SlideShare ist ein Scribd-Unternehmen logo
1 von 15
An Empirical Assessment of Global COVID-19
Contact Tracing Applications
ICSE’21
https://arxiv.org/abs/2006.10933
Ruoxi Sun*, Wei Wang*, Minhui Xue*,
Gareth Tyson+, Seyit Camtepe$, Damith C. Ranasinghe*
* The University of Adelaide
+ Queen Mary University of London
$ CSIRO-Data61
Motivation
• The rapid spread of COVID-19 has made
traditional manual contact tracing challenging.
• A number of public health authorities have
experimented with automated contact tracing
apps.
• These apps have raised security and privacy
concerns.
Main Contributions
We develop COVIDGuardian, the first automated security
and privacy assessment tool that tests contact tracing apps.
We assess the security and privacy status of 40 worldwide
Android contact tracing apps.
We identify 4 major privacy and security threats against
contact tracing apps.
We also conduct a user study involving 373 participants, to
investigate user concerns and requirements.
We have disclosed our security and privacy assessment
reports to the related stakeholders.
Overview
Centralized Decentralized
• Collects the contact records from
diagnosed users
• Evaluates health status by server
• Collects the token of diagnosed users
• Evaluates health status by users
Contact Tracing Applications
Google and Apple
NHS COVID-19, UK
Corona Warn App, Germany
TraceTogether, Singapore
COVIDSafe, Australia
StopCovid, France
Security Assessment
Security Assessment - Methodology
An overview of our security and privacy assessment methodology
COVIDGuardian
Security Assessment - Results
• Use at least one deprecated cryptographic algorithm (73%)
• Allow “Clear Text Storage” (55%)
• Allow Backup (43%)
• Contain trackers (75%)
• The top sources of sensitive data: Location and
database.Cursor
• Most of the sensitive data will be transferred to sinks, such as
Bundle, Service, and OutputStream
• Some apps transmit location information through SMS
messages
• We discovered one application, Stop COVID-19 KG (Kyrgyzstan),
containing malware.
Security Assessment – Regression Testing
• One month after disclosing our findings with the
developers, we re-checked the new versions of contact
tracing apps.
• Fixed security issues - TraceTogether, BluZone, STOP
COVID19 Cat
• Removed trackers - Mysejahtera
• No longer available in Play Store - Contact Tracer
• New vulnerabilities are identified in some apps
• The urgency of app developments may impact quality
assurance procedures
Privacy Risk Evaluation – Potential Attacks
Linkage attack by the server Linkage attack by users
False-positive claims Relay attack
Privacy Risk Evaluation - User Privacy Exposure
- Secure, No data is shared with a server or users;
- Medium-risk, Non-PII tokens are shared with proximity users;
- Medium-risk, Non-PII tokens are shared with the server;
- High-risk, PII is shared with a server;
- Highest-risk, PII is released to public.
- The system is well protected
- The system is at-risk
- Inadequate information to conduct an assessment
- Centralized system
- Decentralized system
User Study - Design
• 373 volunteers in Australia
• Age - 18-29 years old
• Nationality - 58% Oceania, 20% Asia
• Gender - 59% female, 39% male
• Education - 30% high school, 67% university graduates
Participants Survey Protocol
• Questionnaire with 5-point Likert scale questions
• Pencil-and-paper and online
• Likelihood of using contact tracing apps
• Functionality scenarios
• Accuracy of proximity contact detection
• Accuracy of at-risk alarm
• Privacy scenarios
• PII leakage
• Provide data to authorities if diagnosed
• Concerns about use of contact tracing apps
• Usability
• Effectiveness
• Concerns about privacy
Privacy Scenarios
• Type A - Centralized, PII collected
• Type B - Centralized, non-PII collected
• Type C - Decentralized, PII collected
• Type D - Decentralized, non-PII collected
User Study - Results
- Extremely likely
- Extremely unlikely
- Extremely likely
- Extremely unlikely
- Extremely unconcerned
- Extremely concerned
• Privacy design and tracing accuracy impact the
likelihood of app use.
• Users are more likely to accept and use apps
with better privacy by design.
• If PII data is collected, users prefer a
centralized solution
Future Works
• Examine Bluetooth Low Energy and network
traffic originating from contact tracing
• Examine any vulnerabilities associated with iOS
counterparts.
Thank you!
Ruoxi Sun
ruoxi.sun@adelaide.edu.au
Supervised by Minhui (Jason) Xue
jason.xue@adelaide.edu.au

Weitere ähnliche Inhalte

Was ist angesagt?

