Security and Privacy of Users' Personal Information on Smartphones

Total Page:16

File Type:pdf, Size:1020Kb

Security and Privacy of Users' Personal Information on Smartphones Security and Privacy of Users’ Personal Information on Smartphones by Veelasha Moonsamy Bachelor of IT Honours (BIT Hon) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Deakin University December, 2014 Abstract The recent surge in the popularity of smartphones has shifted the focus of malware attackers from the desktop platform onto that of the smartphone platform. Smart- phones, which are hand-held devices with significantly more computational power than traditional mobile phones, store a wide range of personally identifiable infor- mation about their users in order for smartphone applications to function properly. As a result, malware authors are able to acquire private and confidential information about the victims by successfully deploying their attacks. Such information could be later used for blackmailing or trading in underground markets. Thus, the challenge of smartphone malware detection is directly related to the increasing number of smartphone users and applications available. As the number of smartphone malware continues to rapidly increase, there is an urgent need to deploy detection and classification frameworks that can cope with the large volume of suspicious applications and efficiently detect and classify malware. In this thesis, I consider the Android platform as a case study because it is an open-source platform and has the highest number of malicious applications. I begin by proposing a pattern mining algorithm to generate contrasting permission patterns that can distinguish clean from malicious applications. The permission patterns were then used to identify malware. I propose a linear classifier that uses permission patterns as features. These patterns are unique to malicious applications only and can also be used to conduct a high-level malware triage. The proposed classifier was consistent in generating prediction rules and the highest output accuracy was 97%, which is comparable to the best existing results. i ii Furthermore, while identifying malware is a high priority and also a challeng- ing problem, the issue is further exacerbated by unauthorised disclosure of personal information by clean applications, behaviour which cannot be detected by antivirus software. In my study, I examined the causes and impact of information leaks by clean applications in order to identify the motivation behind accessing users’ personal in- formation without their knowledge. The empirical results indicate that third-party advertising libraries are responsible for privacy breaches. I further extended my re- search by investigating the built-in tracking settings made available to users by the smartphone operating system. In summary, the three main contributions of my thesis are: (a) The discovery that existing mechanisms for identifying malware on smartphones are insufficient in detecting all types of threats to them. (b) An improved malware detection procedure for smartphones. (c) A set of proposals for preventing identity theft on smartphones. Acknowledgements I would like to take this opportunity to thank a number of people without whom the completion of my thesis would not have been possible. I owe my deepest gratitude to Prof. Lynn Batten for her guidance and support throughout my time at Deakin. It was an honour to be her student and to have her as a mentor. Her relentless dedication towards her students is inspiring and has always motivated me to work harder. Thanks to her training, I feel prepared and confident to embark on my research career. I would like to thank our collaborators, including Dr. Gang Li, Dr. Jia Rong and Mr. Shaowu Liu for introducing me to the area of pattern mining. Special thanks to Dr. Malcolm Shore for giving me the opportunity to gain industry experience while working on my PhD. I am also indebted to the support staff, in particular Ms. Judy Chow and Mr. Nghia Dang, from the School of IT for their administrative and technical help. Thanks to Deakin University and the International Information Systems Security Certification Consortium (ISC2) for the financial support and opportunity to attend international conferences. Last but not least, I am eternally grateful to my parents for giving me the gift of education. They have always encouraged me to be tenacious and ambitious. I will forever be indebted to them for all their sacrifices, and for the unconditional love and support they have given me throughout my studies. iii Table of Contents Contents iv List of Publications ix List of Tables xi List of Figures xiii 1 Introduction 1 1.1Motivation................................. 1 1.2 Research Questions and Contributions ................. 2 1.3 Thesis Outline ............................... 5 1.4 Summary ................................. 7 2 Smartphone Application Security 8 2.1 Preliminary ................................ 8 2.2SmartphoneMalware........................... 9 2.2.1 HistoryofPre-SmartphoneMalware.............. 9 2.2.2 HistoryofSmartphoneMalware................. 10 2.2.3 TypesofSmartphoneMalware.................. 11 2.3 Application Analysis Techniques ..................... 14 2.3.1 StaticAnalysis.......................... 15 2.3.2 DynamicAnalysis......................... 18 2.3.3 HybridMethod.......................... 22 2.3.4 ObservationsofCurrentMethods................ 23 iv v 2.3.5 Research Challenges ....................... 24 2.4CaseStudy:Android........................... 25 2.4.1 AndroidPermissionSystem................... 26 2.5 Summary ................................. 27 3 Contrast Permission Pattern Mining 28 3.1Introduction................................ 28 3.2 Definition and Problem Formulation .................. 28 3.2.1 ProblemStatement........................ 30 3.3LiteratureReview............................. 31 3.4 Data Pre-processing ........................... 33 3.4.1 Dataset.............................. 33 3.4.2 StatisticalAnalysisofAndroidPermissions........... 37 3.4.3 VisualizationofPermissionsUsingBiclustering........ 41 3.5 Contrast Permission Pattern Mining .................. 46 3.5.1 Candidate Subset Generation .................. 46 3.5.2 ContrastSubsetSelection.................... 49 3.6AndroidPermissionPatterns....................... 49 3.6.1 Malware-Specific Required Permission Patterns (MSRPP)............................. 52 3.6.2 Malware-Specific Used Permission Patterns (MSUPP) . 55 3.6.3 ContrastRequiredPermissionPatterns(CRPP)........ 56 3.6.4 ContrastUsedPermissionPatterns(CUPP).......... 56 3.7Discussion................................. 57 3.7.1 ObservationsfromStatisticalAnalysis............. 58 3.7.2 AnalysisofPermissionVisualizations.............. 59 3.7.3 AnalysisofContrastPermissionPatterns............ 60 3.8 Summary ................................. 61 4 Android Permission Pattern Classifier 63 4.1Introduction................................ 63 4.2RelatedWork............................... 65 4.3AndroidPermissionPatternClassification............... 68 4.3.1 PermissionPatternSelection................... 68 4.3.2 PermissionPatternClassifierAlgorithm............ 70 4.3.2.1 BoostingAlgorithm.................. 72 4.3.2.2 PerceptronAlgorithm................. 73 vi 4.3.2.3 PermissionPatternClassifier............. 74 4.4ExperimentalEvaluation......................... 76 4.4.1 ComparativeClassificationModel................ 76 4.4.2 ExperimentalResults....................... 78 4.5Discussion................................. 81 4.5.1 ExperimentalResults....................... 81 4.5.2 AnalysisofResults........................ 83 4.5.3 Observations about Privacy Implications ............ 84 4.6 Summary ................................. 85 5 Smartphone Application Privacy 86 5.1Introduction................................ 86 5.1.1 Definition of Privacy ....................... 86 5.1.2 PrivacyversusSecurity...................... 87 5.2 Smartphone Application Privacy ..................... 87 5.2.1 Importance of Application Privacy ............... 87 5.2.2 AvenuesforPrivacyBreaches.................. 88 5.3RelatedWork............................... 89 5.4 Research Challenges ........................... 92 5.5 Summary ................................. 93 6 Understanding Information Leaks 95 6.1Introduction................................ 95 6.2RelatedWork............................... 97 6.3DetectionofInformationLeaks..................... 101 6.3.1 Dataset.............................. 101 6.3.2 ExperimentalFramework..................... 101 6.3.2.1 ExperimentalSet-up.................. 104 6.3.2.2 DroidBox:DynamicAnalysis............. 105 6.3.2.3 StaticAnalysis..................... 107 6.4ExperimentalResults........................... 108 6.4.1 PermissionUsage&AdvertisingLibraries........... 108 6.4.2 Identification of Leaky Applications ............... 109 6.4.3 Determine Causes of Leaks .................... 110 6.5Discussion................................. 112 6.6 Summary ................................. 114 vii 7 Information Leaks via Tracking Services 116 7.1Introduction................................ 116 7.1.1 ProblemStatement........................ 117 7.2RelatedWork............................... 118 7.3TrackingServicesonAndroid...................... 120 7.4ExperimentalWork............................ 121 7.4.1 CaseStudy:AndroidDataset.................. 121 7.4.2 ExperimentalSetup........................ 122 7.5AnalysisofResults............................ 124 7.5.1 InformationLeaksforTrackingOFF.............. 127 7.5.2 Comparison:TrackingONversusTrackingOFF........ 130 7.6Discussion................................. 131 7.6.1
Recommended publications
  • Financing Transactions 12
    MOBILE SMART FUNDAMENTALS MMA MEMBERS EDITION AUGUST 2012 messaging . advertising . apps . mcommerce www.mmaglobal.com NEW YORK • LONDON • SINGAPORE • SÃO PAULO MOBILE MARKETING ASSOCIATION AUGUST 2012 REPORT MMA Launches MXS Study Concludes that Optimal Spend on Mobile Should be 7% of Budget COMMITTED TO ARMING YOU WITH Last week the Mobile Marketing Association unveiled its new initiative, “MXS” which challenges marketers and agencies to look deeper at how they are allocating billions of ad THE INSIGHTS AND OPPORTUNITIES dollars in their marketing mix in light of the radically changing mobile centric consumer media landscape. MXS—which stands for Mobile’s X% Solution—is believed to be the first YOU NEED TO BUILD YOUR BUSINESS. empirically based study that gives guidance to marketers on how they can rebalance their marketing mix to achieve a higher return on their marketing dollars. MXS bypasses the equation used by some that share of time (should) equal share of budget and instead looks at an ROI analysis of mobile based on actual market cost, and current mobile effectiveness impact, as well as U.S. smartphone penetration and phone usage data (reach and frequency). The most important takeaways are as follows: • The study concludes that the optimized level of spend on mobile advertising for U.S. marketers in 2012 should be seven percent, on average, vs. the current budget allocation of less than one percent. Adjustments should be considered based on marketing goal and industry category. • Further, the analysis indicates that over the next 4 years, mobile’s share of the media mix is calculated to increase to at least 10 percent on average based on increased adoption of smartphones alone.
    [Show full text]
  • Éric FREYSSINET Lutte Contre Les Botnets
    THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, CentraleSupélec Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M. Celui qui n’empêche pas un crime alors qu’il le pourrait s’en rend complice. — Sénèque Remerciements Je tiens à remercier mes deux directeurs de thèse. David Naccache, officier de réserve de la gendarmerie, contribue au développement de la recherche au sein de notre institution en poussant des personnels jeunes et un peu moins jeunes à poursuivre leur passion dans le cadre académique qui s’impose. Matthieu Latapy, du LIP6, avec qui nous avions pu échanger autour d’une thèse qu’il encadrait dans le domaine difficile des atteintes aux mineurs sur Internet et qui a accepté de m’accueillir dans son équipe. Je voudrais remercier aussi, l’ensemble de l’équipe Réseaux Complexes du LIP6 et sa responsable d’équipe actuelle, Clémence Magnien, qui m’ont accueilli à bras ouverts, accom- pagné à chaque étape et dont j’ai pu découvrir les thématiques et les méthodes de travail au fil des rencontres et des discussions.
    [Show full text]
  • Universidad Carlos Iii De Madrid Signal Processing
    UNIVERSIDAD CARLOS III DE MADRID ESCUELA POLITÉCNICA SUPERIOR BACHELOR THESIS SIGNAL PROCESSING FOR MALWARE ANALYSIS Computer Engineering Department AUTHOR: Raquel Tabuyo Benito TUTOR: Pedro Peris Lopez June, 2016 Bachelor Thesis. Signal Processing for Malware Analysis “Perseverance is not a long race. It is many short races one aftr te oter” -Walter Elliot - Page .2 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Acknowledgements To my whole family, specially my sister, for whom I have an unconditionally love. I am really grateful for their dedication, patience, support and encouragement to follow my dreams. To Pedro, my Bachelor Thesis tutor, whose kindness and guidance have helped me during this wonderful trip. To my friends, thank you very much for showing me the meaning of true friendship. Without all of you, this would have never been possible. - Page .3 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Abstract This Project is an experimental analysis of Android malware through images. The analysis is based on classifying the malware into families or differentiating between goodware and malware. This analysis has been done considering two approaches. These two approaches have a common starting point, which is the transformation of Android applications into PNG images. After this conversion, the first approach was subtracting each image from the testing set with the images of the training set, in order to establish which unknown malware belongs to a specific family or to distinguish between goodware and malware. Although the accuracy was higher than the one defined in the requirements, this approach was a time consuming task, so we consider another approach to reduce the time and get the same or better accuracy.
    [Show full text]
  • Cybercrime Hits the Unexpected
    TrendLabsSM 1Q 2014 Security Roundup Cybercrime Hits the Unexpected Bitcoin- and PoS-System-Related Attacks Trouble Users Distributed by: TREND MICRO | TrendLabs 1Q 2014 Security Roundup TREND MICRO | TrendLabs 1Q 2014 Security Roundup Contents It gives me immense pleasure to share this report, developed by Trend Micro and distributed by ITU based on our fruitful partnership. This report is part of ITU’s overall support to its 193 Member States within the framework of the Global Cybersecurity Agenda. This is clear result of our partnership with Private Sector in our effort to tackle this growing Global phenomenon. 1 | Cybercrime and the Cybercriminal Underground These efforts are aimed at equipping Member States with information on the latest cybersecurity threats and corresponding counter-measures, and eventually contribute to the creation of a safe and secure cyberspace for consumers, businesses and youth everywhere. This Trend Micro quarterly report underlines the existing and emerging malicious cyber activities observed during the first quarter of 2014. Some highlights of this 10 | Mobile Threat Landscape report: • Cybercriminals are continuing to innovate and create new ways to commit digital crimes. Crypto-currency exchanges and wallets are being compromised for the purpose of theft. In addition, online banking malware are being enhanced with new technologies to exact the maximum damage. 15 | Targeted Attack Campaigns • With the exponential growth in the mobile industry, cyber-criminals are and Cyber Attacks increasingly targeting mobile devices. There is a proliferation of maliciously tampered and re-packaged apps that circumvent the security firewalls in mobile devices. • We are also witnessing cases of attacks directly aimed at organizations that rely on specific Point of Sales (Pos) systems features.
    [Show full text]
  • The Malware Book 2016
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/305469492 Handbook of Malware 2016 - A Wikipedia Book Book · July 2016 DOI: 10.13140/RG.2.1.5039.5122 CITATIONS READS 0 13,014 2 authors, including: Reiner Creutzburg Brandenburg University of Applied Sciences 489 PUBLICATIONS 472 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: NDT CE – Assessment of structures || ZfPBau – ZfPStatik View project 14. Nachwuchswissenschaftlerkonferenz Ost- und Mitteldeutscher Fachhochschulen (NWK 14) View project All content following this page was uploaded by Reiner Creutzburg on 20 July 2016. The user has requested enhancement of the downloaded file. Handbook of Malware 2016 A Wikipedia Book By Wikipedians Edited by: Reiner Creutzburg Technische Hochschule Brandenburg Fachbereich Informatik und Medien PF 2132 D-14737 Brandenburg Germany Email: [email protected] Contents 1 Malware - Introduction 1 1.1 Malware .................................................. 1 1.1.1 Purposes ............................................. 1 1.1.2 Proliferation ........................................... 2 1.1.3 Infectious malware: viruses and worms ............................. 3 1.1.4 Concealment: Viruses, trojan horses, rootkits, backdoors and evasion .............. 3 1.1.5 Vulnerability to malware ..................................... 4 1.1.6 Anti-malware strategies ..................................... 5 1.1.7 Grayware ............................................
    [Show full text]
  • View October 2012 Report
    MOBILE SMART FUNDAMENTALS MMA MEMBERS EDITION OCTOBER 2012 messaging . advertising . apps . mcommerce www.mmaglobal.com NEW YORK • LONDON • SINGAPORE • SÃO PAULO MOBILE MARKETING ASSOCIATION OCTOBER 2012 REPORT The 2012 Mobile Election In 2008, when Obama was first elected as President, smartphones were just gaining popularity and tablets were R&D blueprints somewhere in Silicon Valley. Fast-forward to 2012, President Obama tweets on average 29 times a day and both parties have mobile apps explaining their policies. The election is a perfect indicator of the power of mobile and how it transformed the campaign process. As reported in VatorNews, one in ten Americans “dual-screened” the presidential debates on their TVs and on their mobile devices. Additionally, 35% of smartphones owners used their mobile device to fact check what was being said during the debates. Fundraising also received a technological face-lift. Obama initiated a mobile messaging campaign to encourage donations via SMS. And both Obama and Romney used Square at fundraising events for people to donate with their credit cards. By the 2016 elections, who knows what type of advancements we will make with mobile. According to a survey conducted by Mojiva, 85% of respondents would consider using their mobile device to vote on Election Day. Imagine mobile voting in a cab or on the treadmill or while you wait for coffee in Starbucks. The impact of mobile on the elections is not only apparent but should serve as inspiration for marketers aiming to move closer to consumers. With mobile, both Obama and Romney made a connection with constituents that was rich, dynamic and contextually relevant.
    [Show full text]
  • Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla
    Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla To cite this version: Paul Irolla. Formalization of Neural Network Applications to Secure 3D Mobile Applications. Quanti- tative Methods [q-bio.QM]. Université Paris Saclay (COmUE), 2018. English. NNT : 2018SACLS585. tel-02047792 HAL Id: tel-02047792 https://tel.archives-ouvertes.fr/tel-02047792 Submitted on 25 Feb 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Formalization of neural 2018SACLS585 network to secure 3D NNT: mobile applications Thèse de doctorat de l’Université Paris-Saclay préparée à l’Université Paris-Sud École doctorale n± 568 Biosigne Spécialité de doctorat: innovation technologique Thèse présentée et soutenue a l’ESIEA Laval, le 19 décembre 2018, par Paul Irolla Composition du jury: Éric Filiol Directeur de recherche — Laboratoire CNS Directeur de thèse Jean-Philippe Deslys Directeur de recherche — Laboratoire CEA/DRF/iMETI/SEPIA Co-directeur de thèse Ludovic Apvrille Professeur — Laboratoire LabSoC (Telecom ParisTech) Rapporteur Antonella Santone Professeur — Università degli Studi del Molise Rapporteur Maroun Chamoun Professeur — Université Saint-Joseph (Beyrouth) Président Akka Zemmari Maître de conférences — Laboratoire LaBRI (CNRS) Examinateur Thèse de doctorat Thèse Titre: Formalisation et applications des réseaux de neurones à la sécurisation d’applications mobiles 3D.
    [Show full text]
  • Analysis and Classification of Android Malware
    Analysis and Classification of Android Malware Kimberly Kim-Chi Tam Information Security Department Royal Holloway, University of London A thesis submitted for the degree of Doctor of Philosophy 2016 Acknowledgements First I would like to acknowledge my supervisor and advisor, Dr. Lorenzo Cavallaro and Professor Cid Carlos, for the amazing opportunity to do my PhD at Royal Holloway University of London. It would not have been possible without you two. I would also like to acknowledge my fellow Royal Holloway University of London lab members and external collaborators for their partnership in collaborative work. In particular I would like to thank Salahuddin Khan for his technical expertise, his professionalism, and his friendship. Similarly, I feel much gratitude towards Professor Kevin Jones and Dr. War- rick Cooke for their extensive advice for both fine-tuning this thesis in detail and the overall story and flow. Parts of this research was funded by UK EPSRC grant EP/L022710/1. I would also like to thank Hewlett-Packard in Bristol for the internship op- portunity during my PhD as well as all of their support since then. Finally, I want to acknowledge my family and friends scattered across the globe. Organizing opportunities to connect has been a real challenge over the last few years, but we always managed it. So thank you all for the fun and help throughout the good times and bad. I could not have gotten this far without your awesomeness. “One does not discover new lands without consenting to lose sight of the shore for a very long time.” Andre Gide 2 Abstract With the integration of mobile devices into our daily lives, smartphones are privy to increasing amounts of sensitive information.
    [Show full text]
  • Trendlabs 1Q 2014 Security Roundup: Cybercrime Hits The
    TrendLabsSM 1Q 2014 Security Roundup Cybercrime Hits the Unexpected Bitcoin- and PoS-System-Related Attacks Trouble Users TREND MICRO | TrendLabs 1Q 2014 Security Roundup Contents 1 | Cybercrime and the Cybercriminal Underground 10 | Mobile Threat Landscape 15 | Targeted Attack Campaigns and Cyber Attacks 21 | Digital Life and the Internet of Everything 25 | Appendix TREND MICRO | TrendLabs 1Q 2014 Security Roundup Introduction At the end of 2013, we realized that digital after unusual targets like PoS terminals in heists pushed stick-’em-up bank heists retail chains.4 1 to the curb. While this holds true amid This quarter’s biggest stories featured large data breach incidents and rampant well-orchestrated schemes and large cybercrime, the first quarter of 2014 also sums of money lost to enterprising showed that today’s cybercriminals are cybercriminals. Online banking malware, aiming at previously nontargeted entities for instance, exhibited new behaviors to carry out malicious deeds. Proof though the core tactics cybercriminals of these include the US$480-million used to spread them stayed the same. digital heist Bitcoin exchange, MtGox, Bitcoins and related attacks gained suffered from and recent attacks against prominence as a financial instrument and large retailers via point-of-sale (PoS) a threat. The mobile threat landscape did 2, 3 terminals. These high-profile crimes not undergo drastic changes this quarter targeted unexpected information sources though it has been dubbed “more mature” even if attackers went after the same with the emergence of more Android™ thing—money, used the same techniques bugs. The retailer data breaches we saw despite more strategic planning, and were in recent months highlighted the need for motivated by greed.
