SlideShare a Scribd company logo
1 of 9
Inferring Your Secrets from Android Public
Resources
Authors of this paper:
Xiaoyong Zhou1, Soteris Demetriou2, Dongjing He2, Muhammad Naveed2,
Xiaorui Pan1, XiaoFeng Wang1, Carl A. Gunter2, Klara Nahrstedt

Tao Sun
Who has an Android phone?

When install Android app, you will choose permissions

But what about a zero-permission app?
Could get our secret information?

YES!
Find where you are

How to get location information normally?
> Android guards such information with a permission ACCESS_FINE_LOCATION
> Websites that attempt to get it through a mobile browser
(using navigator.geolocation.getCurrentPosition), which is designed to ask for
user’s permission when this happens.

If the app do not have these two permits?
> Yes, we can use wifi BSSID
BSSID To Location
• The BSSID of a Wi-Fi hotspot and signal levels perceived
by the phone are disclosed by Android through procfs.
• The BSSID (in the /proc/net/arp file), which is essentially
the gateway’s MAC address, and wireless signal levels (in
the /proc/net/wireless file). Both files are accessible to a
zero-permission app.
• Google, Skyhook and Navizon has a BSSID database.

• Build a request use its app’s protocol and can get the
location Information.
Knowing where you go

• Speaker usage information is public
• Consider a GPS navigation app one uses when she is
driving.
• We can get the Audio status log and compare them with the
log in the database.

How to avoid it?
Listen to music…
Get Your Identity

Information leaks from public data usage statics
Here are two public files
/proc/uid_stat/[uid]/tcp_rcv
/proc/uid_stat/[uid]/tcp_snd,
which record the total numbers of bytes received and sent by a specific app
Respectively.
Your twitter leaks your id information
• A zero-permission app monitors the mobile data usage
count tcp_snd of the Twitter 3.6.0 app when it is running.

• When the user send tweets to the Twitter server, the app
detects this event and send its timestamp to the malicious
server stealthily.
• This gives us the account’s owner posts her tweets at the
moments recorded by these timestamps.
• Given a few of timestamps, we can uniquely identify that
user.
Your twitter leaks your id information

• From the tweeting events detected, we obtain a sequence
of timestamps T = [t1; t2; ; tn] that describe when the
phone user tweets. This sequence is then used to find out
the user’s Twitter ID from the public index of tweets. Such
an index can be accessed through the Twitter Search API.
• To collect relevant tweets, we need to get the phone’s geolocation, which is specified by a triplet (latitude, longitude,
radius) in the twitter search API. Here all we need is a
coarse location (at city level) to set these parameters.
Identity, Location, Disease and More: Inferring Your
Secrets from Android Public Resources

THANK YOU!

More Related Content

Viewers also liked

Slaid Tokoh Perniagaan
Slaid Tokoh PerniagaanSlaid Tokoh Perniagaan
Slaid Tokoh Perniagaannajmi98
 
A life story
A life storyA life story
A life storyllalma
 
Tokoh perniagaan
Tokoh perniagaanTokoh perniagaan
Tokoh perniagaanQurratu98
 
TZMI Presentation at International Titanium Association, Caesars Palace Las V...
TZMI Presentation at International Titanium Association, Caesars Palace Las V...TZMI Presentation at International Titanium Association, Caesars Palace Las V...
TZMI Presentation at International Titanium Association, Caesars Palace Las V...David McCoy
 
Funciones logicas en excel 2010 actividad tics
Funciones logicas en excel 2010  actividad ticsFunciones logicas en excel 2010  actividad tics
Funciones logicas en excel 2010 actividad ticsGrace Apellidos
 
Ejercicios área y volumen del cono, cilindro y esfera
Ejercicios área y volumen del cono, cilindro y esferaEjercicios área y volumen del cono, cilindro y esfera
Ejercicios área y volumen del cono, cilindro y esferaOrlando Batista Escobar
 
galería de fotos
galería de fotos galería de fotos
galería de fotos Milena Eraso
 
Hojas de vida y cartas de presentacion rolling discs
Hojas de vida y cartas de presentacion rolling discsHojas de vida y cartas de presentacion rolling discs
Hojas de vida y cartas de presentacion rolling discsViviana Caro
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologiaarmicho
 
LinkedIn’s Culture of Transformation
LinkedIn’s Culture of TransformationLinkedIn’s Culture of Transformation
LinkedIn’s Culture of TransformationPat Wadors
 

Viewers also liked (12)

Slaid Tokoh Perniagaan
Slaid Tokoh PerniagaanSlaid Tokoh Perniagaan
Slaid Tokoh Perniagaan
 
A life story
A life storyA life story
A life story
 
Tokoh perniagaan
Tokoh perniagaanTokoh perniagaan
Tokoh perniagaan
 
TZMI Presentation at International Titanium Association, Caesars Palace Las V...
TZMI Presentation at International Titanium Association, Caesars Palace Las V...TZMI Presentation at International Titanium Association, Caesars Palace Las V...
TZMI Presentation at International Titanium Association, Caesars Palace Las V...
 