5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication SuccessSpok
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSupporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSaama
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationMedigate
 
LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to productionЮрий Чудинов
 
EMR Implementation Considerations Slides
EMR Implementation Considerations SlidesEMR Implementation Considerations Slides
EMR Implementation Considerations SlidesPiLNAfrica
 
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2matthewabq
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsBugRaptors
 
AppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User ExperienceAppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User ExperiencePaul Davenport
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesHealthegy
 

Was ist angesagt? (17)

JP Mainguy Resume 2015
JP Mainguy Resume 2015JP Mainguy Resume 2015
JP Mainguy Resume 2015
 
Presentation
PresentationPresentation
Presentation
 
5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSupporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
Lob app-12012018
Lob app-12012018Lob app-12012018
Lob app-12012018
 
LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to production
 
EMR Implementation Considerations Slides
EMR Implementation Considerations SlidesEMR Implementation Considerations Slides
EMR Implementation Considerations Slides
 
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2
 
Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber Threats
 
Habib NISO Altmetrics Dec 2013
Habib NISO Altmetrics Dec 2013Habib NISO Altmetrics Dec 2013
Habib NISO Altmetrics Dec 2013
 
AppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User ExperienceAppNeta: SD-WAN & End User Experience
AppNeta: SD-WAN & End User Experience
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
 

Ähnlich wie An empirical assessment of global covid 19 contact tracing applications icse2021

Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRARDC
 
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...Edge AI and Vision Alliance
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security EssentialsSkoda Minotti
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017Ansgar Koene
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityIJCSIS Research Publications
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera readyMark Sinclair
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 

Ähnlich wie An empirical assessment of global covid 19 contact tracing applications icse2021 (20)

Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
APF2015-slides-general
APF2015-slides-generalAPF2015-slides-general
APF2015-slides-general
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security Essentials
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
Covid Safe Paths
Covid Safe PathsCovid Safe Paths
Covid Safe Paths
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Burton - Security, Privacy and Trust
Burton - Security, Privacy and TrustBurton - Security, Privacy and Trust
Burton - Security, Privacy and Trust
 

Kürzlich hochgeladen

Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxMohamedFarag457087
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusNazaninKarimi6
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIADr. TATHAGAT KHOBRAGADE
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...Monika Rani
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxseri bangash
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsOrtegaSyrineMay
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptxSilpa
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flyPRADYUMMAURYA1
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Silpa
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Silpa
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxUse of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxRenuJangid3
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptxryanrooker
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 

Kürzlich hochgeladen (20)

Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxUse of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptx
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 

