Description: In recent years, a trend of using real-time traffic data for navigation has developed. Google Navigation and Waze, for instance, generate traffic data from movement profiles of smartphones. In this paper we tackle the question to which extent it is possible for Google and Waze to track the smartphone and its owner. Furthermore, we show how wireless access points and smartphones acting like wireless access points can be located around the world. In addition to the privacy issue, we examine whether the authenticity of traffic data can be guaranteed. We demonstrate in practice how hackers can take control of navigation systems and, in the case of a wide distribution of floating car data, can actively control the traffic flow. At the end we present a practical protocol preventing such attacks and at the same time preserving the user's privacy. The protocol has been implemented on different hardware platforms and benchmark results are given.
For More Information please visit : - http://www.blackhat.com/eu-13/briefings.html
Tags: securitytube , hacking , hackers , information security , convention , computer security , blackhat-eu-2013 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.