Android Security Princess | Senior Research Scientist @ Google
Mountain View, California, United States
Contact Info
453 followers
436 connections
Activity
-
Have you come across this recent paper on scaling AI sustainably, authored by *four women*? It's true! 😃 I feel lucky that I am one of the…
Have you come across this recent paper on scaling AI sustainably, authored by *four women*? It's true! 😃 I feel lucky that I am one of the…
Liked by Güliz Seray Tuncay
-
It has been an incredible honor to serve as the Diversity Chair for the SB3C 2024 and give back to my favorite conference & community! A special…
It has been an incredible honor to serve as the Diversity Chair for the SB3C 2024 and give back to my favorite conference & community! A special…
Liked by Güliz Seray Tuncay
-
Last week, I had the pleasure of attending the American CIO & IT Summit in #SanFrancisco, where I presented on the topic of Post-Quantum Cryptography…
Last week, I had the pleasure of attending the American CIO & IT Summit in #SanFrancisco, where I presented on the topic of Post-Quantum Cryptography…
Liked by Güliz Seray Tuncay
Experience
Education
-
University of Florida
M.Sc. Computer Engineering 3.86
-
Activities and Societies: Florida Swing Dancing Club
Publications
-
See No Evil: Phishing for Permissions with False Transparency
USENIX Security
Android introduced runtime permissions in order to provide users with more contextual information to make informed decisions as well as with finer granularity when dealing with permissions. In this work, we identified that the correct operation of the runtime permission model relies on certain implicit assumptions which can conveniently be broken by adversaries to illegitimately obtain permissions from the background while impersonating foreground apps. We call this detrimental scenario false…
Android introduced runtime permissions in order to provide users with more contextual information to make informed decisions as well as with finer granularity when dealing with permissions. In this work, we identified that the correct operation of the runtime permission model relies on certain implicit assumptions which can conveniently be broken by adversaries to illegitimately obtain permissions from the background while impersonating foreground apps. We call this detrimental scenario false transparency attacks. These attacks constitute a serious security threat to the Android platform as they invalidate the security guarantees of 1) runtime permissions by enabling background apps to spoof the context and identity of foreground apps when requesting permissions and of 2) Android permissions altogether by allowing adversaries to exploit users' trust in other apps to obtain permissions.
-
Resolving the Predicament of Android Custom Permissions (Received Distinguished Paper Award)
ISOC Network and Distributed Systems Security Symposium (NDSS)
Android leverages a set of system permissions to
protect platform resources. At the same time, it allows untrusted
third-party applications to declare their own custom permissions
to regulate access to app components. However, Android treats
custom permissions the same way as system permissions even
though they are declared by entities of different trust levels. In
this work, we describe two new classes of vulnerabilities that arise
from the ‘predicament’ created by mixing…Android leverages a set of system permissions to
protect platform resources. At the same time, it allows untrusted
third-party applications to declare their own custom permissions
to regulate access to app components. However, Android treats
custom permissions the same way as system permissions even
though they are declared by entities of different trust levels. In
this work, we describe two new classes of vulnerabilities that arise
from the ‘predicament’ created by mixing system and custom
permissions in Android. These have been acknowledged as serious
security flaws by Google and we demonstrate how they can be
exploited in practice to gain unauthorized access to platform
resources and to compromise popular Android apps. To address
the shortcomings of the system, we propose a new modular
design called Cusper for the Android permission model. Cusper
separates the management of system and custom permissions and
introduces a backward-compatible naming convention for custom
permissions to prevent custom permission spoofing. We validate
the correctness of Cusper by 1) introducing the first formal
model of Android runtime permissions, 2) extending it to describe
Cusper, and 3) formally showing that key security properties
that can be violated in the current permission model are always
satisfied in Cusper. To demonstrate Cusper’s practicality, we
implemented it in the Android platform and showed that it is
both effective and efficient.Other authorsSee publication -
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android
ACM Computer and Communication Security (CCS)
In-app embedded browsers are commonly used by app developers to display web content without having to redirect the user to heavy-weight web browsers. Just like the conventional web browsers, embedded browsers can allow the execution of web code. In addition, they provide mechanisms (viz., JavaScript bridges) to give web code access to internal app code that might implement critical functionalities and expose device resources. This is intrinsically dangerous since there is currently no means for…
In-app embedded browsers are commonly used by app developers to display web content without having to redirect the user to heavy-weight web browsers. Just like the conventional web browsers, embedded browsers can allow the execution of web code. In addition, they provide mechanisms (viz., JavaScript bridges) to give web code access to internal app code that might implement critical functionalities and expose device resources. This is intrinsically dangerous since there is currently no means for app developers to perform origin-based access control on the JavaScript bridges, and any web code running in an embedded browser is free to use all the exposed app and device resources. Previous work that addresses this problem provided access control solutions that work only for apps that are built using hybrid frameworks. Additionally, these solutions focused on protecting only the parts of JavaScript bridges that expose permissions-protected resources. In this work, our goal is to provide a generic solution that works for all apps that utilize embedded web browsers and protects all channels that give access to internal app and device resources. Towards realizing this goal, we built Draco, a uniform and fine-grained access control framework for web code running on Android embedded browsers (viz., WebView). Draco provides a declarative policy language that allows developers to define policies to specify the desired access characteristics of web origins in a fine-grained fashion, and a runtime system that dynamically enforces the policies. In contrast with previous work, we do not assume any modifications to the Android operating system, and implement Draco in the Chromium Android System WebView app to enable seamless deployment. Our evaluation of the the Draco runtime system shows that Draco incurs negligible overhead, which is in the order of microseconds.
Other authorsSee publication -
Smart LaBLEs: Proximity, Autoconfiguration and a Constant Supply of Gatorade
IEEE/ACM International Symposium on Edge Computing
-
For Your Eyes Only
ACM MobiCom Workshop on Mobile Cloud Computing and Services
As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals’ movements
to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT.
While it is possible to develop systems to enable anonymous interaction with IoT, anonymity…As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals’ movements
to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT.
While it is possible to develop systems to enable anonymous interaction with IoT, anonymity results in limited benefits to both individuals and IoT ecosystems. In response, we present Incognito,
a secure and privacy preserving IoT framework where user information exposure is driven by the concept of identity. In particular, we advocate user-managed identities, leaving the control of the choice
of identity in a given context, as well as the level of exposure, in the hands of the user. Using Incognito, users can create identities that work only within certain contexts and are meaningless outside
of these contexts. Furthermore, Incognito allows for simple management of information exposure through contextual-policies for sharing as well as querying of an IoT ecosystem. By giving individuals
full control over the information traces that they leave behind in an IoT infrastructure, Incognito, in essence, puts individuals on equal footing with the entities that want to track their behavioral
data. Incognito fosters a symbiotic relationship; users will need to expose information in exchange for personalized recommendations and IoT organizations who provide sophisticated user experiences
will see enhanced user engagement.
Projects
-
Local Authorization
Developed an API service which enables authorization of client devices on target devices by performing verification locally and offline. The web service provides storage for target devices, access control list management, and authorization credential retrieval to its clients.
Tools/Technologies/Languages: Java, One Platform, Zanzibar, Spanner -
Draco: Uniform and Fine-grained Access Control for Web Code on Android
Designed and developed an origin-based access control system for JavaScript interfaces, event handlers and HTML5 APIs for Android WebView in Google’s open source Chromium project. Tools/Technologies/Languages: Android, Java, JavaScript, Python.
-
Incognito: Privacy-preserving architecture for the Internet of Things
Designed and developed an architecture that helps preserve user privacy in IoT.
Tools/Technologies/Languages: Android, Java, Python, Google Cloud, C on Nordic & mbed platforms -
Event Analysis on Yahoo’s MX3 pipeline
Developed a web-based tool for event analysis on Yahoo’s MX3 data pipeline. It allows users to enter rules on their browsers to filter bad data from the pipeline/hdfs/local storage. Backend runs a Jetty web server that processes user requests. Rules are entered into Esper CEP engine, which filters out unsatisfying events for each rule. Results are presented in graphical format to the user. Tools/Technologies/Languages: Ember-CLI, NVD3, Esper Complex Event Processing engine, Jetty, Java…
Developed a web-based tool for event analysis on Yahoo’s MX3 data pipeline. It allows users to enter rules on their browsers to filter bad data from the pipeline/hdfs/local storage. Backend runs a Jetty web server that processes user requests. Rules are entered into Esper CEP engine, which filters out unsatisfying events for each rule. Results are presented in graphical format to the user. Tools/Technologies/Languages: Ember-CLI, NVD3, Esper Complex Event Processing engine, Jetty, Java, Javascript, HTML, CSS
-
Distributed VeriFlow
-
Extended single domain network verification tool VeriFlow to enable end-to-end network invariant verification. Tools/Technologies/Languages: C++, VeriFlow
Other creators -
Mobile Application for Intelligent Photograph Annotation
-
Sponsor: Department (METU-Computer Engineering)
Aspects: Mobile software, web services, Image Processing, Artificial Intelligence & Algorithms, GPS
Purpose: To develop a software system which will allow users to retrieve information from the pictures they
take with their mobile phones
Technologies: Eclipse IDE, Java ME, OpenCV(SURF), JDBC, GlassFish, MediaWiki API, Google Maps API,
Android APIOther creators
Honors & Awards
-
ACM SIGSAC Doctoral Dissertation Award Runner-up
ACM
SIGSAC Doctoral Dissertation Award for Outstanding PhD Thesis in Computer and Information Security:
This annual award by SIGSAC recognizes excellent research by doctoral candidates in the field of computer and information security. -
Rising Star in EECS
-
I was selected a rising star in Electrical Engineering and Computer Science. https://publish.illinois.edu/rising-stars/
-
Cyber Security Awareness Worldwide applied research competition finalist
CSAW
I was selected as a finalist to participate in the Cyber Security Awareness Worldwide applied research competition.
-
Celebration of Excellence Distinguished Paper Award
University of Illinois at Urbana-Champaign, Department of Computer Science
-
Distinguished Paper Award at Network and Distributed System Security Symposium
-
Won the distinguished award at NDSS with our paper titled "Resolving the Predicament
of Android Custom Permissions", for which I was the lead author.
https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_08-4_Tuncay_paper.pdf -
Android Security Rewards
Google
Received high and medium severity security bug bounties with my discoveries of the security vulnerabilities in Android permissions.
-
Heidelberg Laureate Forum Young Researcher
-
-
Graduate School Fellowship Award
University of Florida
I was awarded a fellowship for my graduate studies by the department of Computer and Information Science and Engineering at the University of Florida.
-
Outstanding Achievement Award
METU
I was awarded the outstanding achievement award for consistently ranking in the top three of the Computer Engineering department at METU.
Languages
-
English
Native or bilingual proficiency
-
Greek
-
-
Turkish
Native or bilingual proficiency
More activity by Güliz Seray
-
I am happy to share that I have successfully defended my Ph.D. dissertation. I extend my sincere thanks to my major advisor Selcuk Uluagac and all of…
I am happy to share that I have successfully defended my Ph.D. dissertation. I extend my sincere thanks to my major advisor Selcuk Uluagac and all of…
Liked by Güliz Seray Tuncay
-
📍 Green Street, Champaign, IL | Home
📍 Green Street, Champaign, IL | Home
Liked by Güliz Seray Tuncay
-
I got tenure! 🎊🎉🎈I couldn't have done it without the support and dedication of so many amazing people, including my brilliant students (who always…
I got tenure! 🎊🎉🎈I couldn't have done it without the support and dedication of so many amazing people, including my brilliant students (who always…
Liked by Güliz Seray Tuncay
-
There has been an earthquake (at a magnitude of 7.8) in south-southeastern region of Turkey. Only in one city (Malatya), it's known that 130…
There has been an earthquake (at a magnitude of 7.8) in south-southeastern region of Turkey. Only in one city (Malatya), it's known that 130…
Liked by Güliz Seray Tuncay
-
I saw off the 1st batch of the Japan Disaster Relief Team leaving for Turkey to carry out rescue operations. There are reports that many people are…
I saw off the 1st batch of the Japan Disaster Relief Team leaving for Turkey to carry out rescue operations. There are reports that many people are…
Liked by Güliz Seray Tuncay
-
Dear Colleagues, A 7.8 magnitude earthquake hit the eastern/southern part of Turkey on Monday, February 6th, 2023, followed by a 7.4 in a couple of…
Dear Colleagues, A 7.8 magnitude earthquake hit the eastern/southern part of Turkey on Monday, February 6th, 2023, followed by a 7.4 in a couple of…
Liked by Güliz Seray Tuncay
-
There has been an earthquake (at a magnitude of 7.8) in south-southeastern region of Turkey. Only in one city (Malatya), it's known that 130…
There has been an earthquake (at a magnitude of 7.8) in south-southeastern region of Turkey. Only in one city (Malatya), it's known that 130…
Liked by Güliz Seray Tuncay
-
Two major earthquakes of magnitudes 7.7 and 7.6 have hit Turkey on a freezing cold night in their deep sleep on Feb 6th. Thousands are still under…
Two major earthquakes of magnitudes 7.7 and 7.6 have hit Turkey on a freezing cold night in their deep sleep on Feb 6th. Thousands are still under…
Liked by Güliz Seray Tuncay
-
Our favorite winter wonderland. ❄ 📸: Justin Shen
Our favorite winter wonderland. ❄ 📸: Justin Shen
Liked by Güliz Seray Tuncay
-
CPS Security Lab (CSL) congratulates both Dr. Luis Puche (our recent Ph.D.), our postdoc Dr. Ahmet Aris, and Dr. Leonardo Babun, PhD on the…
CPS Security Lab (CSL) congratulates both Dr. Luis Puche (our recent Ph.D.), our postdoc Dr. Ahmet Aris, and Dr. Leonardo Babun, PhD on the…
Liked by Güliz Seray Tuncay
-
Happy to be invited to the first World AI Cannes Festival, to give a Lightning Talk on the interplay between AI and Cybersecurity. Excited to be…
Happy to be invited to the first World AI Cannes Festival, to give a Lightning Talk on the interplay between AI and Cybersecurity. Excited to be…
Liked by Güliz Seray Tuncay
-
I was featured in this article with my ACM Outstanding Doctoral Dissertation runner-up award in Security. Thank you, everyone, who supported me…
I was featured in this article with my ACM Outstanding Doctoral Dissertation runner-up award in Security. Thank you, everyone, who supported me…
Shared by Güliz Seray Tuncay
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More