An empirical assessment of global covid 19 contact tracing applications icse2021

  • 1. An Empirical Assessment of Global COVID-19 Contact Tracing Applications ICSE’21 https://arxiv.org/abs/2006.10933 Ruoxi Sun*, Wei Wang*, Minhui Xue*, Gareth Tyson+, Seyit Camtepe$, Damith C. Ranasinghe* * The University of Adelaide + Queen Mary University of London $ CSIRO-Data61
  • 2. Motivation • The rapid spread of COVID-19 has made traditional manual contact tracing challenging. • A number of public health authorities have experimented with automated contact tracing apps. • These apps have raised security and privacy concerns.
  • 3. Main Contributions We develop COVIDGuardian, the first automated security and privacy assessment tool that tests contact tracing apps. We assess the security and privacy status of 40 worldwide Android contact tracing apps. We identify 4 major privacy and security threats against contact tracing apps. We also conduct a user study involving 373 participants, to investigate user concerns and requirements. We have disclosed our security and privacy assessment reports to the related stakeholders.
  • 5. Centralized Decentralized • Collects the contact records from diagnosed users • Evaluates health status by server • Collects the token of diagnosed users • Evaluates health status by users Contact Tracing Applications Google and Apple NHS COVID-19, UK Corona Warn App, Germany TraceTogether, Singapore COVIDSafe, Australia StopCovid, France
  • 7. Security Assessment - Methodology An overview of our security and privacy assessment methodology COVIDGuardian
  • 8. Security Assessment - Results • Use at least one deprecated cryptographic algorithm (73%) • Allow “Clear Text Storage” (55%) • Allow Backup (43%) • Contain trackers (75%) • The top sources of sensitive data: Location and database.Cursor • Most of the sensitive data will be transferred to sinks, such as Bundle, Service, and OutputStream • Some apps transmit location information through SMS messages • We discovered one application, Stop COVID-19 KG (Kyrgyzstan), containing malware.
  • 9. Security Assessment – Regression Testing • One month after disclosing our findings with the developers, we re-checked the new versions of contact tracing apps. • Fixed security issues - TraceTogether, BluZone, STOP COVID19 Cat • Removed trackers - Mysejahtera • No longer available in Play Store - Contact Tracer • New vulnerabilities are identified in some apps • The urgency of app developments may impact quality assurance procedures
  • 10. Privacy Risk Evaluation – Potential Attacks Linkage attack by the server Linkage attack by users False-positive claims Relay attack
  • 11. Privacy Risk Evaluation - User Privacy Exposure - Secure, No data is shared with a server or users; - Medium-risk, Non-PII tokens are shared with proximity users; - Medium-risk, Non-PII tokens are shared with the server; - High-risk, PII is shared with a server; - Highest-risk, PII is released to public. - The system is well protected - The system is at-risk - Inadequate information to conduct an assessment - Centralized system - Decentralized system
  • 12. User Study - Design • 373 volunteers in Australia • Age - 18-29 years old • Nationality - 58% Oceania, 20% Asia • Gender - 59% female, 39% male • Education - 30% high school, 67% university graduates Participants Survey Protocol • Questionnaire with 5-point Likert scale questions • Pencil-and-paper and online • Likelihood of using contact tracing apps • Functionality scenarios • Accuracy of proximity contact detection • Accuracy of at-risk alarm • Privacy scenarios • PII leakage • Provide data to authorities if diagnosed • Concerns about use of contact tracing apps • Usability • Effectiveness • Concerns about privacy Privacy Scenarios • Type A - Centralized, PII collected • Type B - Centralized, non-PII collected • Type C - Decentralized, PII collected • Type D - Decentralized, non-PII collected
  • 13. User Study - Results - Extremely likely - Extremely unlikely - Extremely likely - Extremely unlikely - Extremely unconcerned - Extremely concerned • Privacy design and tracing accuracy impact the likelihood of app use. • Users are more likely to accept and use apps with better privacy by design. • If PII data is collected, users prefer a centralized solution
  • 14. Future Works • Examine Bluetooth Low Energy and network traffic originating from contact tracing • Examine any vulnerabilities associated with iOS counterparts.
  • 15. Thank you! Ruoxi Sun ruoxi.sun@adelaide.edu.au Supervised by Minhui (Jason) Xue jason.xue@adelaide.edu.au

Hinweis der Redaktion

  1. Hello everyone, I’m Ruoxi Sun from University of Adelaide, Australia. Today I’d like to present our research “Vetting s….”
  2. The motivation of our research is that While the global deployment of contact tracing apps aims to protect the health of citizens, these apps have raised security and privacy concerns
  3. The motivation of our research is that While the global deployment of contact tracing apps aims to protect the health of citizens, these apps have raised security and privacy concerns
  4. We assess the security performance of 34 worldwide Android contact tracing applications. We conducted code analysis using MobSF, dataflow analysis with FlowDroid and malware dectection using virustotal to evaluation Mainifest weakness, vulnerabilities, privacy leaks and malware
  5. At first, we look at into 10 solutions from 7 countries worldwide. In centralized solutions, there is a central server which Collects the contact records from diagnosed users And use this information evaluate users’ health status, and send out alarms to at-risk users. While in decentralized solution, users will download the diagnosed tokens from the back end server and match with local records to know if they are at-risk.
  6. We assess the security performance of 34 worldwide Android contact tracing applications. We conducted code analysis using MobSF, dataflow analysis with FlowDroid and malware dectection using virustotal to evaluation Mainifest weakness, vulnerabilities, privacy leaks and malware
  7. We assess the security performance of 34 worldwide Android contact tracing applications. We conducted code analysis using MobSF, dataflow analysis with FlowDroid and malware dectection using virustotal to evaluation Mainifest weakness, vulnerabilities, privacy leaks and malware
  8. The result shows that Over 90% of apps use at least one insecure cryptographic algorithms. Another frequent weakness is “Clear Text Storage” We found that about three quarters of apps contain at least one tracker which may leak user’s privacy. The data flow analysis shows that sensitive information may leak from sources to sinks, such as leak location information to output stream. Some apps even transmit location information through messages, which is extremely dangerous as other apps could also access the message sending box.
  9. We have disclosed our findings to related stakeholders received acknowledgements from numerous vendors Here is the results of regression testing, some apps do improve their security performance in updated versions.
  10. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  11. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  12. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  13. We evaluate user privacy exposure with 5 levels. In level 1, 2, & 3, there is on personal identifiable information shared with servers or users, which mean the user’s privacy is protected; However, in some solutions, such as COVIDSafe, Health Code, Hamagen, TraceTogether, and the Disease-19 website, user’s PII will be shared to server or even published to public.
  14. In future, we plan to examine BLE and network traffic and any vulnerabilities associated with iOS counterparts.