Big Data & Security. Edgar Weippl SBA Research



Similar documents
EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications

Re-evaluating Smartphone Messaging Application Security

3 rd Young Researcher s Day 2013

I Textarbeit. Text 1. I never leave my horse

Is Cloud relevant for SOA? Corsin Decurtins

GETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

Radio D Teil 1. Deutsch lernen und unterrichten Arbeitsmaterialien. Episode 01 A Visit to the Countryside

Organizational Details Summer 2015

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:

Online Rumors. Lauren didn t think much of it when a classmate came. Lauren didn t have to ask where on the Internet;

All the English here is taken from students work, both written and spoken. Can you spot the errors and correct them?

Lernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone

Search Engines Chapter 2 Architecture Felix Naumann

Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft

2016 ABFF STAR PROJECT MONOLOGUE CHOICES

Forensic Acquisition and Analysis of Tango VoIP

2012 NCSA / McAfee Online Safety Survey

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL

Bei Fragen zu dieser Änderung wenden Sie sich bitte an Ihren Kundenbetreuer, der Ihnen gerne weiterhilft.

Varieties of specification and underspecification: A view from semantics

Thomas Ragni (Seco, CH): SAPS for choosing effective measures in Switzerland SAPS. Statistically Assisted Program Selection

Big Data for Social Good. Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Network and device forensic analysis of Android social- messaging applica=ons

Formal Methods and the Internet of Things

Exemplar for Internal Assessment Resource German Level 1. Resource title: Planning a School Exchange

Embedded Software Development and Test in 2011 using a mini- HIL approach

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

Product Availability List Graphic Arts Film Products. September 2007 (version 3.0)

IoT - Wie die Flut an Daten nutzbar wird

A. Arguments are made up of statements, which can be either true or false. Which of the following are statements?

Great Books: Tales of Edgar Allan Poe Teacher s Guide

DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used.

Quantified Self: Analyzing the Big Data of our Daily Life. Andreas Schreiber PyData Berlin 2014

language-related erp components: n400


Machine Learning for natural language processing

MUSTER. ENGLISH G 21/D3 Test No. 1 Unit 1: My London. 1 LISTENING The London Eye. G - Level: Listen to three texts and tick the correct box.

How to Use the California Identity Theft Registry

Uncover security risks on your enterprise network

Mobile Cloud Computing In Business


SOOKASA WHITEPAPER CASB SECURITY OVERVIEW.

Whereas I was Blind, Now I See. John 9: 1-11; 25

Home Invasion Safety. Protecting Your Family

BMC DB2 Entwicklungsstrategie, Performance Advisor und mehr! Peter Plevka, BMC Software

Post-Traumatic Stress Disorder

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Programmieren von Schnittstellen für LiveCycle ES2-Modulen (November 2009)

The Basics of Building Credit

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

The 20/20 Club Training Manual

Digital Citizenship Lesson Plan

For those of you keen to have a written version on the podcast, here is the script below:

Chapter 1 Introduction to Correlation

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?

Copyright 2013, Oracle and/or its affiliates. All rights reserved. Customer Presentation

Wir stellen uns vor We introduce ourselves

The Five W's of SOC Operations. Kevin

Green Building Water Technology: Use of Renewable Water Resources in Multi-Storey Buildings

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Coffee Break German. Lesson 03. Study Notes. Coffee Break German: Lesson 03 - Notes page 1 of 15

Sermon Promise in Unexpected Places Genesis 39:1-23, September 21, 2014

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Hitachi inverter user manual

Irvine Police Victim Advocate s Office

FOR TEACHERS ONLY SECOND LANGUAGE PROFICIENCY EXAMINATION GERMAN. Monday, June 18, :15 a.m. SCORING KEY

Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna)

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Transcription:

Big Data & Security Edgar Weippl SBA Research

Security Challenges Confidentiality Cloud storage (e.g. Dropbox) Authentication (e.g. WhatsApp) Open data vs. unintended data leaks Availability Dependability on infrastructure Complex and hidden dependability Integrity incomplete data, entry errors, processing, sensors, social media, latency of information, deception, modeling approximations,

Privacy won t work 1. My data should not have an impact on the results released. 2. One should learn nothing about me. Ad 1) then the results have no utility. Ad 2) even if you do share your data, the trend is true for you.

Privacy that might work Weaker assumption: Differential Privacy Given result R can anyone guess which possible world it came from? Result R Prob (R) = A A B Prob (R) = B Possible world with MY data Possible world without my data

Risks Small Data Intake Age Total Priors Gender Race Source: Richard Berk, The Role of Race in Forecasts of Violent Crime, Race Soc. Probl. Dec 2009; 1(4): 231-242, DOI 10.1007/s12552-009-9017-z http://wwwstat.wharton.upenn.edu/~berkr/race%20copy. pdf

Future Attribute Screening Technology (FAST) Crimethink - Facecrime Science-fiction concept of 'pre-crime', in which security services can detect someone's intention to commit a crime. DHS has claimed accuracy rates of around 70%. Really? Minority Report Source: Sharon Weinberger, Terrorist 'precrime' detector field tested in United States, online 27 May 2011, Nature, doi:10.1038/news.2011.323

Looking for terrorists Let s assume we have an analysis tool with 98 % sensitivity and 99% specificity. Our software flags a person as a possible terrorists. Heavily armed you enter the apartment. How likely is that you really have a terrorist looking into barrel of your gun? a. 98 % (sensitivity)? b. 99 % (specificity)? c. None of the above? ~ 100 / 5.000.000 ~ 1 / 50.000

Statistics refresher 500 Mio people 100 terrorists 499 999 900 innocent people 2 terrorists are not found 98 terrorists are found Approx. 5 Mio innocent people are interrogated by police They were lucky

This will never happen Auffällig sei der Gebrauch von Fachbegriffen wie Gentrifizierung, heißt es in den Akten. An jenem Sommertag vor einem Jahr ist es schon morgens um 7 Uhr sehr warm. Holm läuft halbnackt durch die Wohnung, als Polizisten mit gezogenen Waffen hereinstürmen und ihn zu Boden werfen. Source: Hannes Heine, Man weiß jetzt, was Gentrifizierung ist, Der Tagesspiegel Berlin, 1.8.2008, http://www.tagesspiegel.de/berlin/stadtsoziologe-andrej-holm-man-weiss-jetzt-was-gentrifizierungist/1826246.html

Ever think you re being watched? It isn t the consumers job to know what they want. Source: Steve Lohr, Can Apple Find More Hits Without Its Tastemaker? The New York Times, Jan 18, 2011 Market research is very good at determining consumer preferences among products that currently exist. Source: Peter Noel Murray, How Steve Jobs Knew What You Wanted, Psychology Today, Oct 13, 2011, http://www.psychologytoday.com/blog/inside-theconsumer-mind/201110/how-steve-jobs-knewwhat-you-wanted

WhatsApp Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar R. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012), 2 2012.

Man-in-the-Middle

CERTIFICATES?

Authentication

In Reality

Even Worse Code = Hi!

Completely Stealthy

WowTalk

Status Messages

https://s.whatsapp.net/client/ iphone/u.php?cc=countrycode&me=p honenumber&s=statusmessage

Enumeration Attack

Enumeration Attack

Enumeration Attack

On vacation Sleeping At work... Bleh. Missing my love! Heartbroken Nicaragua in 4 days!! On my way to Ireland at work but not doing shit I m never drinking again

WhatsApp ebuddy XMS WowTalk Viber HeyTell Forfone Voypi Tango EasyTalk

Results

Contact Edgar Weippl eweippl@sba-research.org