File Download
Supplementary
-
Citations:
- Appears in Collections:
postgraduate thesis: Data privacy of Android applications and name privacy of NDN
Title | Data privacy of Android applications and name privacy of NDN |
---|---|
Authors | |
Issue Date | 2016 |
Publisher | The University of Hong Kong (Pokfulam, Hong Kong) |
Citation | Cui, X. [崔兴敏]. (2016). Data privacy of Android applications and name privacy of NDN. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. |
Abstract | We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two types of new trends arise in the communication paradigm. The first is that mobile devices such as smartphones have gained more popularity and the Internet usage from them has surpassed the usage from PC. More and more users rely on smartphones to share information with their friends. The second is the need for a new network design given the challenges faced by today's IP-based network with the increasing demands for security, mobility, content distribution, etc. To cope with these challenges, NSF has funded four Future Internet Architectures (FIA) including Named Data Networking (NDN), MobilityFirst, NEBULA and eXpressive Internet Architecture. For both non-traditional devices and future network, users' major concern is whether their privacy can be properly protected since their personal information is exposed to various apps and websites. In this thesis, we study the detection and protection of some privacy issues in these non-traditional devices and future network.
For non-traditional devices, our work focuses on smartphones with the most popular OS, the Android OS. In Android's security model, an Android app needs to ask for permissions to gain access to sensitive data or perform privileged functions. However, a benign but vulnerable app may fail to protect its possessed permissions, enabling an unauthorized app to invoke privileged functions without asking for permissions. This exposure may not be intentional, but it would lead to the leak of user's private data and violate the permission access control policy. This is called the privilege escalation attack. Since app vetting is absent on Google Play and most other Android app repositories, it is essential to provide tools to check whether an Android app contains unprotected interfaces which would lead to unintentional leaks. In this thesis we design two checkers, CoChecker and WeChecker, to perform static taint checking in Android apps to detect leak paths. While the underlying ideas of the two checkers are similar, WeChecker improves in various aspects such as checking efficiency and precision. The evaluation shows that both checkers are efficient and WeChecker has a higher precision than most state-of-the-art checkers.
For future network architectures, we focus on the security issues of Named
Data Networking (NDN), which is one of the most promising Future Internet Architectures funded by NSF. To be more specific, we study the Internet censorship and anti-censorship issues since this topic addresses both name privacy and content privacy. We first explore the feasibility of existing censorship techniques in NDN and conclude the two most effective censorship methods. After that, the robustness of the NDN design against censorship is checked via simulation. Finally, we propose our censorship resistant schemes which can defend against the most effective censorship techniques in NDN. |
Degree | Doctor of Philosophy |
Subject | Computer networks - Security measures Data protection |
Dept/Program | Computer Science |
Persistent Identifier | http://hdl.handle.net/10722/236581 |
HKU Library Item ID | b5807295 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cui, Xingmin | - |
dc.contributor.author | 崔兴敏 | - |
dc.date.accessioned | 2016-11-28T23:28:11Z | - |
dc.date.available | 2016-11-28T23:28:11Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Cui, X. [崔兴敏]. (2016). Data privacy of Android applications and name privacy of NDN. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. | - |
dc.identifier.uri | http://hdl.handle.net/10722/236581 | - |
dc.description.abstract | We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two types of new trends arise in the communication paradigm. The first is that mobile devices such as smartphones have gained more popularity and the Internet usage from them has surpassed the usage from PC. More and more users rely on smartphones to share information with their friends. The second is the need for a new network design given the challenges faced by today's IP-based network with the increasing demands for security, mobility, content distribution, etc. To cope with these challenges, NSF has funded four Future Internet Architectures (FIA) including Named Data Networking (NDN), MobilityFirst, NEBULA and eXpressive Internet Architecture. For both non-traditional devices and future network, users' major concern is whether their privacy can be properly protected since their personal information is exposed to various apps and websites. In this thesis, we study the detection and protection of some privacy issues in these non-traditional devices and future network. For non-traditional devices, our work focuses on smartphones with the most popular OS, the Android OS. In Android's security model, an Android app needs to ask for permissions to gain access to sensitive data or perform privileged functions. However, a benign but vulnerable app may fail to protect its possessed permissions, enabling an unauthorized app to invoke privileged functions without asking for permissions. This exposure may not be intentional, but it would lead to the leak of user's private data and violate the permission access control policy. This is called the privilege escalation attack. Since app vetting is absent on Google Play and most other Android app repositories, it is essential to provide tools to check whether an Android app contains unprotected interfaces which would lead to unintentional leaks. In this thesis we design two checkers, CoChecker and WeChecker, to perform static taint checking in Android apps to detect leak paths. While the underlying ideas of the two checkers are similar, WeChecker improves in various aspects such as checking efficiency and precision. The evaluation shows that both checkers are efficient and WeChecker has a higher precision than most state-of-the-art checkers. For future network architectures, we focus on the security issues of Named Data Networking (NDN), which is one of the most promising Future Internet Architectures funded by NSF. To be more specific, we study the Internet censorship and anti-censorship issues since this topic addresses both name privacy and content privacy. We first explore the feasibility of existing censorship techniques in NDN and conclude the two most effective censorship methods. After that, the robustness of the NDN design against censorship is checked via simulation. Finally, we propose our censorship resistant schemes which can defend against the most effective censorship techniques in NDN. | - |
dc.language | eng | - |
dc.publisher | The University of Hong Kong (Pokfulam, Hong Kong) | - |
dc.relation.ispartof | HKU Theses Online (HKUTO) | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.rights | The author retains all proprietary rights, (such as patent rights) and the right to use in future works. | - |
dc.subject.lcsh | Computer networks - Security measures | - |
dc.subject.lcsh | Data protection | - |
dc.title | Data privacy of Android applications and name privacy of NDN | - |
dc.type | PG_Thesis | - |
dc.identifier.hkul | b5807295 | - |
dc.description.thesisname | Doctor of Philosophy | - |
dc.description.thesislevel | Doctoral | - |
dc.description.thesisdiscipline | Computer Science | - |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.5353/th_b5807295 | - |
dc.identifier.mmsid | 991020914919703414 | - |