attacks countermeasures of ultrasonic cross device
play

Attacks & Countermeasures of Ultrasonic Cross-Device Tracking - PowerPoint PPT Presentation

Talking Behind Your Back Attacks & Countermeasures of Ultrasonic Cross-Device Tracking Federico ico Maggi Vasil ilio ios Mavroud udis is Assistant Professor POLIMI Doctoral Researcher UCL Visiting Researcher UCSB Who we are The


  1. Talking Behind Your Back Attacks & Countermeasures of Ultrasonic Cross-Device Tracking Federico ico Maggi Vasil ilio ios Mavroud udis is Assistant Professor POLIMI Doctoral Researcher UCL Visiting Researcher UCSB

  2. Who we are

  3. The Story of a Product   

  4. The Story of a Product    

  5. The Story of a Product     

  6. FTC Cross-Device Tracking Workshop, Nov 16, 2015 (Washington, DC)

  7. The Story of a Product      

  8. Unhappy Proactive

  9. Unhappy Proactive Unconcerned

  10. The Story of a Product       

  11. The Story of a Product        

  12. Not the End of our Story: The Tip of the Iceberg     

  13. Contents     

  14. The Ultrasound Tracking Ecosystem     

  15. Cross-Device Tracking, XDT: Overview XDT

  16. Cross-Device Tracking, XDT: Details      

  17. Ultrasound Beacons: uBeacons     

  18. uBeacons: Technical Details       

  19. uBeacons: Practical Details    

  20. XDT + uBeacons = uXDT

  21. Ultrasound Cross-Device Tracking       

  22. Ultrasound Cross-Device Tracking

  23. Ultrasound Cross-Device Tracking

  24. Ultrasound Cross-Device Tracking  

  25. Proximity Marketing      

  26. Other Use Cases       

  27. But how secure is this?

  28. Exploitation!    

  29. Setting the Scene    

  30. The Attacker ’ s s Toolchest    

  31. The Attacker ’ s s Toolchest  

  32. The Tor de-anonymization Attack

  33. The Tor de-anonymization Attack

  34. The Demo Explained      

  35. The Demo: Simulated State-level Adversary  

  36. The Demo: Simulated State-level Adversary

  37. Some More Attacks     

  38. Security Evaluation    

  39. Security Evaluation     

  40. Security Evaluation    

  41. Security Evaluation     

  42. Security Evaluation    

  43. May 10, 2016

  44. Aug 31, 2016

  45. July 19, 2016

  46. Oct 17, 2016

  47. Market Penetration        

  48. Countermeasures

  49. Browser Extension      

  50. Android Permission     

  51. Tor Bug Tracker

  52. Securing the Ecosystem     

  53. Securing the Ecosystem      

  54. Conclusions: What we did      

  55. Conclusions: What ’ s left to do!     

  56. Conclusions: What ’ s left to do!       

  57. Q & A

  58. ubeacsec.org

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend