论文标题
在监视资本主义的生态系统中邻近追踪
Proximity Tracing in an Ecosystem of Surveillance Capitalism
论文作者
论文摘要
已经提出了接近跟踪应用程序作为处理Covid-19危机的助手。其中一些应用程序利用移动设备的蓝牙信标的衰减衰减,以建立一对设备所有者之间接触的近距离遇到的记录。众所周知,基础方案会遭受假阳性和重新识别攻击。我们提供的证据表明,攻击者在安装此类攻击方面的困难已被高估。确实,一个使用蓝牙和位置访问的攻击者利用中等成功的应用程序或SDK可以以无硬件成本窃听并干扰这些接近的跟踪系统,并对未安装此应用程序或SDK的用户进行这些攻击。我们描述了演员的具体例子,他们将处于执行此类攻击状态。我们进一步提出了一种新颖的攻击,我们称之为生物监视攻击,该攻击使攻击者可以监视安装其应用程序或SDK的智能手机用户的曝光风险,但他们不使用任何接触式跟踪系统,并且可能会错误地相信他们选择退出该系统。 通过使用仪器测试台进行交通审核,我们精确地表征了一个这样的SDK的行为,我们在少数应用程序中发现,但安装在超过一亿个移动设备上。它的行为在功能上与重新识别或生物监视攻击无法区分,并且能够以最小的努力执行假积极攻击。我们还讨论了攻击者如何通过利用Lax Logic授予Android框架中的应用程序的权限来获得有利于此类攻击的职位:任何具有某些地理位置许可的应用程序都可以通过升级获得必要的蓝牙许可,而无需任何其他用户提示。最后,我们讨论进行此类攻击的动机。
Proximity tracing apps have been proposed as an aide in dealing with the COVID-19 crisis. Some of those apps leverage attenuation of Bluetooth beacons from mobile devices to build a record of proximate encounters between a pair of device owners. The underlying protocols are known to suffer from false positive and re-identification attacks. We present evidence that the attacker's difficulty in mounting such attacks has been overestimated. Indeed, an attacker leveraging a moderately successful app or SDK with Bluetooth and location access can eavesdrop and interfere with these proximity tracing systems at no hardware cost and perform these attacks against users who do not have this app or SDK installed. We describe concrete examples of actors who would be in a good position to execute such attacks. We further present a novel attack, which we call a biosurveillance attack, which allows the attacker to monitor the exposure risk of a smartphone user who installs their app or SDK but who does not use any contact tracing system and may falsely believe that they have opted out of the system. Through traffic auditing with an instrumented testbed, we characterize precisely the behaviour of one such SDK that we found in a handful of apps---but installed on more than one hundred million mobile devices. Its behaviour is functionally indistinguishable from a re-identification or biosurveillance attack and capable of executing a false positive attack with minimal effort. We also discuss how easily an attacker could acquire a position conducive to such attacks, by leveraging the lax logic for granting permissions to apps in the Android framework: any app with some geolocation permission could acquire the necessary Bluetooth permission through an upgrade, without any additional user prompt. Finally we discuss motives for conducting such attacks.