Skip to main content

2018 | OriginalPaper | Buchkapitel

When Harry Met Tinder: Security Analysis of Dating Apps on Android

verfasst von : Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the number of smartphone users has increased, so has the popularity of dating apps such as Tinder, Hinge, Grindr and Bumbler. At the same time, however, many users have growing privacy concerns about these applications disclosing their sensitive and private information to other service providers and/or strangers. This is particularly exacerbated due to the nature of dating apps requiring access to users’ personal contents such as chat messages, photos, video clips and locations. In this paper, we present an analysis of security and privacy issues in popular dating apps on Android. We carefully analyze the possibility of software vulnerabilities on the five most popular dating apps on Android through network traffic analyses and reverse engineering techniques for each dating app. Our experiment results demonstrate that user credential data can be stolen from all five applications; three apps may lead to the disclosure of user profiles, and one app may lead to the disclosure of chat messages.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
8.
Zurück zum Zitat Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the Conference on Computer and Communications Security (2012) Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the Conference on Computer and Communications Security (2012)
10.
Zurück zum Zitat Cho, J., Kim, D., Kim, H.: User credential cloning attacks in android applications: exploiting automatic login on android apps and mitigating strategies. IEEE Consum. Electron. Mag. 7(3), 48–55 (2018)CrossRef Cho, J., Kim, D., Kim, H.: User credential cloning attacks in android applications: exploiting automatic login on android apps and mitigating strategies. IEEE Consum. Electron. Mag. 7(3), 48–55 (2018)CrossRef
11.
Zurück zum Zitat Cobb, C., Kohno, T.: How public is my private life?: privacy in online dating. In: Proceedings of the 26th International Conference on World Wide Web (2017) Cobb, C., Kohno, T.: How public is my private life?: privacy in online dating. In: Proceedings of the 26th International Conference on World Wide Web (2017)
12.
Zurück zum Zitat Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 5 (2014)CrossRef Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 5 (2014)CrossRef
13.
Zurück zum Zitat Farnden, J., Martini, B., Choo, K.K.R.: Privacy risks in mobile dating apps. In: Proceedings of 21st Americas Conference on Information Systems (2015) Farnden, J., Martini, B., Choo, K.K.R.: Privacy risks in mobile dating apps. In: Proceedings of 21st Americas Conference on Information Systems (2015)
14.
Zurück zum Zitat Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: Automated security certification of android. Technical report (2009) Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: Automated security certification of android. Technical report (2009)
15.
Zurück zum Zitat Hoang, N.P., Asano, Y., Yoshikawa, M.: Your neighbors are my spies: Location and other privacy concerns in GLBT-focused location-based dating applications. In: Proceedings of 19th International Conference on Advanced Communication Technology (2017) Hoang, N.P., Asano, Y., Yoshikawa, M.: Your neighbors are my spies: Location and other privacy concerns in GLBT-focused location-based dating applications. In: Proceedings of 19th International Conference on Advanced Communication Technology (2017)
16.
Zurück zum Zitat Kim, J., Kim, K., Cho, J., Kim, H., Schrittwieser, S.: Hello, Facebook! Here is the stalkers’ paradise!: design and analysis of enumeration attack using phone numbers on facebook. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 663–677. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_41CrossRef Kim, J., Kim, K., Cho, J., Kim, H., Schrittwieser, S.: Hello, Facebook! Here is the stalkers’ paradise!: design and analysis of enumeration attack using phone numbers on facebook. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 663–677. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-72359-4_​41CrossRef
17.
Zurück zum Zitat Li, L., et al.: Iccta: detecting inter-component privacy leaks in android apps. In: Proceedings of the 37th International Conference on Software Engineering (2015) Li, L., et al.: Iccta: detecting inter-component privacy leaks in android apps. In: Proceedings of the 37th International Conference on Software Engineering (2015)
18.
Zurück zum Zitat Li, M., et al.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th International Symposium on Mobile ad hoc Networking and Computing Li, M., et al.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th International Symposium on Mobile ad hoc Networking and Computing
