Skip to content

shehrozef/CanaryTrap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks

Third-party apps on Facebook get access to personal information of users. The Cambridge Analytica incident showed that third-party apps on Facebook can seriously misuse user data.

We design and implement CanaryTrap to independently detect misuse of data shared with third-party apps on Facebook. At a high-level, CanaryTrap shares a honeytoken (e.g., email address) with a third-party app and monitors its unrecognized use via different channels (e.g., received emails).

We deployed CanaryTrap to monitor 1,024 Facebook apps for more than a year. Our main results are:

  • We found that data shared with 1.2% third-party apps on Facebook has been potentially misused.

  • We found that many third-party apps on Facebook apps do not fully comply with Facebook's TOS that require app developers to respond to data deletion requests by users.

Read our peer-reviewed manuscript for technical details or continue below to read a summary of our findings.

Misuse of data shared with Facebook apps

CanaryTrap detected 12 cases of potential misuse of our honeytokens that are shared with 1,024 Facebook apps. Below, we report these cases along with the severity of misuse where a darker color indicates a higher severity.

Index App Name App's Website Severity of Misuse
1 Safexbikes Motorsafexbikes cycle Superstore safexbikes.com drawing drawing
2 Printi BR API printi.com.br drawing drawing
3 WeWanted 購車首選! wewanted.com.tw drawing drawing
4 JustFashionNow justfashionnow.com drawing drawing
5 PopJulia popjulia.com drawing drawing
6 Nyx CA nyxcosmetics.ca drawing drawing
7 MyJapanBox myjapanbox.com drawing drawing
8 Alex's first app beautymaker.com.sg drawing drawing
9 Thailand Property Login thailand-property.com drawing drawing
10 Hop-On, Hop-Off hop-on-hop-off-bus.com drawing drawing
11 Tom's Hardware Guide-IT Pro tomshardware.com drawing drawing
12 Leiturinha leiturinha.com.br drawing drawing

Third-party apps violate Facebook's TOS

Facebook's TOS require app developers to include links to their privacy policies in the app's dashboard (that appears in the user's installed apps page) as well as delete data if a user requests. We identify several third-party apps that do not include links to their privacy policies in the app dialog and/or honor user data deletion requests which result in potential violation of Facebook's TOS. Below, we list such Facebook apps:

Important Updates

  • Disclosed our findings to FTC (22nd June 2020)
  • Disclosed our findings to Facebook (23rd June 2020)
  • Our research covered by VentureBeat (1st July 2020) (https://bit.ly/2VQMsL6)
  • Facebook announced that they are tightening data deletion practices and limiting sharing of data with other entities for developers (1st July 2020) (https://bit.ly/2BLS2aL)
  • Our research covered by by ZDNet (2nd July 2020) (https://zd.net/3e1PBOs)
  • Developer of app "Tom's Hardware Guide-IT Pro" informed us that they have deactived their app (3rd July 2020)

Frequenty Asked Questions (FAQs)

How does CanaryTrap work?

CanaryTrap shares a honeytoken email address with a third-party app. CanaryTrap then monitors the misuse of the shared honeytoken by analyzing received emails and Facebook’s ad transparency tool.

What is an unrecognized email and an unrecognized sender?

If the sender of a received email on the email account of a honeytoken shared with a third-party app do not match with the app, we label the email as unrecognized email and its sender as unrecognized sender.

What is the potential misuse of a honeytoken?

We conclude that a honeytoken shared with a third-party app has been potentially misused if the sender of a received email cannot be recognized as the third-party app and the content of the email is also not relevant to the app.

How is the severity of misuse determined?

We determine the severity of potential misuse of a honeytoken based on a disclosure test and content analysis.

  • We perform a disclosure test to identify the relationship between an unrecognized sender and the app as disclosed or unknown. If we find a disclosure of the relationship between an unrecognized sender and the app on the app's website, privacy policy, or social media page, we identify the unrecognized sender as disclosed; otherwise, we identify the unrecognized sender as unknown.
  • We perform a manual analysis of the content of unrecognized emails to label them as either malicious or unrelated. We label an email as malicious if the content of the email is clearly spam or scam. We label an unrecognized email as unrelated if the content of the email is not relevant to either the app or the app’s host website.

Below, we discuss the unrecognized use of our honeytoken based on the disclosure test and the content analysis that helps us determine the severity of misuse.

  1. Malicious and Unknown drawing
    This type of unrecognized use of our honeytoken is the most egregious case of data misuse since the user data has been obtained by spammers or scammers who are sending malicious emails. For example, we receive a ransomware scam emails on the honeytokens shared with 2 apps ''Safexbikes Motorcycle Superstore'' and ''Printi BR API''.

  2. Unrelated and Unknown drawing
    While the content is not malicious, this type of unrecognized use is worrisome for users since user data shared with Facebook apps have been potentially misused by an unknown entity.

  3. Unrelated and Disclosed drawing
    An unrelated email from a disclosed sender appears less worrisome for users as compared to an unrelated email from an unknown sender. Yet, we argue that our honeytokens shared with the Facebook apps have been potentially misused by the unrecognized senders to send emails not relevant to the app.

Can CanaryTrap be scaled beyond 1,024 apps?

Yes. We have proposed multiple variants of CanaryTrap that allows monitoring many more apps by reusing honeytokens and Facebook accounts. For example, one such proposed variant, matrix framework, can monitor 1,000,000 apps using only 2,000 honeytokens and 4 Facebook accounts. For more details, please refer to sections 3.3 and 5.3 of our paper.

Can CanaryTrap be implemented on other online social network platforms?

Yes. The underlying methodology of CanaryTrap remains the same to monitor apps on other platforms. We only need to modify some parts of CanaryTrap’s existing implementation while we can still reuse various parts. For example, CanaryTrap can be adapted to monitor third-party apps on Twitter by modifying the existing implementation to associate a honeytoken to a Twitter account instead of a Facebook account and the automation of host websites to install twitter apps instead of Facebook apps. We can reuse the existing infrastructure to monitor apps once the honeytoken has been shared with a third-party app. For example, we can continue using our email server to monitor data misuse through received emails.

Manuscript

CanaryTrap: Detecting Data Misuse By Third-Party Apps on Online Social Networks
20th annual Privacy Enhancing Technologies Symposium (PETS), July 13–17, 2020

Research Team

Contact Us

Contact the lead author at [email protected] for any inquires.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages