Güliz Seray Tuncay

Android Security Princess | Senior Research Scientist @ Google

Mountain View, California, United States Contact Info
453 followers 436 connections

Join to view profile

Activity

Join now to see all activity

Experience

Education

Publications

  • See No Evil: Phishing for Permissions with False Transparency

    USENIX Security

    Android introduced runtime permissions in order to provide users with more contextual information to make informed decisions as well as with finer granularity when dealing with permissions. In this work, we identified that the correct operation of the runtime permission model relies on certain implicit assumptions which can conveniently be broken by adversaries to illegitimately obtain permissions from the background while impersonating foreground apps. We call this detrimental scenario false…

    Android introduced runtime permissions in order to provide users with more contextual information to make informed decisions as well as with finer granularity when dealing with permissions. In this work, we identified that the correct operation of the runtime permission model relies on certain implicit assumptions which can conveniently be broken by adversaries to illegitimately obtain permissions from the background while impersonating foreground apps. We call this detrimental scenario false transparency attacks. These attacks constitute a serious security threat to the Android platform as they invalidate the security guarantees of 1) runtime permissions by enabling background apps to spoof the context and identity of foreground apps when requesting permissions and of 2) Android permissions altogether by allowing adversaries to exploit users' trust in other apps to obtain permissions.

    See publication
  • Resolving the Predicament of Android Custom Permissions (Received Distinguished Paper Award)

    ISOC Network and Distributed Systems Security Symposium (NDSS)

    Android leverages a set of system permissions to
    protect platform resources. At the same time, it allows untrusted
    third-party applications to declare their own custom permissions
    to regulate access to app components. However, Android treats
    custom permissions the same way as system permissions even
    though they are declared by entities of different trust levels. In
    this work, we describe two new classes of vulnerabilities that arise
    from the ‘predicament’ created by mixing…

    Android leverages a set of system permissions to
    protect platform resources. At the same time, it allows untrusted
    third-party applications to declare their own custom permissions
    to regulate access to app components. However, Android treats
    custom permissions the same way as system permissions even
    though they are declared by entities of different trust levels. In
    this work, we describe two new classes of vulnerabilities that arise
    from the ‘predicament’ created by mixing system and custom
    permissions in Android. These have been acknowledged as serious
    security flaws by Google and we demonstrate how they can be
    exploited in practice to gain unauthorized access to platform
    resources and to compromise popular Android apps. To address
    the shortcomings of the system, we propose a new modular
    design called Cusper for the Android permission model. Cusper
    separates the management of system and custom permissions and
    introduces a backward-compatible naming convention for custom
    permissions to prevent custom permission spoofing. We validate
    the correctness of Cusper by 1) introducing the first formal
    model of Android runtime permissions, 2) extending it to describe
    Cusper, and 3) formally showing that key security properties
    that can be violated in the current permission model are always
    satisfied in Cusper. To demonstrate Cusper’s practicality, we
    implemented it in the Android platform and showed that it is
    both effective and efficient.

    Other authors
    See publication
  • Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android

    ACM Computer and Communication Security (CCS)

    In-app embedded browsers are commonly used by app developers to display web content without having to redirect the user to heavy-weight web browsers. Just like the conventional web browsers, embedded browsers can allow the execution of web code. In addition, they provide mechanisms (viz., JavaScript bridges) to give web code access to internal app code that might implement critical functionalities and expose device resources. This is intrinsically dangerous since there is currently no means for…

    In-app embedded browsers are commonly used by app developers to display web content without having to redirect the user to heavy-weight web browsers. Just like the conventional web browsers, embedded browsers can allow the execution of web code. In addition, they provide mechanisms (viz., JavaScript bridges) to give web code access to internal app code that might implement critical functionalities and expose device resources. This is intrinsically dangerous since there is currently no means for app developers to perform origin-based access control on the JavaScript bridges, and any web code running in an embedded browser is free to use all the exposed app and device resources. Previous work that addresses this problem provided access control solutions that work only for apps that are built using hybrid frameworks. Additionally, these solutions focused on protecting only the parts of JavaScript bridges that expose permissions-protected resources. In this work, our goal is to provide a generic solution that works for all apps that utilize embedded web browsers and protects all channels that give access to internal app and device resources. Towards realizing this goal, we built Draco, a uniform and fine-grained access control framework for web code running on Android embedded browsers (viz., WebView). Draco provides a declarative policy language that allows developers to define policies to specify the desired access characteristics of web origins in a fine-grained fashion, and a runtime system that dynamically enforces the policies. In contrast with previous work, we do not assume any modifications to the Android operating system, and implement Draco in the Chromium Android System WebView app to enable seamless deployment. Our evaluation of the the Draco runtime system shows that Draco incurs negligible overhead, which is in the order of microseconds.