19.
Zurück zum Zitat Lutz, C., Ranzini, G.: Where dating meets data: investigating social and institutional privacy concerns on tinder. Sage Social Media + Society (2017) Lutz, C., Ranzini, G.: Where dating meets data: investigating social and institutional privacy concerns on tinder. Sage Social Media + Society (2017)
20.
Zurück zum Zitat Nguyen, D.C., Wermke, D., Acar, Y., Backes, M., Weir, C., Fahl, S.: A stitch in time: supporting android developers in writingsecure code. In: Proceedings of the Conference on Computer and Communications Security (2018) Nguyen, D.C., Wermke, D., Acar, Y., Backes, M., Weir, C., Fahl, S.: A stitch in time: supporting android developers in writingsecure code. In: Proceedings of the Conference on Computer and Communications Security (2018)
22.
Zurück zum Zitat Shetty, R., Grispos, G., Choo, K.K.R.: Are you dating danger? an interdisciplinary approach to evaluating the (In)security of android dating apps. IEEE Trans. Sustain. Comput. (2017) Shetty, R., Grispos, G., Choo, K.K.R.: Are you dating danger? an interdisciplinary approach to evaluating the (In)security of android dating apps. IEEE Trans. Sustain. Comput. (2017)
23.
Zurück zum Zitat Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: Proceedings of the Network and Distributed System Security Symposium (2015) Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: Proceedings of the Network and Distributed System Security Symposium (2015)
24.
Zurück zum Zitat Wang, S., State, R., Ourdane, M., Engel, T.: Riskrank: security risk ranking for ip flow records. In: Proceedings of the 6th International Conference on Network and Service Management (2010) Wang, S., State, R., Ourdane, M., Engel, T.: Riskrank: security risk ranking for ip flow records. In: Proceedings of the 6th International Conference on Network and Service Management (2010)
25.
Zurück zum Zitat Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: ProfileDroid: multi-layer profiling of android applications. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (2012) Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: ProfileDroid: multi-layer profiling of android applications. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (2012)
26.
Zurück zum Zitat Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: Proceedings of the 31st Symposium on Security and Privacy (2010) Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: Proceedings of the 31st Symposium on Security and Privacy (2010)
27.
Zurück zum Zitat Yang, Z., Yang, M.: LeakMiner: detect information leakage on android with static taint analysis. In: Proceedings of the 3rd World Congress on Software Engineering (2012) Yang, Z., Yang, M.: LeakMiner: detect information leakage on android with static taint analysis. In: Proceedings of the 3rd World Congress on Software Engineering (2012)
28.
Zurück zum Zitat Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 20th Conference on Computer & Communications Security (2013) Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 20th Conference on Computer & Communications Security (2013)
29.
Zurück zum Zitat Zhao, M., Zhang, T., Ge, F., Yuan, Z.: RobotDroid: a lightweight malware detection framework on smartphones. Citeseer J. Netw. 7(4), 715 (2012) Zhao, M., Zhang, T., Ge, F., Yuan, Z.: RobotDroid: a lightweight malware detection framework on smartphones. Citeseer J. Netw. 7(4), 715 (2012)
30.
Zurück zum Zitat Zhao, Z., Osono, F.C.C.: “TrustDroid\(^{TM}\)”: preventing the use of smartPhones for information leaking in corporate networks through the used of static analysis taint tracking. In: Proceedings of the 7th International Conference on Malicious and Unwanted Software (2012) Zhao, Z., Osono, F.C.C.: “TrustDroid\(^{TM}\)”: preventing the use of smartPhones for information leaking in corporate networks through the used of static analysis taint tracking. In: Proceedings of the 7th International Conference on Malicious and Unwanted Software (2012)
31.
Zurück zum Zitat Zhu, H., Xiong, H., Ge, Y., Chen, E.: Mobile app recommendations with security and privacy awareness. In: Proceedings of the 20th SIGKDD International Conference on Knowledge discovery and data mining (2014) Zhu, H., Xiong, H., Ge, Y., Chen, E.: Mobile app recommendations with security and privacy awareness. In: Proceedings of the 20th SIGKDD International Conference on Knowledge discovery and data mining (2014)
Metadaten
Titel
When Harry Met Tinder: Security Analysis of Dating Apps on Android
verfasst von
Kuyju Kim
Taeyun Kim
Seungjin Lee
Soolin Kim
Hyoungshick Kim
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-03638-6_28

Premium Partner