Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin
{"title":"地理定位司机:网约车服务中敏感数据泄露的研究","authors":"Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin","doi":"10.14722/ndss.2019.23052","DOIUrl":null,"url":null,"abstract":"Increasingly, mobile application-based ride-hailing \nservices have become a very popular means of transportation. \nDue to the handling of business logic, these services also contain \na wealth of privacy-sensitive information such as GPS locations, \ncar plates, driver licenses, and payment data. Unlike many of \nthe mobile applications in which there is only one type of users, \nride-hailing services face two types of users: riders and drivers. \nWhile most of the efforts had focused on the rider’s privacy, \nunfortunately, we notice little has been done to protect drivers. \nTo raise the awareness of the privacy issues with drivers, in \nthis paper we perform the first systematic study of the drivers’ \nsensitive data leakage in ride-hailing services. More specifically, \nwe select 20 popular ride-hailing apps including Uber and Lyft \nand focus on one particular feature, namely the nearby cars \nfeature. Surprisingly, our experimental results show that largescale \ndata harvesting of drivers is possible for all of the ridehailing \nservices we studied. In particular, attackers can determine \nwith high-precision the driver’s privacy-sensitive information \nincluding mostly visited address (e.g., home) and daily driving behaviors. \nMeanwhile, attackers can also infer sensitive information \nabout the business operations and performances of ride-hailing \nservices such as the number of rides, utilization of cars, and \npresence on the territory. In addition to presenting the attacks, \nwe also shed light on the countermeasures the service providers \ncould take to protect the driver’s sensitive information.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"11 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":"{\"title\":\"Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services\",\"authors\":\"Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin\",\"doi\":\"10.14722/ndss.2019.23052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increasingly, mobile application-based ride-hailing \\nservices have become a very popular means of transportation. \\nDue to the handling of business logic, these services also contain \\na wealth of privacy-sensitive information such as GPS locations, \\ncar plates, driver licenses, and payment data. Unlike many of \\nthe mobile applications in which there is only one type of users, \\nride-hailing services face two types of users: riders and drivers. \\nWhile most of the efforts had focused on the rider’s privacy, \\nunfortunately, we notice little has been done to protect drivers. \\nTo raise the awareness of the privacy issues with drivers, in \\nthis paper we perform the first systematic study of the drivers’ \\nsensitive data leakage in ride-hailing services. More specifically, \\nwe select 20 popular ride-hailing apps including Uber and Lyft \\nand focus on one particular feature, namely the nearby cars \\nfeature. Surprisingly, our experimental results show that largescale \\ndata harvesting of drivers is possible for all of the ridehailing \\nservices we studied. In particular, attackers can determine \\nwith high-precision the driver’s privacy-sensitive information \\nincluding mostly visited address (e.g., home) and daily driving behaviors. \\nMeanwhile, attackers can also infer sensitive information \\nabout the business operations and performances of ride-hailing \\nservices such as the number of rides, utilization of cars, and \\npresence on the territory. In addition to presenting the attacks, \\nwe also shed light on the countermeasures the service providers \\ncould take to protect the driver’s sensitive information.\",\"PeriodicalId\":20444,\"journal\":{\"name\":\"Proceedings 2019 Network and Distributed System Security Symposium\",\"volume\":\"11 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"29\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2019 Network and Distributed System Security Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14722/ndss.2019.23052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2019 Network and Distributed System Security Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14722/ndss.2019.23052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services
Increasingly, mobile application-based ride-hailing
services have become a very popular means of transportation.
Due to the handling of business logic, these services also contain
a wealth of privacy-sensitive information such as GPS locations,
car plates, driver licenses, and payment data. Unlike many of
the mobile applications in which there is only one type of users,
ride-hailing services face two types of users: riders and drivers.
While most of the efforts had focused on the rider’s privacy,
unfortunately, we notice little has been done to protect drivers.
To raise the awareness of the privacy issues with drivers, in
this paper we perform the first systematic study of the drivers’
sensitive data leakage in ride-hailing services. More specifically,
we select 20 popular ride-hailing apps including Uber and Lyft
and focus on one particular feature, namely the nearby cars
feature. Surprisingly, our experimental results show that largescale
data harvesting of drivers is possible for all of the ridehailing
services we studied. In particular, attackers can determine
with high-precision the driver’s privacy-sensitive information
including mostly visited address (e.g., home) and daily driving behaviors.
Meanwhile, attackers can also infer sensitive information
about the business operations and performances of ride-hailing
services such as the number of rides, utilization of cars, and
presence on the territory. In addition to presenting the attacks,
we also shed light on the countermeasures the service providers
could take to protect the driver’s sensitive information.