From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling

被引:0
|
作者
Dimova, Yana [1 ]
Kode, Mrunmayee [1 ]
Kalantari, Shirin [1 ]
Wuyts, Kim [1 ]
Joosen, Wouter [1 ]
Muhlberg, Jan Tobias [2 ]
机构
[1] Katholieke Univ Leuven, DistriNet, Leuven, Belgium
[2] Univ Libre Bruxelles, Brussels, Belgium
关键词
privacy; privacy policy; threat modeling; case study; LINDDUN;
D O I
10.1145/3603216.3624962
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy threat modeling is a systematic approach to assess potential privacy risks which are a consequence of a given system design. Eliciting privacy threats requires a detailed understanding of system components and the ways in which these components interact. This makes it hard to impossible for any user, e.g., parties who interact with the system but do not possess knowledge about the inner workings of that system, to meaningfully engage in threat modeling and risk assessment. We explore an approach to address this problem by relying on information from a system's publicly available privacy policies to derive system models and apply threat modeling analyses. We chose the WhatsApp instant messaging system as a case study for privacy threat modeling from the perspective of a "regular" user. We apply the LINDDUN GO methodology and evaluate how threats evolved with time in two significant territorial areas, the European Union and India. Our study illustrates the impact of regulations and court cases and our approach may aid practitioners without inside knowledge to make informed choices regarding privacy risks when adopting third-party services.
引用
收藏
页码:17 / 29
页数:13
相关论文
共 50 条
  • [21] A Data Purpose Case Study of Privacy Policies
    Bhatia, Jaspreet
    Breaux, Travis D.
    2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 394 - 399
  • [22] Privacy Threat Modeling for Emerging BiobankClouds
    Gholami, Ali
    Lind, Anna-Sara
    Reichel, Jane
    Litton, Jan-Eric
    Edlund, Ake
    Laure, Erwin
    5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 : 489 - +
  • [23] Correction to: Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns
    Fue Zeng
    Qing Ye
    Zhilin Yang
    Jing Li
    Yiping Amy Song
    Journal of Business Ethics, 2022, 176 : 799 - 799
  • [24] Implementation of privacy policy-based protection system in BEMS based smart grid service
    Park, N. (namjepark@jejunu.ac.kr), 2013, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [25] Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools
    Zaeem, Razieh Nokhbeh
    Barber, K. Suzanne
    ICAART: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE - VOL 2, 2021, : 29 - 40
  • [26] The Challenges,the Threats and Policy Implications to a Compromised Privacy and Security
    Shahata, Nader
    2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 314 - 317
  • [27] Privacy Threat Modeling in Personalized Search Systems
    El-Ansari, Anas
    Birjali, Marouane
    Hankar, Mustapha
    Beni-Hssane, Abderrahim
    NETWORKING, INTELLIGENT SYSTEMS AND SECURITY, 2022, 237 : 311 - 325
  • [28] Analyzing Privacy Policies based on a Privacy-Aware Profile: the Facebook and LinkedIn case studies
    Caramujo, Joao
    da Silva, Alberto Rodrigues
    2015 IEEE 17TH CONFERENCE ON BUSINESS INFORMATICS, VOL 1, 2015, : 77 - 84
  • [29] Pattern-Based Incorporation of Privacy Preferences into Privacy Policies
    Mohammadi, Nazila Gol
    Pampus, Julia
    Heisel, Maritta
    PROCEEDINGS OF THE 24TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2019), 2019,
  • [30] Preva: Protecting Inference Privacy through Policy-based Video-frame Transformation
    Lu, Rui
    Shi, Siping
    Wang, Dan
    Hu, Chuang
    Zhang, Bihai
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 175 - 188