attacks countermeasures of ultrasonic cross device
play

Attacks & Countermeasures of Ultrasonic Cross-Device Tracking - PowerPoint PPT Presentation

Talking Behind Your Back Attacks & Countermeasures of Ultrasonic Cross-Device Tracking Federico ico Maggi Vasil ilio ios Mavroud udis is Assistant Professor POLIMI Doctoral Researcher UCL Visiting Researcher UCSB Who we are The


  1. Talking Behind Your Back Attacks & Countermeasures of Ultrasonic Cross-Device Tracking Federico ico Maggi Vasil ilio ios Mavroud udis is Assistant Professor POLIMI Doctoral Researcher UCL Visiting Researcher UCSB

  2. Who we are

  3. The Story of a Product   

  4. The Story of a Product    

  5. The Story of a Product     

  6. FTC Cross-Device Tracking Workshop, Nov 16, 2015 (Washington, DC)

  7. The Story of a Product      

  8. Unhappy Proactive

  9. Unhappy Proactive Unconcerned

  10. The Story of a Product       

  11. The Story of a Product        

  12. Not the End of our Story: The Tip of the Iceberg     

  13. Contents     

  14. The Ultrasound Tracking Ecosystem     

  15. Cross-Device Tracking, XDT: Overview XDT

  16. Cross-Device Tracking, XDT: Details      

  17. Ultrasound Beacons: uBeacons     

  18. uBeacons: Technical Details       

  19. uBeacons: Practical Details    

  20. XDT + uBeacons = uXDT

  21. Ultrasound Cross-Device Tracking       

  22. Ultrasound Cross-Device Tracking

  23. Ultrasound Cross-Device Tracking

  24. Ultrasound Cross-Device Tracking  

  25. Proximity Marketing      

  26. Other Use Cases       

  27. But how secure is this?

  28. Exploitation!    

  29. Setting the Scene    

  30. The Attacker ’ s s Toolchest    

  31. The Attacker ’ s s Toolchest  

  32. The Tor de-anonymization Attack

  33. The Tor de-anonymization Attack

  34. The Demo Explained      

  35. The Demo: Simulated State-level Adversary  

  36. The Demo: Simulated State-level Adversary

  37. Some More Attacks     

  38. Security Evaluation    

  39. Security Evaluation     

  40. Security Evaluation    

  41. Security Evaluation     

  42. Security Evaluation    

  43. May 10, 2016

  44. Aug 31, 2016

  45. July 19, 2016

  46. Oct 17, 2016

  47. Market Penetration        

  48. Countermeasures

  49. Browser Extension      

  50. Android Permission     

  51. Tor Bug Tracker

  52. Securing the Ecosystem     

  53. Securing the Ecosystem      

  54. Conclusions: What we did      

  55. Conclusions: What ’ s left to do!     

  56. Conclusions: What ’ s left to do!       

  57. Q & A

  58. ubeacsec.org

Recommend


More recommend