    Other authors
    See publication
  • Smart LaBLEs: Proximity, Autoconfiguration and a Constant Supply of Gatorade

    IEEE/ACM International Symposium on Edge Computing

  • For Your Eyes Only

    ACM MobiCom Workshop on Mobile Cloud Computing and Services

    As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals’ movements
    to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT.
    While it is possible to develop systems to enable anonymous interaction with IoT, anonymity…

    As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals’ movements
    to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT.
    While it is possible to develop systems to enable anonymous interaction with IoT, anonymity results in limited benefits to both individuals and IoT ecosystems. In response, we present Incognito,
    a secure and privacy preserving IoT framework where user information exposure is driven by the concept of identity. In particular, we advocate user-managed identities, leaving the control of the choice
    of identity in a given context, as well as the level of exposure, in the hands of the user. Using Incognito, users can create identities that work only within certain contexts and are meaningless outside
    of these contexts. Furthermore, Incognito allows for simple management of information exposure through contextual-policies for sharing as well as querying of an IoT ecosystem. By giving individuals
    full control over the information traces that they leave behind in an IoT infrastructure, Incognito, in essence, puts individuals on equal footing with the entities that want to track their behavioral
    data. Incognito fosters a symbiotic relationship; users will need to expose information in exchange for personalized recommendations and IoT organizations who provide sophisticated user experiences
    will see enhanced user engagement.

    See publication

Projects

  • Local Authorization

    Developed an API service which enables authorization of client devices on target devices by performing verification locally and offline. The web service provides storage for target devices, access control list management, and authorization credential retrieval to its clients.
    Tools/Technologies/Languages: Java, One Platform, Zanzibar, Spanner

  • Draco: Uniform and Fine-grained Access Control for Web Code on Android

    Designed and developed an origin-based access control system for JavaScript interfaces, event handlers and HTML5 APIs for Android WebView in Google’s open source Chromium project. Tools/Technologies/Languages: Android, Java, JavaScript, Python.

    See project
  • Incognito: Privacy-preserving architecture for the Internet of Things

    Designed and developed an architecture that helps preserve user privacy in IoT.
    Tools/Technologies/Languages: Android, Java, Python, Google Cloud, C on Nordic & mbed platforms

  • Event Analysis on Yahoo’s MX3 pipeline

    Developed a web-based tool for event analysis on Yahoo’s MX3 data pipeline. It allows users to enter rules on their browsers to filter bad data from the pipeline/hdfs/local storage. Backend runs a Jetty web server that processes user requests. Rules are entered into Esper CEP engine, which filters out unsatisfying events for each rule. Results are presented in graphical format to the user. Tools/Technologies/Languages: Ember-CLI, NVD3, Esper Complex Event Processing engine, Jetty, Java…

    Developed a web-based tool for event analysis on Yahoo’s MX3 data pipeline. It allows users to enter rules on their browsers to filter bad data from the pipeline/hdfs/local storage. Backend runs a Jetty web server that processes user requests. Rules are entered into Esper CEP engine, which filters out unsatisfying events for each rule. Results are presented in graphical format to the user. Tools/Technologies/Languages: Ember-CLI, NVD3, Esper Complex Event Processing engine, Jetty, Java, Javascript, HTML, CSS

  • Distributed VeriFlow

    -

    Extended single domain network verification tool VeriFlow to enable end-to-end network invariant verification. Tools/Technologies/Languages: C++, VeriFlow

    Other creators
    • santhosh prabhu
    • shegufta ahsan
  • Mobile Application for Intelligent Photograph Annotation

    -

    Sponsor: Department (METU-Computer Engineering)
    Aspects: Mobile software, web services, Image Processing, Artificial Intelligence & Algorithms, GPS
    Purpose: To develop a software system which will allow users to retrieve information from the pictures they
    take with their mobile phones
    Technologies: Eclipse IDE, Java ME, OpenCV(SURF), JDBC, GlassFish, MediaWiki API, Google Maps API,
    Android API

    Other creators

Honors & Awards

  • ACM SIGSAC Doctoral Dissertation Award Runner-up

    ACM

    SIGSAC Doctoral Dissertation Award for Outstanding PhD Thesis in Computer and Information Security:
    This annual award by SIGSAC recognizes excellent research by doctoral candidates in the field of computer and information security.

  • Rising Star in EECS

    -

    I was selected a rising star in Electrical Engineering and Computer Science. https://publish.illinois.edu/rising-stars/

  • Cyber Security Awareness Worldwide applied research competition finalist

    CSAW

    I was selected as a finalist to participate in the Cyber Security Awareness Worldwide applied research competition.

  • Celebration of Excellence Distinguished Paper Award

    University of Illinois at Urbana-Champaign, Department of Computer Science

  • Distinguished Paper Award at Network and Distributed System Security Symposium

    -

    Won the distinguished award at NDSS with our paper titled "Resolving the Predicament
    of Android Custom Permissions", for which I was the lead author.

    https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_08-4_Tuncay_paper.pdf

  • Android Security Rewards

    Google

    Received high and medium severity security bug bounties with my discoveries of the security vulnerabilities in Android permissions.

  • Heidelberg Laureate Forum Young Researcher

    -

  • Graduate School Fellowship Award

    University of Florida

    I was awarded a fellowship for my graduate studies by the department of Computer and Information Science and Engineering at the University of Florida.

  • Outstanding Achievement Award

    METU

    I was awarded the outstanding achievement award for consistently ranking in the top three of the Computer Engineering department at METU.

Languages

  • English

    Native or bilingual proficiency

  • Greek

    -

  • Turkish

    Native or bilingual proficiency

More activity by Güliz Seray

View Güliz Seray’s full profile

  • See who you know in common
  • Get introduced
  • Contact Güliz Seray directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses