Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, Selcuk Uluagac
50 Shades of Support: A Device-Centric Analysis of Android Security Updates Conference Paper
In the Proceedings of the 31st Network and Distributed System Security Symposium (NDSS), 2024.
Abstract | Links | BibTeX | Tags: Android Security, Mobile Security
@conference{acar2024fifty,
title = {50 Shades of Support: A Device-Centric Analysis of Android Security Updates},
author = {Abbas Acar and Güliz Seray Tuncay and Esteban Luques and Harun Oz and Ahmet Aris and Selcuk Uluagac},
url = {https://research.google/pubs/50-shades-of-support-a-device-centric-analysis-of-android-security-updates/},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {In the Proceedings of the 31st Network and Distributed System Security Symposium (NDSS)},
abstract = {Android is by far the most popular OS with over three billion active mobile devices. As in any software, uncovering vulnerabilities on Android devices and applying timely patches are both critical. Android Open Source Project (AOSP) has initiated efforts to improve the traceability of security updates through Security Patch Levels (SPLs) assigned to devices. While this initiative provided better traceability for the vulnerabilities, it has not entirely resolved the issues related to the timeliness and availability of security updates for end users. Recent studies on Android security updates have focused on the issue of delay during the security update roll-out, largely attributing this to factors related to fragmentation. However, these studies fail to capture the entire Android ecosystem as they primarily examine flagship devices or do not paint a comprehensive picture of the Android devices’ lifecycle due to the datasets spanning over a short timeframe. To address this gap in the literature, we utilize a device-centric approach to analyze the security update behavior of Android devices. Our approach aims to understand the security update distribution behavior of OEMs (e.g., Samsung) by using a representative set of devices from each OEM and characterize the complete lifecycle of an average Android device. We obtained 367K official security update records from public sources, span- ning from 2014 to 2023. Our dataset contains 599 unique devices from four major OEMs that are used in 97 countries and are associated with 109 carriers. We identify significant differences in the roll-out of security updates across different OEMs, device models/types, and geographical regions across the world. Our findings show that the reasons for the delay in the roll-out of security updates are not limited to fragmentation but also involve OEM-specific factors. Our analysis also uncovers certain key issues that can be readily addressed as well as exemplary practices that can be immediately adopted by OEMs in practice.},
keywords = {Android Security, Mobile Security },
pubstate = {published},
tppubtype = {conference}
}
Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac
Sensitive Information Tracking in Commodity IoT Conference Paper
In the Proceedings of the 27th USENIX Security Symposium, 2018.
Abstract | Links | BibTeX | Tags: IoT Security, Mobile Security
@conference{Berkay2018InfoTrackingb,
title = {Sensitive Information Tracking in Commodity IoT},
author = {Z. Berkay Celik and Leonardo Babun and Amit Kumar Sikder and Hidayet Aksu and Gang Tan and Patrick McDaniel and A. Selcuk Uluagac},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/celik},
year = {2018},
date = {2018-08-01},
urldate = {2018-08-01},
booktitle = {In the Proceedings of the 27th USENIX Security Symposium},
abstract = {Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT applications have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to assess the security and privacy risks these devices present. In this paper, we present SainT, a static taint analysis tool for IoT applications. SainT operates in three phases; (a) translation of platform-specific IoT source code into an intermediate representation (IR), (b) identifying sensitive sources and sinks, and (c) performing static analysis to identify sensitive data flows. We evaluate SainT on 230 SmartThings market apps and find 138 (60%) include sensitive data flows. In addition, we demonstrate SainT on IoTBench, a novel open-source test suite containing 19 apps with 27 unique data leaks. Through this effort, we introduce a rigorously grounded framework for evaluating the use of sensitive information in IoT apps---and therein provide developers, markets, and consumers a means of identifying potential threats to security and privacy.},
howpublished = {In the proceedings of the 27th USENIX Security Symposium},
keywords = {IoT Security, Mobile Security },
pubstate = {published},
tppubtype = {conference}
}
Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services Conference Paper
In the proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2014.
Abstract | Links | BibTeX | Tags: Mobile Security , Privacy-preserving, Social Networks Security
@conference{LiaoS-matchIEEE2014,
title = {S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services},
author = {Xiaojing Liao and A. Selcuk Uluagac and Raheem A. Beyah},
url = {https://ieeexplore.ieee.org/abstract/document/6903587/},
year = {2014},
date = {2014-01-01},
urldate = {2014-01-01},
booktitle = {In the proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)},
abstract = {Mobile social services utilize profile matching to help users find friends with similar social attributes (e.g., interests, location, background). However, privacy concerns often hinder users from enabling this functionality. In this paper, we introduce S-MATCH, a novel framework for privacy-preserving profile matching based on property-preserving encryption (PPE). First, we illustrate that PPE should not be considered secure when directly used on social attribute data due to its key-sharing problem and information leakage problem. Then, we address the aforementioned problems of applying PPE to social network data and develop an efficient and verifiable privacy-preserving profile matching scheme. We implement both the client and server portions of S-MATCH and evaluate its performance under three real-world social network datasets. The results show that S-MATCH can achieve at least one order of magnitude better computational performance than the techniques that use homomorphic encryption.},
keywords = {Mobile Security , Privacy-preserving, Social Networks Security},
pubstate = {published},
tppubtype = {conference}
}
Citations: 8413
h-index: 44
i10-index: 107