File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

postgraduate thesis: Data privacy of Android applications and name privacy of NDN

TitleData privacy of Android applications and name privacy of NDN
Authors
Issue Date2016
PublisherThe University of Hong Kong (Pokfulam, Hong Kong)
Citation
Cui, X. [崔兴敏]. (2016). Data privacy of Android applications and name privacy of NDN. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR.
AbstractWe get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two types of new trends arise in the communication paradigm. The first is that mobile devices such as smartphones have gained more popularity and the Internet usage from them has surpassed the usage from PC. More and more users rely on smartphones to share information with their friends. The second is the need for a new network design given the challenges faced by today's IP-based network with the increasing demands for security, mobility, content distribution, etc. To cope with these challenges, NSF has funded four Future Internet Architectures (FIA) including Named Data Networking (NDN), MobilityFirst, NEBULA and eXpressive Internet Architecture. For both non-traditional devices and future network, users' major concern is whether their privacy can be properly protected since their personal information is exposed to various apps and websites. In this thesis, we study the detection and protection of some privacy issues in these non-traditional devices and future network. For non-traditional devices, our work focuses on smartphones with the most popular OS, the Android OS. In Android's security model, an Android app needs to ask for permissions to gain access to sensitive data or perform privileged functions. However, a benign but vulnerable app may fail to protect its possessed permissions, enabling an unauthorized app to invoke privileged functions without asking for permissions. This exposure may not be intentional, but it would lead to the leak of user's private data and violate the permission access control policy. This is called the privilege escalation attack. Since app vetting is absent on Google Play and most other Android app repositories, it is essential to provide tools to check whether an Android app contains unprotected interfaces which would lead to unintentional leaks. In this thesis we design two checkers, CoChecker and WeChecker, to perform static taint checking in Android apps to detect leak paths. While the underlying ideas of the two checkers are similar, WeChecker improves in various aspects such as checking efficiency and precision. The evaluation shows that both checkers are efficient and WeChecker has a higher precision than most state-of-the-art checkers. For future network architectures, we focus on the security issues of Named Data Networking (NDN), which is one of the most promising Future Internet Architectures funded by NSF. To be more specific, we study the Internet censorship and anti-censorship issues since this topic addresses both name privacy and content privacy. We first explore the feasibility of existing censorship techniques in NDN and conclude the two most effective censorship methods. After that, the robustness of the NDN design against censorship is checked via simulation. Finally, we propose our censorship resistant schemes which can defend against the most effective censorship techniques in NDN.
DegreeDoctor of Philosophy
SubjectComputer networks - Security measures
Data protection
Dept/ProgramComputer Science
Persistent Identifierhttp://hdl.handle.net/10722/236581
HKU Library Item IDb5807295

 

DC FieldValueLanguage
dc.contributor.authorCui, Xingmin-
dc.contributor.author崔兴敏-
dc.date.accessioned2016-11-28T23:28:11Z-
dc.date.available2016-11-28T23:28:11Z-
dc.date.issued2016-
dc.identifier.citationCui, X. [崔兴敏]. (2016). Data privacy of Android applications and name privacy of NDN. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR.-
dc.identifier.urihttp://hdl.handle.net/10722/236581-
dc.description.abstractWe get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two types of new trends arise in the communication paradigm. The first is that mobile devices such as smartphones have gained more popularity and the Internet usage from them has surpassed the usage from PC. More and more users rely on smartphones to share information with their friends. The second is the need for a new network design given the challenges faced by today's IP-based network with the increasing demands for security, mobility, content distribution, etc. To cope with these challenges, NSF has funded four Future Internet Architectures (FIA) including Named Data Networking (NDN), MobilityFirst, NEBULA and eXpressive Internet Architecture. For both non-traditional devices and future network, users' major concern is whether their privacy can be properly protected since their personal information is exposed to various apps and websites. In this thesis, we study the detection and protection of some privacy issues in these non-traditional devices and future network. For non-traditional devices, our work focuses on smartphones with the most popular OS, the Android OS. In Android's security model, an Android app needs to ask for permissions to gain access to sensitive data or perform privileged functions. However, a benign but vulnerable app may fail to protect its possessed permissions, enabling an unauthorized app to invoke privileged functions without asking for permissions. This exposure may not be intentional, but it would lead to the leak of user's private data and violate the permission access control policy. This is called the privilege escalation attack. Since app vetting is absent on Google Play and most other Android app repositories, it is essential to provide tools to check whether an Android app contains unprotected interfaces which would lead to unintentional leaks. In this thesis we design two checkers, CoChecker and WeChecker, to perform static taint checking in Android apps to detect leak paths. While the underlying ideas of the two checkers are similar, WeChecker improves in various aspects such as checking efficiency and precision. The evaluation shows that both checkers are efficient and WeChecker has a higher precision than most state-of-the-art checkers. For future network architectures, we focus on the security issues of Named Data Networking (NDN), which is one of the most promising Future Internet Architectures funded by NSF. To be more specific, we study the Internet censorship and anti-censorship issues since this topic addresses both name privacy and content privacy. We first explore the feasibility of existing censorship techniques in NDN and conclude the two most effective censorship methods. After that, the robustness of the NDN design against censorship is checked via simulation. Finally, we propose our censorship resistant schemes which can defend against the most effective censorship techniques in NDN.-
dc.languageeng-
dc.publisherThe University of Hong Kong (Pokfulam, Hong Kong)-
dc.relation.ispartofHKU Theses Online (HKUTO)-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.rightsThe author retains all proprietary rights, (such as patent rights) and the right to use in future works.-
dc.subject.lcshComputer networks - Security measures-
dc.subject.lcshData protection-
dc.titleData privacy of Android applications and name privacy of NDN-
dc.typePG_Thesis-
dc.identifier.hkulb5807295-
dc.description.thesisnameDoctor of Philosophy-
dc.description.thesislevelDoctoral-
dc.description.thesisdisciplineComputer Science-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.5353/th_b5807295-
dc.identifier.mmsid991020914919703414-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats