skip to main content
10.1145/1455770.1455806acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Privacy oracle: a system for finding application leaks with black box differential testing

Published:27 October 2008Publication History

ABSTRACT

We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle treats each application as a black box, without access to either its internal structure or communication protocols. This means that it can be used over a broad range of applications and information leaks (i.e., not only Web traffic or credit card numbers). To accomplish this, we develop a differential testing technique in which perturbations in the application inputs are mapped to perturbations in the application outputs to discover likely leaks; we leverage alignment algorithms from computational biology to find high quality mappings between different byte-sequences efficiently. Privacy Oracle includes this technique and a virtual machine-based testing system. To evaluate it, we tested 26 popular applications, including system and file utilities, media players, and IM clients. We found that Privacy Oracle discovered many small and previously undisclosed information leaks. In several cases, these are leaks of directly identifying information that are regularly sent in the clear (without end-to-end encryption) and which could make users vulnerable to tracking by third parties or providers.

References

  1. http://www.autoitscript.com/autoit3/.Google ScholarGoogle Scholar
  2. Marshall Beddoe. The protocol informatics project. http://www4tphi.net/~awaiters/PI/PI.html, 2004.Google ScholarGoogle Scholar
  3. Gerald Combs. Wireshark. http://www.wireshark.org.Google ScholarGoogle Scholar
  4. Weidong Cui, Vern Paxson, and Nicholas Weaver. Protocol-Independent Adaptive Replay of Application Dialog. In NDSS, 2006.Google ScholarGoogle Scholar
  5. Robert B. Evans and Alberto Savoia. Differential testing: a new approach to change detection. In ESEC-FSE posters, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Leita Corrado gand Ken Mermoud and Marc Dacier. Scriptgen: an automated script generation tool for honeyd. In ACSAC, December 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. W. Hunt and M. D. McIlroy. An algorithm for differential file comparison, 1976.Google ScholarGoogle Scholar
  8. IEInspector Software LLC. IEInspector HTTP Analyzer -- HTTP Sniffer, HTTP Monitor, HTTP Trace, HTTP Debug. http://www.ieinspector.com/httpanalyzer/, 2007.Google ScholarGoogle Scholar
  9. Marc Fisher II, Sebastian Elbaum, and Gregg Rothermel. Dynamic characterization of web application interfaces. FASE 2007, LNCS, 4422:260--275, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Christian Kreibich and Jon Crowcroft. Efficient sequence alignment of network traffic. In IMC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Last Bit Software. RegSnap. http://www.lastbit.com/regsnap/.Google ScholarGoogle Scholar
  12. Stephen McCamant and Michael D. Ernst. Quantitative information flow as network flow capacity. In PLDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Barton P. Miller, Lars Fredriksen, and Bryan So. An empirical study of the reliability of UNIX utilities. CACM, 33(12):32--44, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Burkhard Morgenstern, Andreas Dress, and Thomas Werner. Multiple DNA and protein sequence alignment based on segment-to-segment comparison. PNAS, 93(22):12098--12103, October 1996.Google ScholarGoogle ScholarCross RefCross Ref
  15. Burkhard Morgenstern, Kornelie Frech, Andreas Dress, and Thomas Werner. Dialign: finding local similarities by multiple sequence alignment. Bioinformatics, 14(3):290--294, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  16. S.B. Needleman and C.D. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  17. NMMI. What is my machine Windows name? http://faq.nmmi.edu/fom- serve/cache/338.html, April 2005.Google ScholarGoogle Scholar
  18. Objective Development. Little Snitch. http://www.obdev.at/products/littlesnitch/.Google ScholarGoogle Scholar
  19. Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry Peterson. Characteristics of internet background radiation. In IMC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Vern Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23--24):2435--2463, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, and Tadayoshi Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In 16th Usenix Security Symposium, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. http://yro.slashdot.org/yro/07/12/29/2120202.shtml.Google ScholarGoogle Scholar
  23. http://yro.slashdot.org/yro/08/01/03/1630203.shtml.Google ScholarGoogle Scholar
  24. Stuart Cheshire and Marc Krochmal. Multicast DNS. http://files.multicastdns.org/draft-cheshire-dnsext-multicastdns.txt, 2006.Google ScholarGoogle Scholar
  25. The Canadian Internet Policy and Public Interest Clinic. Digital Rights Management and Consumer Privacy. http://www.cippic.ca, September 2007.Google ScholarGoogle Scholar
  26. VIP Defense: privacy and anonymity keeping company. VIP Privacy. http://www.vipdefense.com/.Google ScholarGoogle Scholar
  27. http://www.vmware.com/.Google ScholarGoogle Scholar
  28. WebSense. WebSense Content Protection Suite. http://www.websense.com/, 2008.Google ScholarGoogle Scholar
  29. Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Aydan R. Yumerefendi, Benjamin Mickle, and Landon P. Cox. Tightlip: Keeping applications from spilling the beans. In NSDI, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy oracle: a system for finding application leaks with black box differential testing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
      October 2008
      590 pages
      ISBN:9781595938107
      DOI:10.1145/1455770

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '08 Paper Acceptance Rate51of280submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader