geo locating drivers a study of sensitive data leakage in
play

Geo-locating Drivers: A Study of Sensitive Data Leakage in - PowerPoint PPT Presentation

Computer Security Laboratory Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services Qingchuan Zhao , Chaoshun Zuo , Giancarlo Pellegrino , Zhiqiang Lin The Ohio State University CISPA Helmholtz


  1. Computer Security Laboratory Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services Qingchuan Zhao ∗ , Chaoshun Zuo ∗ , Giancarlo Pellegrino †‡ , Zhiqiang Lin ∗ ∗ The Ohio State University † CISPA Helmholtz Center for Information Security ‡ Stanford University NDSS 2019 T HE O HIO S TATE U NIVRESITY

  2. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References What is Ride-Hailing Service? 2 / 27

  3. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References What is Ride-Hailing Service? Rider App Driver App 2 / 27

  4. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References What is Ride-Hailing Service? Backend Servers Rider App Driver App 2 / 27

  5. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References What is Ride-Hailing Service? Rider Driver GPS,PII GPS, PII Backend Servers Rider App Driver App 2 / 27

  6. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References Concerns with Driver’s Security 3 / 27

  7. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Simplified Protocol Rider App Backend Servers Driver App 4 / 27

  8. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Simplified Protocol Rider App Backend Servers Driver App driver positions 4 / 27

  9. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Simplified Protocol Rider App Backend Servers Driver App driver positions login token 4 / 27

  10. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Simplified Protocol Rider App Backend Servers Driver App driver positions login token rider position nearby cars, est costs 4 / 27

  11. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Simplified Protocol Rider App Backend Servers Driver App driver positions login token rider position nearby cars, est costs request ride accept ride? yes driver, $, pickup location 4 / 27

  12. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References The Nearby Cars API Rider App Backend Servers login token rider position nearby cars, est costs request ride driver, $, pickup location 5 / 27

  13. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References The Nearby Cars API Rider App Backend Servers login token rider position nearby cars, est costs request ride driver, $, pickup location 5 / 27

  14. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References The Nearby Cars API Rider App Backend Servers login token rider position nearby cars, est costs request ride Pham et al. 2017, PoPETs driver, $, pickup location 5 / 27

  15. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References The Nearby Cars API Rider App Backend Servers login token rider position nearby cars, est costs request ride driver, $, pickup location 5 / 27

  16. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References The Nearby Cars API GET /nearby-cars?lat=33.7114&lng=151.1321 HTTP/1.1 … HTTP/1.1 200 OK Content-type: application/json ... { "cars": [ { "id" : "509AE827", "positions": [ { "GPS": "-33.7100 / 151.1342", "t" : "15259620050000" }, { "GPS": "-33.7300 / 151.1200", "t" : "15259620060000" }, ... }, { "id" : "6F09E2AA", ... }, ... } 5 / 27

  17. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References The Nearby Cars API The Research Questions 1 Private Info Leakage ◮ Direct PII of Drivers ◮ Movement of Drivers ◮ Working Patterns of Drivers ◮ Appeared Locations of Drivers 2 Business Info Leakage ◮ Dual-Apping Driver ◮ Driver Preference ◮ # Drivers (Local or Global) ◮ Operation Performance 5 / 27

  18. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References App Selection Service Name #Downloads APK Obfus? Uber 100+ millions ✔ Easy 10+ millions ✔ Gett 10+ millions ✔ Lyft 10+ millions ✔ myTaxi 5+ millions ✔ Taxify 5+ millions ✗ BiTaksi 1+ millions ✔ Heetch 1+ millions ✔ Jeeny 500+ thousands ✔ Flywheel 100+ thousands ✗ GoCatch 100+ thousands ✔ miCab 100+ thousands ✗ RideAustin 100+ thousands ✗ Ztrip 100+ thousands ✔ eCab 50+ thousands ✔ GroundLink 10+ thousands ✗ HelloCabs 10+ thousands ✗ Ride LA 10+ thousands ✗ Bounce 10+ thousands ✗ DC Taxi Rider 5+ thousands ✔ 6 / 27

  19. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References App Selection Service Name #Downloads APK Obfus? Uber 100+ millions ✔ Easy 10+ millions ✔ Gett 10+ millions ✔ Lyft 10+ millions ✔ myTaxi 5+ millions ✔ Taxify 5+ millions ✗ BiTaksi 1+ millions ✔ Heetch 1+ millions ✔ Jeeny 500+ thousands ✔ Flywheel 100+ thousands ✗ GoCatch 100+ thousands ✔ miCab 100+ thousands ✗ RideAustin 100+ thousands ✗ Ztrip 100+ thousands ✔ eCab 50+ thousands ✔ GroundLink 10+ thousands ✗ HelloCabs 10+ thousands ✗ Ride LA 10+ thousands ✗ Bounce 10+ thousands ✗ DC Taxi Rider 5+ thousands ✔ 6 / 27

  20. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References App Selection Service Name #Downloads APK Obfus? Uber 100+ millions ✔ Easy 10+ millions ✔ Gett 10+ millions ✔ Lyft 10+ millions ✔ myTaxi 5+ millions ✔ Taxify 5+ millions ✗ BiTaksi 1+ millions ✔ Heetch 1+ millions ✔ Jeeny 500+ thousands ✔ Flywheel 100+ thousands ✗ GoCatch 100+ thousands ✔ miCab 100+ thousands ✗ RideAustin 100+ thousands ✗ Ztrip 100+ thousands ✔ eCab 50+ thousands ✔ GroundLink 10+ thousands ✗ HelloCabs 10+ thousands ✗ Ride LA 10+ thousands ✗ Bounce 10+ thousands ✗ DC Taxi Rider 5+ thousands ✔ 6 / 27

  21. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References App Selection Service Name #Downloads APK Obfus? Uber 100+ millions ✔ Easy 10+ millions ✔ Gett 10+ millions ✔ Lyft 10+ millions ✔ myTaxi 5+ millions ✔ Taxify 5+ millions ✗ BiTaksi 1+ millions ✔ Heetch 1+ millions ✔ Jeeny 500+ thousands ✔ Flywheel 100+ thousands ✗ GoCatch 100+ thousands ✔ miCab 100+ thousands ✗ RideAustin 100+ thousands ✗ Ztrip 100+ thousands ✔ eCab 50+ thousands ✔ GroundLink 10+ thousands ✗ HelloCabs 10+ thousands ✗ Ride LA 10+ thousands ✗ Bounce 10+ thousands ✗ DC Taxi Rider 5+ thousands ✔ 6 / 27

  22. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Running Example GET /v1/nearby-drivers-pickup-etas? lat=10.10&lng=-10.10 HTTP/1.1 Authorization: Bearer dmGtpMx1qCKeA HTTP/1.1 200 OK Content-type: application/json { "nearby_drivers":[ { ... "driver":{ ... }, "locations":[ { "lat":10.10, "lng":-10.10, "recorded_at_ms":1234 }, ... ] }, { ... "driver":{ ... }, ... } (c) Nearby Cars API 7 / 27

  23. Introduction Methodology and Tool Security Analysis Vulnerabilities Discussions Related Work Conclusion References A Running Example GET /v1/nearby-drivers-pickup-etas? lat=10.10&lng=-10.10 HTTP/1.1 Authorization: Bearer dmGtpMx1qCKeA HTTP/1.1 200 OK Content-type: application/json { "nearby_drivers":[ { ... "driver":{ ... }, "locations":[ { "lat":10.10, "lng":-10.10, "recorded_at_ms":1234 }, ... ] }, { ... "driver":{ ... }, ... } (c) Nearby Cars API 7 / 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend