<div class="csl-bib-body">
<div class="csl-entry">Schmidt, D., Ponticello, A., Steinböck, M., Krombholz, K., & Lindorfer, M. (2025). Analyzing the iOS Local Network Permission from a Technical and User Perspective. In <i>2025 IEEE Symposium on Security and Privacy (SP)</i> (pp. 4229–4247). IEEE. https://doi.org/10.1109/SP61157.2025.00045</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/223688
-
dc.description.abstract
In the past, malicious apps attacked routers or identified locations through local network communication. To mitigate security and privacy risks from local network access, Apple introduced a new permission with iOS 14. To be effective, the permission needs to protect against technical threats, and users must be able to make an informed permission decision. The latter is presumably hindered by the intrinsic technicality of the concept of the local network. In this paper, we perform the first comprehensive analysis of the local network permission by studying four key aspects. We investigate the security of its implementation by systematically accessing the local network. We explore local network accesses via a large-scale dynamic analysis of 10,862 iOS and Android apps. We analyze the concepts that constitute the permission prompts, as this is all the information users get before making a decision. Based on the identified concepts, we conduct an online survey (N=150) to comprehend users' understanding of the permission, their threat awareness, and common misconceptions. Our work reveals two methods to bypass the permission from webviews, and that the protected local network addresses are insufficient. We show how and when apps access the local network, and how the situation differs between iOS and Android. Finally, we present the light and shadow of users' understanding of the permission. While nearly every participant is aware of at least one threat (83.11%), misconceptions are even more common (84.46%).
en
dc.description.sponsorship
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
dc.description.sponsorship
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
dc.description.sponsorship
FWF - Österr. Wissenschaftsfonds
-
dc.language.iso
en
-
dc.relation.ispartofseries
IEEE Symposium on Security and Privacy
-
dc.subject
mobile permissions
en
dc.subject
technical implementation
en
dc.subject
user perspective
en
dc.subject
local network
en
dc.subject
common misconceptions
en
dc.subject
mobile security and privacy
en
dc.subject
Android and iOS comparison
en
dc.title
Analyzing the iOS Local Network Permission from a Technical and User Perspective
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.contributor.affiliation
Helmholtz Center for Information Security, Germany
-
dc.contributor.affiliation
Helmholtz Center for Information Security, Germany
-
dc.relation.isbn
979-8-3315-2236-0
-
dc.relation.doi
10.1109/SP61157.2025
-
dc.relation.issn
1081-6011
-
dc.description.startpage
4229
-
dc.description.endpage
4247
-
dc.relation.grantno
ICT19-056
-
dc.relation.grantno
ICT22-060
-
dc.relation.grantno
F 8500
-
dc.type.category
Full-Paper Contribution
-
dc.relation.eissn
2375-1207
-
tuw.booktitle
2025 IEEE Symposium on Security and Privacy (SP)
-
tuw.peerreviewed
true
-
tuw.relation.publisher
IEEE
-
tuw.project.title
IoTIO: Analyse des Internet der Unsicheren Dinge
-
tuw.project.title
Fixing the Broken Bridge Between Mobile Apps and the Web
-
tuw.project.title
Semantische und kryptografische Grundlagen von Informationssicherheit und Datenschutz durch modulares Design
-
tuw.researchTopic.id
I4
-
tuw.researchTopic.name
Information Systems Engineering
-
tuw.researchTopic.value
100
-
tuw.linking
https://github.com/SecPriv/local_network
-
tuw.publication.orgunit
E192-06 - Forschungsbereich Security and Privacy
-
tuw.publisher.doi
10.1109/SP61157.2025.00045
-
dc.description.numberOfPages
19
-
tuw.author.orcid
0009-0009-0119-1068
-
tuw.author.orcid
0009-0002-5159-901X
-
tuw.author.orcid
0000-0001-7001-4481
-
tuw.event.name
2025 IEEE Symposium on Security and Privacy (SP)
en
tuw.event.startdate
12-05-2025
-
tuw.event.enddate
15-05-2025
-
tuw.event.online
On Site
-
tuw.event.type
Event for scientific audience
-
tuw.event.place
San Francisco
-
tuw.event.country
US
-
tuw.event.presenter
Schmidt, David
-
tuw.event.track
Multi Track
-
wb.sciencebranch
Informatik
-
wb.sciencebranch
Mathematik
-
wb.sciencebranch.oefos
1020
-
wb.sciencebranch.oefos
1010
-
wb.sciencebranch.value
80
-
wb.sciencebranch.value
20
-
item.grantfulltext
restricted
-
item.languageiso639-1
en
-
item.cerifentitytype
Publications
-
item.openairecristype
http://purl.org/coar/resource_type/c_5794
-
item.fulltext
no Fulltext
-
item.openairetype
conference paper
-
crisitem.author.dept
E192-06 - Forschungsbereich Security and Privacy
-
crisitem.author.dept
E194 - Institut für Information Systems Engineering
-
crisitem.author.dept
E192-06 - Forschungsbereich Security and Privacy
-
crisitem.author.dept
Helmholtz Center for Information Security, Germany
-
crisitem.author.dept
E192-06 - Forschungsbereich Security and Privacy
-
crisitem.author.orcid
0009-0009-0119-1068
-
crisitem.author.orcid
0009-0002-5159-901X
-
crisitem.author.orcid
0000-0001-7001-4481
-
crisitem.author.parentorg
E192 - Institut für Logic and Computation
-
crisitem.author.parentorg
E180 - Fakultät für Informatik
-
crisitem.author.parentorg
E192 - Institut für Logic and Computation
-
crisitem.author.parentorg
E192 - Institut für Logic and Computation
-
crisitem.project.funder
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
crisitem.project.funder
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds