Mostrar el registro sencillo del ítem

dc.contributor.authorGirish, Aniketh 
dc.contributor.authorReardon, Joel
dc.contributor.authorTapiador, Juan
dc.contributor.authorMatic, Srdjan 
dc.contributor.authorVallina-Rodriguez, Narseo 
dc.date.accessioned2025-04-10T11:20:46Z
dc.date.available2025-04-10T11:20:46Z
dc.date.issued2025-07-14
dc.identifier.urihttps://hdl.handle.net/20.500.12761/1910
dc.description.abstractMobile apps frequently use Bluetooth Low Energy (BLE) and WiFi scanning permissions to discover nearby devices like peripherals and connect to WiFi Access Points (APs). However, wireless interfaces also serve as a covert proxy for geolocation data, enabling continuous user tracking and profiling. This includes technologies like BLE beacons, which are BLE devices broadcasting unique identifiers to determine devices’ indoor physical locations; such beacons are easily found in shopping centres. Despite the widespread use of wireless scanning APIs and their potential for privacy abuse, the interplay between commercial mobile SDKs with wireless sensing and beaconing technologies remains largely unexplored. In this work, we conduct the first systematic analysis of 52 wireless-scanning SDKs, revealing their data collection practices and privacy risks. We develop a comprehensive analysis pipeline that enables us to detect beacon scanning capabilities, inject wireless events to trigger app behaviors, and monitor runtime execution on instrumented devices. Our findings show that 86% of apps integrating these SDKs collect at least one sensitive data type, including device and user identifiers such as AAID, email, along with GPS coordinates, WiFi and Bluetooth scan results. We uncover widespread SDK-to-SDK data sharing and evidence of ID bridging, where persistent and resettable identifiers are shared and synchronized within SDKs embedded in applications to potentially construct detailed mobility profiles, compromising user anonymity and enabling long-term tracking. We provide evidence of key actors engaging in these practices and conclude by proposing mitigation strategies such as stronger SDK sandboxing, stricter enforcement of platform policies, and improved transparency mechanisms to limit unauthorized tracking.es
dc.language.isoenges
dc.titleYour Signal, Their Data: An Empirical Privacy Analysis of Wireless-scanning SDKs in Androides
dc.typeconference objectes
dc.conference.date14-19 July 2025es
dc.conference.placeWashington, DC, USAes
dc.conference.titlePrivacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies) *
dc.event.typeconferencees
dc.pres.typepaperes
dc.type.hasVersionAMes
dc.rights.accessRightsopen accesses
dc.acronymPETS*
dc.rankA*
dc.subject.keywordPrivacy, BLE, WiFi, Location, Beacons, Android SDKses
dc.description.refereedTRUEes
dc.description.statusinpresses


Ficheros en el ítem

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem