SlideShare a Scribd company logo
1 of 15
An Empirical Assessment of Global COVID-19
Contact Tracing Applications
ICSE’21
https://arxiv.org/abs/2006.10933
Ruoxi Sun*, Wei Wang*, Minhui Xue*,
Gareth Tyson+, Seyit Camtepe$, Damith C. Ranasinghe*
* The University of Adelaide
+ Queen Mary University of London
$ CSIRO-Data61
Motivation
• The rapid spread of COVID-19 has made
traditional manual contact tracing challenging.
• A number of public health authorities have
experimented with automated contact tracing
apps.
• These apps have raised security and privacy
concerns.
Main Contributions
We develop COVIDGuardian, the first automated security
and privacy assessment tool that tests contact tracing apps.
We assess the security and privacy status of 40 worldwide
Android contact tracing apps.
We identify 4 major privacy and security threats against
contact tracing apps.
We also conduct a user study involving 373 participants, to
investigate user concerns and requirements.
We have disclosed our security and privacy assessment
reports to the related stakeholders.
Overview
Centralized Decentralized
• Collects the contact records from
diagnosed users
• Evaluates health status by server
• Collects the token of diagnosed users
• Evaluates health status by users
Contact Tracing Applications
Google and Apple
NHS COVID-19, UK
Corona Warn App, Germany
TraceTogether, Singapore
COVIDSafe, Australia
StopCovid, France
Security Assessment
Security Assessment - Methodology
An overview of our security and privacy assessment methodology
COVIDGuardian
Security Assessment - Results
• Use at least one deprecated cryptographic algorithm (73%)
• Allow “Clear Text Storage” (55%)
• Allow Backup (43%)
• Contain trackers (75%)
• The top sources of sensitive data: Location and
database.Cursor
• Most of the sensitive data will be transferred to sinks, such as
Bundle, Service, and OutputStream
• Some apps transmit location information through SMS
messages
• We discovered one application, Stop COVID-19 KG (Kyrgyzstan),
containing malware.
Security Assessment – Regression Testing
• One month after disclosing our findings with the
developers, we re-checked the new versions of contact
tracing apps.
• Fixed security issues - TraceTogether, BluZone, STOP
COVID19 Cat
• Removed trackers - Mysejahtera
• No longer available in Play Store - Contact Tracer
• New vulnerabilities are identified in some apps
• The urgency of app developments may impact quality
assurance procedures
Privacy Risk Evaluation – Potential Attacks
Linkage attack by the server Linkage attack by users
False-positive claims Relay attack
Privacy Risk Evaluation - User Privacy Exposure
- Secure, No data is shared with a server or users;
- Medium-risk, Non-PII tokens are shared with proximity users;
- Medium-risk, Non-PII tokens are shared with the server;
- High-risk, PII is shared with a server;
- Highest-risk, PII is released to public.
- The system is well protected
- The system is at-risk
- Inadequate information to conduct an assessment
- Centralized system
- Decentralized system
User Study - Design
• 373 volunteers in Australia
• Age - 18-29 years old
• Nationality - 58% Oceania, 20% Asia
• Gender - 59% female, 39% male
• Education - 30% high school, 67% university graduates
Participants Survey Protocol
• Questionnaire with 5-point Likert scale questions
• Pencil-and-paper and online
• Likelihood of using contact tracing apps
• Functionality scenarios
• Accuracy of proximity contact detection
• Accuracy of at-risk alarm
• Privacy scenarios
• PII leakage
• Provide data to authorities if diagnosed
• Concerns about use of contact tracing apps
• Usability
• Effectiveness
• Concerns about privacy
Privacy Scenarios
• Type A - Centralized, PII collected
• Type B - Centralized, non-PII collected
• Type C - Decentralized, PII collected
• Type D - Decentralized, non-PII collected
User Study - Results
- Extremely likely
- Extremely unlikely
- Extremely likely
- Extremely unlikely
- Extremely unconcerned
- Extremely concerned
• Privacy design and tracing accuracy impact the
likelihood of app use.
• Users are more likely to accept and use apps
with better privacy by design.
• If PII data is collected, users prefer a
centralized solution
Future Works
• Examine Bluetooth Low Energy and network
traffic originating from contact tracing
• Examine any vulnerabilities associated with iOS
counterparts.
Thank you!
Ruoxi Sun
ruoxi.sun@adelaide.edu.au
Supervised by Minhui (Jason) Xue
jason.xue@adelaide.edu.au

More Related Content

What's hot

5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication SuccessSpok
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSupporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSaama
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationMedigate
 
LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to productionЮрий Чудинов
 
EMR Implementation Considerations Slides
EMR Implementation Considerations SlidesEMR Implementation Considerations Slides
EMR Implementation Considerations SlidesPiLNAfrica
 
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2matthewabq
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsBugRaptors
 
AppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User ExperienceAppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User ExperiencePaul Davenport
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesHealthegy
 

What's hot (17)

JP Mainguy Resume 2015
JP Mainguy Resume 2015JP Mainguy Resume 2015
JP Mainguy Resume 2015
 
Presentation
PresentationPresentation
Presentation
 
5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSupporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
Lob app-12012018
Lob app-12012018Lob app-12012018
Lob app-12012018
 
LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to production
 
EMR Implementation Considerations Slides
EMR Implementation Considerations SlidesEMR Implementation Considerations Slides
EMR Implementation Considerations Slides
 
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber Threats
 
Habib NISO Altmetrics Dec 2013
Habib NISO Altmetrics Dec 2013Habib NISO Altmetrics Dec 2013
Habib NISO Altmetrics Dec 2013
 
AppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User ExperienceAppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User Experience
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
 

Similar to An empirical assessment of global covid 19 contact tracing applications icse2021

Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRARDC
 
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...Edge AI and Vision Alliance
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security EssentialsSkoda Minotti
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017Ansgar Koene
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityIJCSIS Research Publications
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera readyMark Sinclair
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 

Similar to An empirical assessment of global covid 19 contact tracing applications icse2021 (20)

Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
APF2015-slides-general
APF2015-slides-generalAPF2015-slides-general
APF2015-slides-general
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security Essentials
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
Covid Safe Paths
Covid Safe PathsCovid Safe Paths
Covid Safe Paths
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Burton - Security, Privacy and Trust
Burton - Security, Privacy and TrustBurton - Security, Privacy and Trust
Burton - Security, Privacy and Trust
 

Recently uploaded

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naJASISJULIANOELYNV
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 

Recently uploaded (20)

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 

An empirical assessment of global covid 19 contact tracing applications icse2021

  • 1. An Empirical Assessment of Global COVID-19 Contact Tracing Applications ICSE’21 https://arxiv.org/abs/2006.10933 Ruoxi Sun*, Wei Wang*, Minhui Xue*, Gareth Tyson+, Seyit Camtepe$, Damith C. Ranasinghe* * The University of Adelaide + Queen Mary University of London $ CSIRO-Data61
  • 2. Motivation • The rapid spread of COVID-19 has made traditional manual contact tracing challenging. • A number of public health authorities have experimented with automated contact tracing apps. • These apps have raised security and privacy concerns.
  • 3. Main Contributions We develop COVIDGuardian, the first automated security and privacy assessment tool that tests contact tracing apps. We assess the security and privacy status of 40 worldwide Android contact tracing apps. We identify 4 major privacy and security threats against contact tracing apps. We also conduct a user study involving 373 participants, to investigate user concerns and requirements. We have disclosed our security and privacy assessment reports to the related stakeholders.
  • 5. Centralized Decentralized • Collects the contact records from diagnosed users • Evaluates health status by server • Collects the token of diagnosed users • Evaluates health status by users Contact Tracing Applications Google and Apple NHS COVID-19, UK Corona Warn App, Germany TraceTogether, Singapore COVIDSafe, Australia StopCovid, France
  • 7. Security Assessment - Methodology An overview of our security and privacy assessment methodology COVIDGuardian
  • 8. Security Assessment - Results • Use at least one deprecated cryptographic algorithm (73%) • Allow “Clear Text Storage” (55%) • Allow Backup (43%) • Contain trackers (75%) • The top sources of sensitive data: Location and database.Cursor • Most of the sensitive data will be transferred to sinks, such as Bundle, Service, and OutputStream • Some apps transmit location information through SMS messages • We discovered one application, Stop COVID-19 KG (Kyrgyzstan), containing malware.
  • 9. Security Assessment – Regression Testing • One month after disclosing our findings with the developers, we re-checked the new versions of contact tracing apps. • Fixed security issues - TraceTogether, BluZone, STOP COVID19 Cat • Removed trackers - Mysejahtera • No longer available in Play Store - Contact Tracer • New vulnerabilities are identified in some apps • The urgency of app developments may impact quality assurance procedures
  • 10. Privacy Risk Evaluation – Potential Attacks Linkage attack by the server Linkage attack by users False-positive claims Relay attack
  • 11. Privacy Risk Evaluation - User Privacy Exposure - Secure, No data is shared with a server or users; - Medium-risk, Non-PII tokens are shared with proximity users; - Medium-risk, Non-PII tokens are shared with the server; - High-risk, PII is shared with a server; - Highest-risk, PII is released to public. - The system is well protected - The system is at-risk - Inadequate information to conduct an assessment - Centralized system - Decentralized system
  • 12. User Study - Design • 373 volunteers in Australia • Age - 18-29 years old • Nationality - 58% Oceania, 20% Asia • Gender - 59% female, 39% male • Education - 30% high school, 67% university graduates Participants Survey Protocol • Questionnaire with 5-point Likert scale questions • Pencil-and-paper and online • Likelihood of using contact tracing apps • Functionality scenarios • Accuracy of proximity contact detection • Accuracy of at-risk alarm • Privacy scenarios • PII leakage • Provide data to authorities if diagnosed • Concerns about use of contact tracing apps • Usability • Effectiveness • Concerns about privacy Privacy Scenarios • Type A - Centralized, PII collected • Type B - Centralized, non-PII collected • Type C - Decentralized, PII collected • Type D - Decentralized, non-PII collected
  • 13. User Study - Results - Extremely likely - Extremely unlikely - Extremely likely - Extremely unlikely - Extremely unconcerned - Extremely concerned • Privacy design and tracing accuracy impact the likelihood of app use. • Users are more likely to accept and use apps with better privacy by design. • If PII data is collected, users prefer a centralized solution
  • 14. Future Works • Examine Bluetooth Low Energy and network traffic originating from contact tracing • Examine any vulnerabilities associated with iOS counterparts.
  • 15. Thank you! Ruoxi Sun ruoxi.sun@adelaide.edu.au Supervised by Minhui (Jason) Xue jason.xue@adelaide.edu.au

Editor's Notes

  1. Hello everyone, I’m Ruoxi Sun from University of Adelaide, Australia. Today I’d like to present our research “Vetting s….”
  2. The motivation of our research is that While the global deployment of contact tracing apps aims to protect the health of citizens, these apps have raised security and privacy concerns
  3. The motivation of our research is that While the global deployment of contact tracing apps aims to protect the health of citizens, these apps have raised security and privacy concerns
  4. We assess the security performance of 34 worldwide Android contact tracing applications. We conducted code analysis using MobSF, dataflow analysis with FlowDroid and malware dectection using virustotal to evaluation Mainifest weakness, vulnerabilities, privacy leaks and malware
  5. At first, we look at into 10 solutions from 7 countries worldwide. In centralized solutions, there is a central server which Collects the contact records from diagnosed users And use this information evaluate users’ health status, and send out alarms to at-risk users. While in decentralized solution, users will download the diagnosed tokens from the back end server and match with local records to know if they are at-risk.
  6. We assess the security performance of 34 worldwide Android contact tracing applications. We conducted code analysis using MobSF, dataflow analysis with FlowDroid and malware dectection using virustotal to evaluation Mainifest weakness, vulnerabilities, privacy leaks and malware
  7. We assess the security performance of 34 worldwide Android contact tracing applications. We conducted code analysis using MobSF, dataflow analysis with FlowDroid and malware dectection using virustotal to evaluation Mainifest weakness, vulnerabilities, privacy leaks and malware
  8. The result shows that Over 90% of apps use at least one insecure cryptographic algorithms. Another frequent weakness is “Clear Text Storage” We found that about three quarters of apps contain at least one tracker which may leak user’s privacy. The data flow analysis shows that sensitive information may leak from sources to sinks, such as leak location information to output stream. Some apps even transmit location information through messages, which is extremely dangerous as other apps could also access the message sending box.
  9. We have disclosed our findings to related stakeholders received acknowledgements from numerous vendors Here is the results of regression testing, some apps do improve their security performance in updated versions.
  10. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  11. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  12. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  13. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  14. In future, we plan to examine BLE and network traffic and any vulnerabilities associated with iOS counterparts.