Papers
Topics
Authors
Recent
Search
2000 character limit reached

ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

Published 1 Jul 2015 in cs.CR and cs.NI | (1507.00255v3)

Abstract: It is well known that apps running on mobile devices extensively track and leak users' personally identifiable information (PII); however, these users have little visibility into PII leaked through the network traffic generated by their devices, and have poor control over how, when and where that traffic is sent and handled by third parties. In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. ReCon leverages machine learning to reveal potential PII leaks by inspecting network traffic, and provides a visualization tool to empower users with the ability to control these leaks via blocking or substitution of PII. We evaluate ReCon's effectiveness with measurements from controlled experiments using leaks from the 100 most popular iOS, Android, and Windows Phone apps, and via an IRB-approved user study with 92 participants. We show that ReCon is accurate, efficient, and identifies a wider range of PII than previous approaches.

Citations (237)

Summary

  • The paper introduces ReCon, a cross-platform system using machine learning to detect and control personally identifiable information (PII) leaks in mobile network traffic without needing OS modifications.
  • ReCon achieved a 98.1% accuracy rate in identifying PII leaks from 100 popular apps, detecting device identifiers in over 50% of apps and outperforming other information flow analysis techniques.
  • ReCon empowers users with visibility and control over their data and suggests network-level detection as a promising approach to enhance mobile privacy protection.

An Analysis of ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic

The paper "ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic" addresses the pervasive issue of personally identifiable information (PII) leaks from mobile apps, offering a cross-platform system called ReCon to mitigate this problem. This research is pertinent given the widespread usage of mobile devices, which are potential vectors for privacy invasions due to their connectivity and integrated sensors.

Overview and Methodology

ReCon is designed to interpose on network traffic, using machine learning to detect PII leaks, thus providing users with visibility and control over their data without requiring OS modifications or special privileges. Evaluative measurements were performed on a dataset consisting of network flows from 100 popular apps across iOS, Android, and Windows platforms. The results validated ReCon's accuracy, with a 98.1% accuracy rate in identifying leaks—remarkably efficient as it achieves classification in under one millisecond.

The system leverages a decision tree (DT) classifier to identify leaks, a choice supported by the model's ability to grasp the structured nature of most PII-leaking data. Interestingly, the DT approach outperformed alternative ensemble methods (like AdaBoost and Bagging) in terms of computational efficiency with minimal sacrifice in accuracy. The researchers incorporate user feedback into continuous machine learning training processes to further improve ReCon's accuracy over time.

Key Findings

Empirical results from the study revealed significant leaks of device identifiers in more than 50% of apps across all tested platforms. The paper also identifies less frequent leaks, such as user identifiers and even plain-text passwords, underscoring the severity of mobile privacy invasions. Additionally, ReCon has shown to identify more PII leaks compared to three alternative information flow analysis techniques. Its ability to detect PII leaks on encrypted channels further broadens its scope of applicability.

Implications and Future Directions

The paper raises important implications for privacy protection practices in mobile networks. It suggests that adopting network-level PII leak detection and control systems could enhance users' privacy without requiring intrusive modifications to the device's OS. Furthermore, by enabling real-time monitoring and adjustment of PII sharing, ReCon could foster more transparent interactions between users and app developers.

Future research directions could involve refining machine learning models to better address obfuscation techniques and encrypted traffic flows, thus broadening the tool's applicability and resilience against evolving privacy invasion tactics. Additionally, crowd-sourcing approaches for collecting user feedback could improve the coverage and accuracy of leak detection, while also helping to address privacy concerns on a wider scale.

Conclusion

ReCon is a significant contribution to mobile privacy research, providing a practical mechanism for users to understand and control the flow of their PII. This system is compelling not only for its technical efficacy but also as a manifest example of integrating user feedback into adaptive, privacy-preserving technology. The future development of ReCon, especially in terms of enhancing its capability to detect sophisticated leaks, could set new benchmarks in the field of privacy management in ubiquitous mobile computing environments.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.