Attacks & Countermeasures of Ultrasonic Cross-Device Tracking - - PowerPoint PPT Presentation

attacks countermeasures of ultrasonic cross device
SMART_READER_LITE
LIVE PREVIEW

Attacks & Countermeasures of Ultrasonic Cross-Device Tracking - - PowerPoint PPT Presentation

Talking Behind Your Back Attacks & Countermeasures of Ultrasonic Cross-Device Tracking Federico ico Maggi Vasil ilio ios Mavroud udis is Assistant Professor POLIMI Doctoral Researcher UCL Visiting Researcher UCSB Who we are The


slide-1
SLIDE 1

Talking Behind Your Back

Attacks & Countermeasures of Ultrasonic Cross-Device Tracking

Vasil ilio ios Mavroud udis is Doctoral Researcher UCL Federico ico Maggi Assistant Professor POLIMI Visiting Researcher UCSB

slide-2
SLIDE 2

Who we are

slide-3
SLIDE 3

The Story of a Product

slide-4
SLIDE 4

The Story of a Product

slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

The Story of a Product

slide-8
SLIDE 8

FTC Cross-Device Tracking Workshop, Nov 16, 2015 (Washington, DC)

slide-9
SLIDE 9

The Story of a Product

slide-10
SLIDE 10

Unhappy Proactive

slide-11
SLIDE 11

Unhappy Unconcerned Proactive

slide-12
SLIDE 12

The Story of a Product

slide-13
SLIDE 13
slide-14
SLIDE 14

The Story of a Product

slide-15
SLIDE 15

Not the End of our Story: The Tip of the Iceberg

slide-16
SLIDE 16

Contents

slide-17
SLIDE 17
slide-18
SLIDE 18

The Ultrasound Tracking Ecosystem

slide-19
SLIDE 19

Cross-Device Tracking, XDT: Overview

XDT

slide-20
SLIDE 20

Cross-Device Tracking, XDT: Details

slide-21
SLIDE 21

Ultrasound Beacons: uBeacons

slide-22
SLIDE 22

uBeacons: Technical Details

slide-23
SLIDE 23

uBeacons: Practical Details

slide-24
SLIDE 24

XDT + uBeacons = uXDT

slide-25
SLIDE 25

Ultrasound Cross-Device Tracking

slide-26
SLIDE 26

Ultrasound Cross-Device Tracking

slide-27
SLIDE 27

Ultrasound Cross-Device Tracking

slide-28
SLIDE 28

Ultrasound Cross-Device Tracking

slide-29
SLIDE 29

Proximity Marketing

slide-30
SLIDE 30

Other Use Cases

slide-31
SLIDE 31

But how secure is this?

slide-32
SLIDE 32

Exploitation!

slide-33
SLIDE 33

Setting the Scene

slide-34
SLIDE 34
slide-35
SLIDE 35

The Attacker’s s Toolchest

slide-36
SLIDE 36

The Attacker’s s Toolchest

slide-37
SLIDE 37

The Tor de-anonymization Attack

slide-38
SLIDE 38

The Tor de-anonymization Attack

slide-39
SLIDE 39

The Demo Explained

slide-40
SLIDE 40

The Demo: Simulated State-level Adversary

slide-41
SLIDE 41

The Demo: Simulated State-level Adversary

slide-42
SLIDE 42

Some More Attacks

slide-43
SLIDE 43
slide-44
SLIDE 44

Security Evaluation

slide-45
SLIDE 45

Security Evaluation

slide-46
SLIDE 46

Security Evaluation

slide-47
SLIDE 47

Security Evaluation

slide-48
SLIDE 48

Security Evaluation

slide-49
SLIDE 49

May 10, 2016

slide-50
SLIDE 50

Aug 31, 2016

slide-51
SLIDE 51

July 19, 2016

slide-52
SLIDE 52

Oct 17, 2016

slide-53
SLIDE 53

Market Penetration

slide-54
SLIDE 54
slide-55
SLIDE 55

Countermeasures

slide-56
SLIDE 56

Browser Extension

slide-57
SLIDE 57

Android Permission

slide-58
SLIDE 58

Tor Bug Tracker

slide-59
SLIDE 59

Securing the Ecosystem

slide-60
SLIDE 60

Securing the Ecosystem

slide-61
SLIDE 61
slide-62
SLIDE 62

Conclusions: What we did

slide-63
SLIDE 63

Conclusions: What’s left to do!

  

slide-64
SLIDE 64

Conclusions: What’s left to do!

 

slide-65
SLIDE 65

Q & A

slide-66
SLIDE 66

ubeacsec.org

slide-67
SLIDE 67