TU Darmstadt / ULB / TUbiblio

AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices

Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias (2022)
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. San Antonio, USA (16.05.2022-19.05.2022)
doi: 10.1145/3507657.3528546
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag-a very affordable tracker covered by the nearly ubiquitous Find My network-amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users are still left in the dark. Apple recently released the Android app "Tracker Detect," which does not deliver a convincing feature set for stalking protection. We reverse engineer Apple's tracking protection in iOS and discuss its features regarding stalking detection. We design "AirGuard" and release it as an Android app to protect against abuse by Apple tracking devices. We compare the performance of our solution with the Apple-provided one in iOS and study the use of AirGuard in the wild over multiple weeks using data contributed by tens of thousands of active users.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2022
Autor(en): Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias
Art des Eintrags: Bibliographie
Titel: AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Sprache: Englisch
Publikationsjahr: 16 Mai 2022
Verlag: ACM
Buchtitel: WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Veranstaltungstitel: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Veranstaltungsort: San Antonio, USA
Veranstaltungsdatum: 16.05.2022-19.05.2022
DOI: 10.1145/3507657.3528546
Kurzbeschreibung (Abstract):

Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag-a very affordable tracker covered by the nearly ubiquitous Find My network-amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users are still left in the dark. Apple recently released the Android app "Tracker Detect," which does not deliver a convincing feature set for stalking protection. We reverse engineer Apple's tracking protection in iOS and discuss its features regarding stalking detection. We design "AirGuard" and release it as an Android app to protect against abuse by Apple tracking devices. We compare the performance of our solution with the Apple-provided one in iOS and study the use of AirGuard in the wild over multiple weeks using data contributed by tens of thousands of active users.

Freie Schlagworte: ATHENE, privacy, stalking, find my, location tracking, airtag, bluetooth, reverse engineering
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Sichere Mobile Netze
Profilbereiche
Profilbereiche > Cybersicherheit (CYSEC)
Hinterlegungsdatum: 09 Jun 2022 09:28
Letzte Änderung: 14 Nov 2022 14:49
PPN: 501651683
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen