TU Darmstadt / ULB / TUbiblio

AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices

Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias (2022)
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. San Antonio, USA (16.05.2022-19.05.2022)
doi: 10.1145/3507657.3528546
Conference or Workshop Item, Bibliographie

Abstract

Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag-a very affordable tracker covered by the nearly ubiquitous Find My network-amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users are still left in the dark. Apple recently released the Android app "Tracker Detect," which does not deliver a convincing feature set for stalking protection. We reverse engineer Apple's tracking protection in iOS and discuss its features regarding stalking detection. We design "AirGuard" and release it as an Android app to protect against abuse by Apple tracking devices. We compare the performance of our solution with the Apple-provided one in iOS and study the use of AirGuard in the wild over multiple weeks using data contributed by tens of thousands of active users.

Item Type: Conference or Workshop Item
Erschienen: 2022
Creators: Heinrich, Alexander ; Bittner, Niklas ; Hollick, Matthias
Type of entry: Bibliographie
Title: AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Language: English
Date: 16 May 2022
Publisher: ACM
Book Title: WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Event Title: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Event Location: San Antonio, USA
Event Dates: 16.05.2022-19.05.2022
DOI: 10.1145/3507657.3528546
Abstract:

Finder networks in general, and Apple's Find My network in particular, can pose a grave threat to users' privacy and even health if these networks are abused for stalking. Apple's release of the AirTag-a very affordable tracker covered by the nearly ubiquitous Find My network-amplified this issue. While Apple provides a stalking detection feature within its ecosystem, billions of Android users are still left in the dark. Apple recently released the Android app "Tracker Detect," which does not deliver a convincing feature set for stalking protection. We reverse engineer Apple's tracking protection in iOS and discuss its features regarding stalking detection. We design "AirGuard" and release it as an Android app to protect against abuse by Apple tracking devices. We compare the performance of our solution with the Apple-provided one in iOS and study the use of AirGuard in the wild over multiple weeks using data contributed by tens of thousands of active users.

Uncontrolled Keywords: ATHENE, privacy, stalking, find my, location tracking, airtag, bluetooth, reverse engineering
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Sichere Mobile Netze
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
Date Deposited: 09 Jun 2022 09:28
Last Modified: 14 Nov 2022 14:49
PPN: 501651683
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details