IPV Spyware Discovery (ISDi) Tool

Imatge
USENIX Security '19 - Clinical Computer Security for Victims of Intimate Partner Violence
Adjunts
Adjunt Mida
Presentation on the symposium 881.48 KB

Checks Android or iOS devi­ces for apps used to surveil or track victims («stal­ker­ware», «spou­se­ware», «spyware»). ISDi’s tech­ni­cal details are inclu­ded in «Clini­cal Compu­ter Secu­rity for Victims of Inti­mate Part­ner Violence» (USENIX 2019). The black­list is based on apps craw­led in «The Spyware Used in Inti­mate Part­ner Violence» (IEEE S&P 2018).

Contri­bu­tion Guide­li­nes

For more infor­ma­tion about contri­bu­ting to ISDi, see the contri­bu­tion guide­li­nes.

Insta­lling ISDi computer

Right now, ISDi currently only nati­vely supports macOS and Linux. If you are using a Windows device, you can use the Windows Subsys­tem for Linux 2 (WSL2), which can be insta­lled by follo­wing these instruc­ti­ons. After this, follow the remai­ning instruc­ti­ons as a Linux user would, cloning/running ISDi inside the Linux container of your choice.

More in Github repor­si­tory

------—

Presen­ta­tion in «28th USENIX Secu­rity Sympo­o­sium»

Clini­cal Compu­ter Secu­rity for Victims of Inti­mate Part­ner Violence

Authors: 

Sam Havron, Diana Freed, and Rahul Chat­ter­jee, Cornell Tech; Damon McCoy, New York Univer­sity; Nicola Dell and Thomas Risten­part, Cornell Tech

Abstract: 

Digi­tal inse­cu­rity in the face of targe­ted, persis­tent attacks incre­a­singly leaves victims in debi­li­ta­ting or even life-thre­a­te­ning situ­a­ti­ons. We propose an appro­ach to helping victims, what we call clini­cal compu­ter secu­rity, and explore it in the context of inti­mate part­ner violence (IPV). IPV is wides­pread and abusers exploit tech­no­logy to track, harass, inti­mi­date, and other­wise harm their victims. We report on the itera­tive design, refi­ne­ment, and deploy­ment of a consul­ta­tion service that we crea­ted to help IPV victims obtain in-person secu­rity help from a trai­ned tech­no­lo­gist. To do so we crea­ted and tested a range of new tech­ni­cal and non-tech­ni­cal tools that syste­ma­tize the disco­very and inves­ti­ga­tion of the compli­ca­ted, multi­mo­dal digi­tal attacks seen in IPV. An initial field study with 44 IPV survi­vors showed how our proce­du­res and tools help victims disco­ver account compro­mise, exploi­ta­ble miscon­fi­gu­ra­ti­ons, and poten­tial spyware.

 

USENIX Secu­rity '19 Open Access Videos Spon­so­red by

King Abdu­llah Univer­sity of Science and Tech­no­logy (KAUST)

Open Access Media

USENIX is commit­ted to Open Access to the rese­arch presen­ted at our events. Papers and proce­e­dings are freely avai­la­ble to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commit­ment to Open Access.

BibTeX
@inpro­ce­e­dings {236244,

author = {Sam Havron and Diana Freed and Rahul Chat­ter­jee and Damon McCoy and Nicola Dell and Thomas Risten­part},

title = {Clini­cal Compu­ter Secu­rity for Victims of Inti­mate Part­ner Violence},

book­title = {28th USENIX Secu­rity Sympo­sium (USENIX Secu­rity 19)},

year = {2019},

isbn = {978–1–939133–06–9},

address = {Santa Clara, CA},

pages = {105—122},

url = {https://www.usenix.org/confe­rence/usenix­se­cu­rity19/presen­ta­tion/havron},

publis­her = {USENIX Asso­ci­a­tion},

month = aug,

}
Havron PDF (also in mate­rial of this new)
 

Mate­ri­als and proto­cols on CETA (Clinic to End Tech Abuse)

Resour­ces |

This page provi­des a collec­tion of mate­ri­als, tools, and resour­ces that we have crea­ted to help IPV survi­vors, support workers, and tech­no­lo­gists disco­ver and address tech-rela­ted risks.

All of our resour­ces are free to down­load and use. We use many of them as part of our Compu­ter Secu­rity Clinic for IPV survi­vors in New York City.

Our step-by-step how-to guides can be espe­ci­ally useful for provi­ding help remo­tely.