Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias (2022)
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. San Antonio, USA (16.05.2022-19.05.2022)
doi: 10.1145/3507657.3528546
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag-a very affordable tracker covered by the nearly ubiquitous Find My network-amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users are still left in the dark. Apple recently released the Android app "Tracker Detect," which does not deliver a convincing feature set for stalking protection. We reverse engineer Apple's tracking protection in iOS and discuss its features regarding stalking detection. We design "AirGuard" and release it as an Android app to protect against abuse by Apple tracking devices. We compare the performance of our solution with the Apple-provided one in iOS and study the use of AirGuard in the wild over multiple weeks using data contributed by tens of thousands of active users.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2022 |
Autor(en): | Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias |
Art des Eintrags: | Bibliographie |
Titel: | AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices |
Sprache: | Englisch |
Publikationsjahr: | 16 Mai 2022 |
Verlag: | ACM |
Buchtitel: | WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
Veranstaltungstitel: | 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks |
Veranstaltungsort: | San Antonio, USA |
Veranstaltungsdatum: | 16.05.2022-19.05.2022 |
DOI: | 10.1145/3507657.3528546 |
Kurzbeschreibung (Abstract): | Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag-a very affordable tracker covered by the nearly ubiquitous Find My network-amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users are still left in the dark. Apple recently released the Android app "Tracker Detect," which does not deliver a convincing feature set for stalking protection. We reverse engineer Apple's tracking protection in iOS and discuss its features regarding stalking detection. We design "AirGuard" and release it as an Android app to protect against abuse by Apple tracking devices. We compare the performance of our solution with the Apple-provided one in iOS and study the use of AirGuard in the wild over multiple weeks using data contributed by tens of thousands of active users. |
Freie Schlagworte: | ATHENE, privacy, stalking, find my, location tracking, airtag, bluetooth, reverse engineering |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Sichere Mobile Netze Profilbereiche Profilbereiche > Cybersicherheit (CYSEC) |
Hinterlegungsdatum: | 09 Jun 2022 09:28 |
Letzte Änderung: | 14 Nov 2022 14:49 |
PPN: | 501651683 |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |