From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling

被引:0
|
作者
Dimova, Yana [1 ]
Kode, Mrunmayee [1 ]
Kalantari, Shirin [1 ]
Wuyts, Kim [1 ]
Joosen, Wouter [1 ]
Muhlberg, Jan Tobias [2 ]
机构
[1] Katholieke Univ Leuven, DistriNet, Leuven, Belgium
[2] Univ Libre Bruxelles, Brussels, Belgium
关键词
privacy; privacy policy; threat modeling; case study; LINDDUN;
D O I
10.1145/3603216.3624962
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy threat modeling is a systematic approach to assess potential privacy risks which are a consequence of a given system design. Eliciting privacy threats requires a detailed understanding of system components and the ways in which these components interact. This makes it hard to impossible for any user, e.g., parties who interact with the system but do not possess knowledge about the inner workings of that system, to meaningfully engage in threat modeling and risk assessment. We explore an approach to address this problem by relying on information from a system's publicly available privacy policies to derive system models and apply threat modeling analyses. We chose the WhatsApp instant messaging system as a case study for privacy threat modeling from the perspective of a "regular" user. We apply the LINDDUN GO methodology and evaluate how threats evolved with time in two significant territorial areas, the European Union and India. Our study illustrates the impact of regulations and court cases and our approach may aid practitioners without inside knowledge to make informed choices regarding privacy risks when adopting third-party services.
引用
收藏
页码:17 / 29
页数:13
相关论文
共 50 条
  • [31] Performance Evaluation of Policy-Based SQL Query Classification for Data-Privacy Compliance
    Schwab, Peter K.
    Röckl, Jonas
    Langohr, Maximilian S.
    Meyer-Wegener, Klaus
    Datenbank-Spektrum, 2021, 21 (03) : 191 - 201
  • [32] How to protect security and privacy in the IoT: a policy-based RFID tag management protocol
    Rekleitis, Evangelos
    Rizomiliotis, Panagiotis
    Gritzalis, Stefanos
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2669 - 2683
  • [33] Threat Poker: Solving Security and Privacy Threats in Agile Software Development
    Rygge, Hanne
    Josang, Audun
    SECURE IT SYSTEMS, 2018, 11252 : 468 - 483
  • [34] Models of Applied Privacy (MAP): A Persona Based Approach to Threat Modeling
    Dev, Jayati
    Rashidi, Bahman
    Garg, Vaibhav
    PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2023), 2023,
  • [35] The Odyssey: modeling privacy threats in a brave new world
    Galvez, Rafa
    Gurses, Seda
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 87 - 94
  • [36] Towards Privacy Policy Conceptual Modeling
    Krasnashchok, Katsiaryna
    Mustapha, Majd
    Al Bassit, Anas
    Skhiri, Sabri
    CONCEPTUAL MODELING, ER 2020, 2020, 12400 : 429 - 438
  • [37] Contextual Privacy Policy Modeling in IoT
    Onu, Emmanuel
    Kwakye, Michael Mireku
    Barker, Ken
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 94 - 102
  • [38] Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies
    Milligan, Julissa
    Scheffler, Sarah
    Sellars, Andrew
    Tiwari, Trishita
    Trachtenberg, Ari
    Varia, Mayank
    SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 175 - 186
  • [39] Towards Formal Modeling of Privacy Policies of Enterprises
    Manna, Asmita
    Sengupta, Anirban
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [40] Internet of Things : A Study on Security and Privacy Threats
    Husamuddin, Md
    Qayyum, Mohammed
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 93 - 97