TY - GEN
T1 - No Place to Hide that Bytes Won’t Reveal
T2 - 9th International Conference on Network and System Security, NSS 2015
AU - Ateniese, Giuseppe
AU - Hitaj, Briland
AU - Mancini, Luigi Vincenzo
AU - Verde, Nino Vincenzo
AU - Villani, Antonio
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature. In this paper, we propose a new adversary model for Location Based Services (LBSs). The model takes into account an unauthorized third party, different from the LBS provider itself, that wants to infer the location and monitor the movements of a LBS user. We show that such an adversary can extrapolate the position of a target user by just analyzing the size and the timing of the encrypted traffic exchanged between that user and the LBS provider. We performed a thorough analysis of a widely deployed location based app that comes pre-installed with many Android devices: GoogleNow. The results are encouraging and highlight the importance of devising more effective countermeasures against powerful adversaries to preserve the privacy of LBS users.
AB - News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature. In this paper, we propose a new adversary model for Location Based Services (LBSs). The model takes into account an unauthorized third party, different from the LBS provider itself, that wants to infer the location and monitor the movements of a LBS user. We show that such an adversary can extrapolate the position of a target user by just analyzing the size and the timing of the encrypted traffic exchanged between that user and the LBS provider. We performed a thorough analysis of a widely deployed location based app that comes pre-installed with many Android devices: GoogleNow. The results are encouraging and highlight the importance of devising more effective countermeasures against powerful adversaries to preserve the privacy of LBS users.
KW - GoogleNow
KW - Location-based services
KW - Mobile devices
KW - Network traffic analysis
KW - Privacy
UR - http://www.scopus.com/inward/record.url?scp=84952361500&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84952361500&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-25645-0_4
DO - 10.1007/978-3-319-25645-0_4
M3 - Conference contribution
AN - SCOPUS:84952361500
SN - 9783319256443
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 46
EP - 59
BT - Network and System Security - 9th International Conference, NSS 2015, Proceedings
A2 - Xu, Shouhuai
A2 - Qiu, Meikang
A2 - Zhang, Haibo
A2 - Yung, Moti
Y2 - 3 November 2015 through 5 November 2015
ER -