skip to main content
10.1145/2906388.2906392acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

Published:20 June 2016Publication History

ABSTRACT

It is well known that apps running on mobile devices extensively track and leak users' personally identifiable information (PII); however, these users have little visibility into PII leaked through the network traffic generated by their devices, and have poor control over how, when and where that traffic is sent and handled by third parties. In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. ReCon leverages machine learning to reveal potential PII leaks by inspecting network traffic, and provides a visualization tool to empower users with the ability to control these leaks via blocking or substitution of PII. We evaluate ReCon's effectiveness with measurements from controlled experiments using leaks from the 100 most popular iOS, Android, and Windows Phone apps, and via an IRB-approved user study with 92 participants. We show that ReCon is accurate, efficient, and identifies a wider range of PII than previous approaches.

References

  1. Ad blocking with ad server hostnames and ip addresses. http://pgl.yoyo.org/adservers/.Google ScholarGoogle Scholar
  2. App Annie App Store Stats. http://www.appannie.com/.Google ScholarGoogle Scholar
  3. AppsApk.com. http://www.appsapk.com/.Google ScholarGoogle Scholar
  4. AwaZza. http://www.awazza.com/web/.Google ScholarGoogle Scholar
  5. Bro: a System for Detecting Network Intruders in Real-Time. https://www.bro.org.Google ScholarGoogle Scholar
  6. Epocrates upgrade message. https://www.epocrates.com/support/upgrade/message-full.Google ScholarGoogle Scholar
  7. Lightbeam for Firefox. http://www.mozilla.org/en-US/lightbeam/.Google ScholarGoogle Scholar
  8. Meddle IRB consent form. https://docs.google.com/forms/d/1Y-xNg7cJxRnlTjH_56KUcKB_6naTfRLqQlcZmHtn5IY/viewform.Google ScholarGoogle Scholar
  9. SSLsplit - transparent and scalable SSL/TLS interception. http://www.roe.ch/SSLsplit.Google ScholarGoogle Scholar
  10. Tcpdump. http://www.tcpdump.org/.Google ScholarGoogle Scholar
  11. UI/Application Exerciser Monkey. https://developer.android.com/tools/help/monkey.html.Google ScholarGoogle Scholar
  12. Y. Agarwal and M. Hall. ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowdsourcing. In Proc. of MobiSys, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In Proc. of PLDI, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. Azim and I. Neamtiu. Targeted and Depth-first Exploration for Systematic Testing of Android Apps. In Proc. of OOPSLA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen. "Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones. In Proc. of SOUPS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Bell and G. Kaiser. Phosphor: Illuminating Dynamic Data Flow in Commodity JVMs. In Proc. of OOPSLA, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Book and D. S. Wallach. A Case of Collusion: A Study of the Interface Between Ad Libraries and Their Apps. In Proc. of ACM SPSM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Y. Cao, Y. Fratantonio, A. Bianchi, M. Egele, C. Kruegel, G. Vigna, and Y. Chen. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. In Proc. of NDSS, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  19. X. Chen and S. Zhu. DroidJust: Automated Functionality-aware Privacy Leakage Analysis for Android Applications. In Proc. of WiSec, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. R. Choudhary, A. Gorla, and A. Orso. Automated Test Input Generation for Android: Are We There Yet? In Proc. of the IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis, and D. Avrahami. The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi. In Proc. of UbiComp, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Crussell, R. Stevens, and H. Chen. MAdFraud: Investigating Ad Fraud in Android Applications. In Proc. of MobiSys, pages 123--134. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proc. of NDSS, 2011.Google ScholarGoogle Scholar
  24. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of USENIX OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. C. Gibler, J. Crussell, J. Erickson, and H. Chen. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. In Proc. of TRUST, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. Gill, V. Erramilli, A. Chaintreau, B. Krishnamurthy, D. Papagiannaki, and P. Rodriguez. Follow the Money: Understanding Economics of Online Aggregation and Advertising. In Proc. of IMC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe Exposure Analysis of Mobile In-app Advertisements. In Proc. of WiSec, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The WEKA Data Mining Software: An Update. ACM SIGKDD Explorations Newsletter, 11(1):10--18, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Han, J. Jung, and D. Wetherall. A Study of Third-Party Tracking by Mobile Apps in the Wild. Technical Report UW-CSE-12-03-01, University of Washington, 2012.Google ScholarGoogle Scholar
  30. S. Hao, B. Liu, S. Nath, W. G. Halfond, and R. Govindan. PUMA: Programmable UI-automation for Large-scale Dynamic Analysis of Mobile Apps. In Proc. of MobiSys, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Hao, B. Liu, S. Nath, W. G. Halfond, and R. Govindan. PUMA: Programmable UI-Automation for Large-Scale Dynamic Analysis of Mobile Apps. In Proc. of MobiSys, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Z. Harris. Distributional structure. Word, 10(23):146--162, 1954.Google ScholarGoogle ScholarCross RefCross Ref
  33. R. Herbster, S. DellaTorre, P. Druschel, and B. Bhattacharjee. Privacy capsules: Preventing information leaks by mobile apps. In Proc. of MobiSys, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. "These Aren't the Droids You're Looking For": Retrofitting Android to Protect Data from Imperious Applications. In Proc. of ACM CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Huber, M. Mulazzani, S. Schrittwieser, and E. Weippl. Appinspect: Large-scale Evaluation of Social Networking Apps. In Proc. of ACM COSN, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Jagabathula, L. Subramanian, and A. Venkataraman. Reputation-based worker filtering in crowdsourcing. In Advances in Neural Information Processing Systems, pages 2492--2500, 2014.Google ScholarGoogle Scholar
