BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications

2015-01-30
Ozcan, Ahmet Talha
Gemicioglu, Can
Onarlioglu, Kaan
Weissbacher, Michael
Mulliner, Collin
Robertson, William
Kirda, Engin
Internet-based mobile messaging applications have become a ubiquitous means of communication, and have quickly gained popularity over cellular short messages (SMS). Unfortunately, from a security point of view, free messaging services do not guarantee the privacy of users. For example, free messaging providers can record and store exchanged messages indefinitely to collect information about specific users. Moreover, these messages can be accessed by criminals who gain access to social media accounts. In this paper, we introduce BabelCrypt, a system that addresses the problem of automatically retrofitting arbitrary mobile chat applications with end-to-end encryption. Our system works by transparently interfacing with the original client applications supplied by the respective service providers. It does not require any modification to the individual applications, nor does it require any knowledge or customization for specific chat applications. BabelCrypt is able to automatically inject control messages in-band, using the underlying application's message exchange mechanism, and thus supports running arbitrarily complex encryption protocols such as OTR. We successfully used BabelCrypt with a number of popular messaging applications including Facebook Messenger, WhatsApp, and Skype. Our evaluation shows that BabelCrypt provides end-to-end security for arbitrary messaging applications while satisfactorily preserving the original user experience of the messaging application.

Suggestions

CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS
Dinçer, Hilal; Doğanaksoy, Ali; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2022-8-22)
Instant messaging applications have replaced classical messaging in recent years. The fact that instant messaging applications transmit messages over the internet, therefore, being free and fast, played a major role in this rise. However, being internet-based has brought disadvantages as well as advantages. There are risks such as obtaining the message, changing the message, etc. by third parties. To avoid these risks, messages are encrypted, the sender is authenticated and their integrity is shown. However...
An Analysis on user profiles and usage preferences for mobile application recommendations
Ünal, Perin; Taşkaya Temizel, Tuğba; Eren, Pekin Erhan; Department of Information Systems (2015)
In this thesis, we investigated the relationship between personality features and mobile technology use, particularly the use of traditional communication channels such as voice calls and SMS messaging and rapidly evolving mobile applications, specifically in communication and commerce domains. This was the first study to investigate the relationship between different personality features and different aspects of mobile technology use to this extent. The rapid growth in the mobile application market present...
RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions
Turk, Ismail; Angın, Pelin; Cosar, Ahmet (Institute of Electrical and Electronics Engineers (IEEE), 2019-01-01)
The use of near field communication (NFC) technology for contactless mobile transactions has become popular in the past decade with the availability of this technology in mobile devices. Today, there are millions of the NFC-enabled mobile handsets in the market, with mobile handset manufacturers and mobile network operators enabling m-wallet solutions using the secure elements (SEs) that they own, thus can remotely control, on the devices. While this approach gives full control to the SE owner to activate a...
Location update generation and performance analysis in cellular mobile computing systems
Yoncacı, İlker; Demirös, Onur; Erten, Murat; Department of Information Systems (2002)
The Global System for Mobile Communications (GSM) allows user universal and worlwide access to information and the ability to communicate with each other independently of their location and mobility. Tracking mobile users is one of the basic functions of the network system and one of the important issues in the design of a mobile computing system is how to manage the real-time locations of mobile clients. Most of the mobile computing applications are expected to support location- dependent continuous querie...
GUI testing of android applications: a systematic mapping
Aydın, Muzaffer; Betin Can, Aysu; Garousi, Vahid; Department of Information Systems (2014)
Popularity of mobile devices is increasing rapidly all around the world. These devices can be used on various systems which are commonly used by the society. These systems are predicted to overtake desktop platform's popularity in the near future. Therefore the quality of mobile applications has vital importance. High quality applications can only be developed with good testing environments. Considering that multi-featured mobile applications have complex user interfaces, we decided to focus on graphical us...
Citation Formats
A. T. Ozcan et al., “BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications,” pp. 355–369, 2015, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/68417.