论文标题

关于接触追踪申请的隐私和完整性风险

On the Privacy and Integrity Risks of Contact-Tracing Applications

论文作者

Huang, Jianwei, Yegneswaran, Vinod, Porras, Phillip, Gu, Guofei

论文摘要

基于智能手机的接触追踪应用程序是全球反对COVID-19大流行的全球斗争的中心。尽管政府和医疗保健机构渴望部署此类应用程序,但他们面临着受欢迎的媒体,安全公司和人权观察机构的越来越多的审查,这些机构担心将这些技术剥削为监视工具。找到社区安全与隐私之间的最佳平衡一直是一个挑战,解决这些问题的策略在国家之间有所不同。本文描述了两次重要的攻击,影响了广泛的接触追踪应用程序。第一个被称为接触式攻击,是一种用户私人攻击,可用于识别附近附近的潜在感染患者。第二个是接触污染攻击,它通过导致它们产生大量的假阳性警报来影响接触跟踪应用程序的完整性。我们开发了原型实现,并在DP-3T应用程序框架的背景下评估了这两个攻击,但是这些漏洞会影响更广泛的应用程序。我们发现,这两种攻击都是可行的,并且具有最小的攻击者工作因素。我们通过使用模拟研究和Safegraph数据库的测量进行了对这些攻击的影响评估。我们的结果表明,监测点的适度数字(按10,000的订单)发射的攻击可以有效地在5-40%的受感染用户(例如休斯顿)中的受感染用户分解。

Smartphone-based contact-tracing applications are at the epicenter of the global fight against the Covid-19 pandemic. While governments and healthcare agencies are eager to mandate the deployment of such applications en-masse, they face increasing scrutiny from the popular press, security companies, and human rights watch agencies that fear the exploitation of these technologies as surveillance tools. Finding the optimal balance between community safety and privacy has been a challenge, and strategies to address these concerns have varied among countries. This paper describes two important attacks that affect a broad swath of contact-tracing applications. The first, referred to as contact-isolation attack, is a user-privacy attack that can be used to identify potentially infected patients in your neighborhood. The second is a contact-pollution attack that affects the integrity of contact tracing applications by causing them to produce a high volume of false-positive alerts. We developed prototype implementations and evaluated both attacks in the context of the DP-3T application framework, but these vulnerabilities affect a much broader class of applications. We found that both attacks are feasible and realizable with a minimal attacker work factor. We further conducted an impact assessment of these attacks by using a simulation study and measurements from the SafeGraph database. Our results indicate that attacks launched from a modest number (on the order of 10,000) of monitoring points can effectively decloak between 5-40\% of infected users in a major metropolis, such as Houston.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源