security

UTSA graduate students find security vulnerabilities in Life360 app – UTSA


“I take an experiential learning approach to facilitate students’ learning experiences in my classes,” said Raymond Choo, Cloud Technology Endowed Professor in the UTSA Department of Information Systems and Cyber Security. “In my graduate digital forensics course, the students complete a semester-long, open-ended research assignment, which is designed to foster and promote student creativity and engagement.”

The first task for the research team was finding something they could be hands-on with, said Aagaard, who also serves as assistant vice provost for collections and curriculum support at the UTSA Libraries.

“Professor Choo suggested that mobile forensics is a growing field to explore,” Aagaard said. “We looked at several different apps, but we chose this one because one of our group members had a family member who used it and it has a huge adoption rate. We thought it could make an interesting case study. We didn’t go into the project expecting specific forensic findings, so when we got our results they really stood out.”

As part of their study, the students looked at two main areas: the artifacts that were left behind on devices from the app and the networking or transmission of data from the app. Utilizing a variety of industry tools they looked for data that users might not want publicly disclosed.

“We really wanted the data to tell us what we were going to find,” said Aagaard. “We learned the way that data could be compromised. And there was a little bit of irony or concern because this is an app that was designed to make people feel safe.”

Readers Also Like:  Space Systems Command establishes new avenue to connect with ... - DVIDS

One of their key findings was that having access to one person’s device makes everybody in their circle vulnerable because of the way the data is shared across these overlapping social circles. They also discovered multiple forensic artifacts that comprised significant amounts of personal data.

For paid users, additional data such as driving safety is collected. The students found that driving data is pushed to third-party providers, which the company discloses. Even if you aren’t a user of this app, a passenger in your car could collect driving data from you through their participation.

“Our goal wasn’t for people to stop using the app, but just to bring awareness,” said Aagaard. “The premise of the app is to be able to share your location with people. You don’t need to drag somebody down into the technical details, but there are certain things people can do that will give you a better outlook of the vulnerabilities that do exist.”

While this wasn’t Aagaard’s first publication, it was her first technical paper. Hoping to graduate with her master’s degree by the end of the year, she is a huge fan of the college’s cyber security program.

“The program is great. I love that it integrates academia, government and industry,” she said. “I really feel like we’ve got great experts teaching the classes and students who really like the field.”



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.