Skip to main content

Showing 1–13 of 13 results for author: Choffnes, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.14332  [pdf, other

    cs.CR cs.LG

    SunBlock: Cloudless Protection for IoT Systems

    Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi

    Abstract: With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks. Despite a long history of attacks on IoT devices in unprotected home networks, the problem of accurate, rapid detection and prevention of such attacks remains open. Many existing IoT protecti… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: This paper is accepted at Passive and Active Measurement (PAM) conference 2024

  2. arXiv:2304.03045  [pdf, other

    cs.CR

    Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards

    Authors: Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David Choffnes

    Abstract: Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential privacy and security threats. To limit these threats a number of commercial services have become available (IoT safeguards). The safeguards claim to provide protection against IoT privacy risks and security threats. However, the effectivenes… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  3. arXiv:2212.03615  [pdf, other

    cs.CR

    Not Your Average App: A Large-scale Privacy Analysis of Android Browsers

    Authors: Amogh Pradeep, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, David Choffnes

    Abstract: The transparency and privacy behavior of mobile browsers has remained widely unexplored by the research community. In fact, as opposed to regular Android apps, mobile browsers may present contradicting privacy behaviors. On the one end, they can have access to (and can expose) a unique combination of sensitive user data, from users' browsing history to permission-protected personally identifiable… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: Privacy Enhancing Technologies Symposium, 2023

  4. Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem

    Authors: Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel Dubois, David Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq

    Abstract: Smart speakers collect voice commands, which can be used to infer sensitive information about users. Given the potential for privacy harms, there is a need for greater transparency and control over the data collected, used, and shared by smart speaker platforms as well as third party skills supported on them. To bridge this gap, we build a framework to measure data collection, usage, and sharing b… ▽ More

    Submitted 13 October, 2023; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: Published at the ACM Internet Measurement Conference 2023

  5. arXiv:2107.10830  [pdf, other

    cs.CR

    ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes

    Authors: Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan

    Abstract: Zigbee is an energy-efficient wireless IoT protocol that is increasingly being deployed in smart home settings. In this work, we analyze the privacy guarantees of Zigbee protocol. Specifically, we present ZLeaks, a tool that passively identifies in-home devices or events from the encrypted Zigbee traffic by 1) inferring a single application layer (APL) command in the event's traffic, and 2) exploi… ▽ More

    Submitted 26 November, 2021; v1 submitted 22 July, 2021; originally announced July 2021.

    Comments: An updated version of the authors' previous submission (arXiv:2107.10830). It has been accepted at the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022

  6. arXiv:2105.05162  [pdf, other

    cs.NI

    Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic

    Authors: Anna Maria Mandalari, Daniel J. Dubois, Roman Kolcun, Muhammad Talha Paracha, Hamed Haddadi, David Choffnes

    Abstract: Despite the prevalence of Internet of Things (IoT) devices, there is little information about the purpose and risks of the Internet traffic these devices generate, and consumers have limited options for controlling those risks. A key open question is whether one can mitigate these risks by automatically blocking some of the Internet connections from IoT devices, without rendering the devices inope… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Journal ref: Privacy Enhancing Technologies Symposium (PETS) 2021

  7. arXiv:2009.01880  [pdf, other

    cs.NI

    A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

    Authors: Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes, Georgios Smaragdakis, Anja Feldmann

    Abstract: Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know w… ▽ More

    Submitted 30 September, 2020; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Accepted at the ACM Internet Measurement Conference 2020 (IMC'20)

  8. arXiv:2006.04806  [pdf, other

    cs.CR

    SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses

    Authors: Ruimin Sun, Alejandro Mera, Long Lu, David Choffnes

    Abstract: Programmable Logic Controllers (PLCs) play a critical role in the industrial control systems. Vulnerabilities in PLC programs might lead to attacks causing devastating consequences to the critical infrastructure, as shown in Stuxnet and similar attacks. In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic. Looking back on past research, we found e… ▽ More

    Submitted 23 March, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: 18 pages w/ ref, Sok, PLC, ICS, CPS, attack, formal verification

    ACM Class: A.1; C.3

  9. arXiv:2003.07133  [pdf, other

    cs.NI cs.CR

    Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations

    Authors: Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes

    Abstract: The consumer Internet of Things (IoT) space has experienced a significant rise in popularity in the recent years. From smart speakers, to baby monitors, and smart kettles and TVs, these devices are increasingly found in households around the world while users may be unaware of the risks associated with owning these devices. Previous work showed that these devices can threaten individuals' privacy… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: 5 pages, 1 figure, 3 tables

  10. arXiv:1905.04651  [pdf, ps, other

    cs.NI cs.LG

    Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources

    Authors: Muzammil Abdul Rehman, Sharon Goldberg, David Choffnes

    Abstract: When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer. A critical stumbling block is a dearth of tools that accurately map routers traversed by Internet traffic to the countries in which they are located. This paper presents Passport: a new approach for efficient, accurate country-level ro… ▽ More

    Submitted 23 July, 2019; v1 submitted 12 May, 2019; originally announced May 2019.

  11. arXiv:1803.01261  [pdf, other

    cs.NI cs.CR

    AntShield: On-Device Detection of Personal Information Exposure

    Authors: Anastasia Shuba, Evita Bakopoulou, Milad Asgari Mehrabadi, Hieu Le, David Choffnes, Athina Markopoulou

    Abstract: Mobile devices have access to personal, potentially sensitive data, and there is a growing number of applications that transmit this personally identifiable information (PII) over the network. In this paper, we present the AntShield system that performs on-device packet-level monitoring and detects the transmission of such sensitive information accurately and in real-time. A key insight is to dist… ▽ More

    Submitted 3 March, 2018; originally announced March 2018.

  12. arXiv:1511.04493  [pdf, other

    cs.NI cs.CR

    Client-Side Web Proxy Detection from Unprivileged Mobile Devices

    Authors: Hui**g Zhang, David Choffnes

    Abstract: Mobile devices that connect to the Internet via cellular networks are rapidly becoming the primary medium for accessing Web content. Cellular service providers (CSPs) commonly deploy Web proxies and other middleboxes for security, performance optimization and traffic engineering reasons. However, the prevalence and policies of these Web proxies are generally opaque to users and difficult to measur… ▽ More

    Submitted 13 November, 2015; originally announced November 2015.

  13. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

    Authors: **g**g Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David Choffnes

    Abstract: It is well known that apps running on mobile devices extensively track and leak users' personally identifiable information (PII); however, these users have little visibility into PII leaked through the network traffic generated by their devices, and have poor control over how, when and where that traffic is sent and handled by third parties. In this paper, we present the design, implementation, an… ▽ More

    Submitted 19 August, 2016; v1 submitted 1 July, 2015; originally announced July 2015.

    Comments: Please use MobiSys version when referencing this work: http://dl.acm.org/citation.cfm?id=2906392. 18 pages, recon.meddle.mobi