Kế hoạch
Kế hoạchKế hoạch
Kế hoạch
 
Funciones logicas en excel 2010 actividad tics
Funciones logicas en excel 2010  actividad ticsFunciones logicas en excel 2010  actividad tics
Funciones logicas en excel 2010 actividad tics
 
Ejercicios área y volumen del cono, cilindro y esfera
Ejercicios área y volumen del cono, cilindro y esferaEjercicios área y volumen del cono, cilindro y esfera
Ejercicios área y volumen del cono, cilindro y esfera
 
galería de fotos
galería de fotos galería de fotos
galería de fotos
 
Hojas de vida y cartas de presentacion rolling discs
Hojas de vida y cartas de presentacion rolling discsHojas de vida y cartas de presentacion rolling discs
Hojas de vida y cartas de presentacion rolling discs
 
Tous creoles
Tous creolesTous creoles
Tous creoles
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologia
 
LinkedIn’s Culture of Transformation
LinkedIn’s Culture of TransformationLinkedIn’s Culture of Transformation
LinkedIn’s Culture of Transformation
 

Similar to Presentation

Final_Presentation_FlowDroid
Final_Presentation_FlowDroidFinal_Presentation_FlowDroid
Final_Presentation_FlowDroidKruti Sharma
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00srini0x00
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
 
JSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorialJSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorialSoham Sengupta
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Security on android
Security on androidSecurity on android
Security on androidpk464312
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportEran Goldstein
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesIOSR Journals
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesIOSR Journals
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 

Similar to Presentation (20)

Android malware
Android malwareAndroid malware
Android malware
 
Android malware
Android malwareAndroid malware
Android malware
 
Final_Presentation_FlowDroid
Final_Presentation_FlowDroidFinal_Presentation_FlowDroid
Final_Presentation_FlowDroid
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 
JSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorialJSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorial
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Security on android
Security on androidSecurity on android
Security on android
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
A017340104
A017340104A017340104
A017340104
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
 
C017211519
C017211519C017211519
C017211519
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 

Recently uploaded

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Presentation

  • 1. Inferring Your Secrets from Android Public Resources Authors of this paper: Xiaoyong Zhou1, Soteris Demetriou2, Dongjing He2, Muhammad Naveed2, Xiaorui Pan1, XiaoFeng Wang1, Carl A. Gunter2, Klara Nahrstedt Tao Sun
  • 2. Who has an Android phone? When install Android app, you will choose permissions But what about a zero-permission app? Could get our secret information? YES!
  • 3. Find where you are How to get location information normally? > Android guards such information with a permission ACCESS_FINE_LOCATION > Websites that attempt to get it through a mobile browser (using navigator.geolocation.getCurrentPosition), which is designed to ask for user’s permission when this happens. If the app do not have these two permits? > Yes, we can use wifi BSSID
  • 4. BSSID To Location • The BSSID of a Wi-Fi hotspot and signal levels perceived by the phone are disclosed by Android through procfs. • The BSSID (in the /proc/net/arp file), which is essentially the gateway’s MAC address, and wireless signal levels (in the /proc/net/wireless file). Both files are accessible to a zero-permission app. • Google, Skyhook and Navizon has a BSSID database. • Build a request use its app’s protocol and can get the location Information.
  • 5. Knowing where you go • Speaker usage information is public • Consider a GPS navigation app one uses when she is driving. • We can get the Audio status log and compare them with the log in the database. How to avoid it? Listen to music…
  • 6. Get Your Identity Information leaks from public data usage statics Here are two public files /proc/uid_stat/[uid]/tcp_rcv /proc/uid_stat/[uid]/tcp_snd, which record the total numbers of bytes received and sent by a specific app Respectively.
  • 7. Your twitter leaks your id information • A zero-permission app monitors the mobile data usage count tcp_snd of the Twitter 3.6.0 app when it is running. • When the user send tweets to the Twitter server, the app detects this event and send its timestamp to the malicious server stealthily. • This gives us the account’s owner posts her tweets at the moments recorded by these timestamps. • Given a few of timestamps, we can uniquely identify that user.
  • 8. Your twitter leaks your id information • From the tweeting events detected, we obtain a sequence of timestamps T = [t1; t2; ; tn] that describe when the phone user tweets. This sequence is then used to find out the user’s Twitter ID from the public index of tweets. Such an index can be accessed through the Twitter Search API. • To collect relevant tweets, we need to get the phone’s geolocation, which is specified by a triplet (latitude, longitude, radius) in the twitter search API. Here all we need is a coarse location (at city level) to set these parameters.
  • 9. Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources THANK YOU!