  37. J. Jeon, K. K. Micinski, and J. S. Foster. SymDroid: Symbolic Execution for Dalvik Bytecode. Technical Report CS-TR-5022, University of Maryland, College Park, 2012.Google ScholarGoogle Scholar
  38. C. Johnson, III. US Office of Management and Budget Memorandum M-07-16. http://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2007/m07--16.pdf, May 2007.Google ScholarGoogle Scholar
  39. J. Kim, Y. Yoon, K. Yi, and J. Shin. SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications. In Proc. of MoST, 2012.Google ScholarGoogle Scholar
  40. H. King. No. 1 paid app on iTunes taken down by developer. http://money.cnn.com/2015/09/18/technology/peace-ad-blocking-app-pulled/index.html, September 2015.Google ScholarGoogle Scholar
  41. B. Krishnamurthy and C. Wills. Privacy Diffusion on the Web: A Longitudinal Perspective. In Proc. of ACM WWW, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. A. Le, J. Varmarken, S. Langhoff, A. Shuba, M. Gjoka, and A. Markopoulou. AntMonitor: A system for monitoring from mobile devices. In Proc. of Wrokshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo. Don't kill my ads! Balancing Privacy in an Ad-Supported Mobile Application Market. In Proc. of ACM HotMobile, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, and C. Platzer. Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In Proc. of BADGERS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Y. Liu, H. H. Song, I. Bermudez, A. Mislove, M. Baldi, and A. Tongaonkar. Identifying personal information in internet traffic. In Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15), Palo Alto, CA, November 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In Proc. of ACM CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. A. Machiry, R. Tahiliani, and M. Naik. Dynodroid: An Input Generation System for Android Apps. In Proc. of the Joint Meeting on Foundations of Software Engineering (ESEC/FSE), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. D. Naylor, K. Schomp, M. Varvello, I. Leontiadis, J. Blackburn, D. R. López, K. Papagiannaki, P. Rodriguez Rodriguez, and P. Steenkiste. Multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS. In Proc. of ACM SIGCOMM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. A. Rao, A. M. Kakhki, A. Razaghpanah, A. Tang, S. Wang, J. Sherry, P. Gill, A. Krishnamurthy, A. Legout, A. Mislove, and D. Choffnes. Using the Middle to Meddle with Mobile. Technical report, Northeastern University, 2013.Google ScholarGoogle Scholar
  50. V. Rastogi, Z. Qu, J. McClurg, Y. Cao, Y. Chen, W. Zhu, and W. Chen. Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android (to appear). In Proc. of SecureComm, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  51. A. Razaghpanah, N. Vallina-Rodriguez, S. Sundaresan, C. Kreibich, P. Gill, M. Allman, and V. Paxson. Haystack: In Situ Mobile Traffic Analysis in User Space. arXiv preprint arXiv:1510.01419, 2015.Google ScholarGoogle Scholar
  52. J. Ren, A. Rao, M. Lindorfer, A. Legout, and D. R. Choffnes. ReCon: Revealing and controlling privacy leaks in mobile network traffic. CoRR, abs/1507.00255, 2015.Google ScholarGoogle Scholar
  53. F. Roesner, T. Kohno, and D. Wetherall. Detecting and Defending Against Third-Party Tracking on the Web. Proc. of USENIX NSDI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Sandvine. Global Internet Phenomena Report. https://www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet- phenomena-report.pdf, 1H 2014.Google ScholarGoogle Scholar
  55. J. Sherry, C. Lan, R. A. Popa, and S. Ratnasamy. BlindBox: Deep packet inspection over encrypted traffic. In Proc. of ACM SIGCOMM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Y. Song and U. Hengartner. PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices (to appear). In Proc. of ACM SPSM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. The Wall Street Journal. What They Know - Mobile. http://blogs.wsj.com/wtk-mobile/, December 2010.Google ScholarGoogle Scholar
  58. N. Vallina-Rodriguez, J. Shah, A. Finamore, H. Haddadi, Y. Grunenberger, K. Papagiannaki, and J. Crowcroft. Breaking for Commercials: Characterizing Mobile Advertising. In Proc. of IMC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. M. Xia, L. Gong, Y. Lyu, Z. Qi, and X. Liu. Effective Real-time Android Application Auditing. In IEEE Symposium on Security and Privacy, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. N. Xia, H. H. Song, Y. Liao, M. Iliofotou, A. Nucci, Z.-L. Zhang, and A. Kuzmanovic. Mosaic: Quantifying Privacy Leakage in Mobile Networks. In Proc. of ACM SIGCOMM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. L. K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proc. of USENIX Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang. AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection. In Proc. of ACM CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang. Vetting undesirable behaviors in Android apps with permission use analysis. In Proc. of ACM CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo, and F. Massacci. StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. In Proc. of ACM CODASPY, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MobiSys '16: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
              June 2016
              440 pages
              ISBN:9781450342698
              DOI:10.1145/2906388

              Copyright © 2016 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 20 June 2016

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              MobiSys '16 Paper Acceptance Rate31of197submissions,16%Overall Acceptance Rate274of1,679submissions,16%

              Upcoming Conference

              MOBISYS '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            ePub

            View this article in ePub.

            View ePub