Protecting the Network Traffic of One Billion People: Transport Security in the Global Mobile Ecosystem

محفوظ في:
التفاصيل البيبلوغرافية
الحاوية / القاعدة:ProQuest Dissertations and Theses (2025)
المؤلف الرئيسي: Wang Li, Mona
منشور في:
ProQuest Dissertations & Theses
الموضوعات:
الوصول للمادة أونلاين:Citation/Abstract
Full Text - PDF
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!

MARC

LEADER 00000nab a2200000uu 4500
001 3257274291
003 UK-CbPIL
020 |a 9798293899692 
035 |a 3257274291 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Wang Li, Mona 
245 1 |a Protecting the Network Traffic of One Billion People: Transport Security in the Global Mobile Ecosystem 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a TLS is the de-facto standard for encrypting network communications. Today, upwards of 80% of pages loaded on Firefox, Chrome, and Safari are encrypted with TLS. This might be the story for web, but what about mobile? Existing measurements of mobile network encryption fall short: they often focus on the Google Play ecosystem, which necessarily excludes mobile users in China, who comprise a massive portion of the global Internet.This thesis demonstrates that HTTPS is, in fact, not everywhere, and that a massive portion of mobile network communications remains poorly encrypted and accessible to systems of mass surveillance. These issues are particularly concentrated in mobile applications developed in China, which have been overlooked by the global security community despite their massive popularity and influence.Three studies provide different perspectives that demonstrate both the (1) massive popularity of proprietary network encryption protocols in top mobile applications, and (2) the insecurity of such homegrown protocols. First, I present our reverse-engineering of WeChat’ s proprietary transport encryption protocol and subsequent privacy analysis of the WeChat Mini Program ecosystem. Then, I review the network encryption used by popular Chinese keyboards to encrypt user keystrokes. Finally, I present a large-scale study of encryption protocols used by thousands of popular mobile applications.I discovered severe vulnerabilities enabling network attackers to decrypt sensitive data in the vast majority of the proprietary encryption protocols we analyzed. Through the vulnerabilities fixed as a result of this work, this research has directly improved the network security of over one billion people. 
653 |a Computer science 
653 |a Computer engineering 
653 |a Technical communication 
653 |a Information technology 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t Publicly Available Content Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3257274291/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3257274291/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch