{"title":"Towards a Threat Model and Security Analysis for Contact Tracing Applications","authors":"Raiful Hasan, Mohammad Aminul Hoque, Ragib Hasan","doi":"10.1109/WF-IoT54382.2022.10152080","DOIUrl":null,"url":null,"abstract":"Pandemics have caused millions of infections and hundreds of thousands of deaths in recent years. To combat the spread of infection, researchers have explored contact tracing via smartphones. In contact tracing, the smartphones of the users exchange information with nearby smartphones via Bluetooth. If it is needed to explore the list of people someone has come into contact with, the contact tracing logs can be used to identify such people. However, such contact tracing apps have many security and privacy concerns. In this paper, we discuss the security and privacy issues of Contract Tracing Applications and analyze the threat model of such applications using the STRIDE model. We also use the model to assess the vulnerabilities in eight actual contact tracing apps from different regions.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WF-IoT54382.2022.10152080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Pandemics have caused millions of infections and hundreds of thousands of deaths in recent years. To combat the spread of infection, researchers have explored contact tracing via smartphones. In contact tracing, the smartphones of the users exchange information with nearby smartphones via Bluetooth. If it is needed to explore the list of people someone has come into contact with, the contact tracing logs can be used to identify such people. However, such contact tracing apps have many security and privacy concerns. In this paper, we discuss the security and privacy issues of Contract Tracing Applications and analyze the threat model of such applications using the STRIDE model. We also use the model to assess the vulnerabilities in eight actual contact tracing apps from different regions.