The Story of a Product
The Story of a Product
Not the End of our Story: The Tip of the Iceberg
Contents
The Ultrasound Tracking Ecosystem
Cross-Device Tracking, XDT: Overview XDT
Cross-Device Tracking, XDT: Details
Ultrasound Beacons: uBeacons
uBeacons: Technical Details
uBeacons: Practical Details
XDT + uBeacons = uXDT
Ultrasound Cross-Device Tracking
Ultrasound Cross-Device Tracking
Ultrasound Cross-Device Tracking
Ultrasound Cross-Device Tracking
Proximity Marketing
Other Use Cases
But how secure is this?
Exploitation!
Setting the Scene
The Attacker ’ s s Toolchest
The Attacker ’ s s Toolchest
The Tor de-anonymization Attack
The Tor de-anonymization Attack
The Demo Explained
The Demo: Simulated State-level Adversary
The Demo: Simulated State-level Adversary
Some More Attacks
Security Evaluation
Security Evaluation
Security Evaluation
Security Evaluation
Security Evaluation
May 10, 2016
Aug 31, 2016
July 19, 2016
Oct 17, 2016
Market Penetration
Countermeasures
Browser Extension
Android Permission
Tor Bug Tracker
Securing the Ecosystem
Securing the Ecosystem
Conclusions: What we did
Conclusions: What ’ s left to do!
Conclusions: What ’ s left to do!
Q & A
ubeacsec.org
Recommend
More recommend