    [Show full text]
  • Lutte Contre Les Botnets : Analyse Et Stratégie Eric Freyssinet
    Lutte contre les botnets : analyse et stratégie Eric Freyssinet To cite this version: Eric Freyssinet. Lutte contre les botnets : analyse et stratégie. Cryptographie et sécurité [cs.CR]. Université Pierre et Marie Curie - Paris VI, 2015. Français. NNT : 2015PA066390. tel-01231974v3 HAL Id: tel-01231974 https://tel.archives-ouvertes.fr/tel-01231974v3 Submitted on 15 Feb 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, Supélec Rennes Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M.
    [Show full text]
  • Entrepreneurial Ecosystems Around the Globe and Early-Stage Company Growth Dynamics
    Entrepreneurial Ecosystems Around the Globe and Early-Stage Company Growth Dynamics January 2014 Project Team Steering Committee World Economic Forum: Members: Michael Drexler, Senior Director, Head of George Foster, Konosuke Matsushita Investors Industries, World Economic Professor of Management at the Graduate Forum USA School of Business, Stanford Maha Eltogby, Director, Head of Private University (Project Co-Leader) Investors, World Economic Forum USA Dan Isenberg, Professor of Entrepreneurship Practice, Babson Stanford University: Executive Education, Babson College George Foster, Konosuke Matsushita Habib Haddad, Chief Executive Officer, Professor of Management at the Graduate Wamda School of Business, Stanford Calvin Chin, Chief Executive Officer, Transist University (Project Co-Leader) Randa Ayoubi, Chief Executive Officer, Carlos Shimizu, Project Manager and Rubicon Group Holding Instructor at the Graduate School of J. Michael Cline, Managing Partner, Business, Stanford University (Project Accretive LLC Co-Leader) Linda Rottenberg, Co-Founder and Chief Steve Ciesinski, Vice President of Strategic Executive Officer, Endeavor Business Development at SRI International and Lecturer at the Graduate School of Thomas Speechley, Partner, The Abraaj Business, Stanford University Group, United Arab Emirates Antonio Davila, Professor and Head of the Arvind Sodhani, President, Intel Capital and Entrepreneurship Department and Executive Vice-President, Intel Corporation Entrepreneurship and Innovation Center at Maria Pinelli, Global Vice Chair
    [Show full text]
  • Fall 2019.Pdf
    VOLUME 45 ISSUE 4 FALL, 2019 Commissioner’s Corner: New Emergency Michelle Elder Contact Tool Hello Huntington Woods! Since being appointed in Janu- The Huntington Woods Public Safety ary 2019 as your newest City Commissioner, I’ve met staff Department is introducing a new service from all city departments, have regularly participated in the for residents to assist first responders. monthly city commission meetings, engaged with govern- Residents that fill out an Alert Form for ment officials from neighboring cities, met new residents, The Elder Family Dispatchers can have important infor- hosted three “Meet up with Michelle” and had the pleasure mation on file so dispatchers can relay it of connecting with many of you. I learned quickly many of you are concerned about in- quickly to first responders. The proj- frastructure, housing and community values. This process helped shape my top policy priorities, which I am excited to share the City Commission has made progress in: ect was developed by the City’s Senior Advisory Committee to identify seniors 1. Improve our city’s infrastructure and services. Power outages are frustrating and we and other vulnerable residents in an have been advocating for a more permanent solution. Meanwhile, our sewer system emergency and to ensure Public Safety improvements are in process with a three-phase plan: can respond appropriately to calls for • Pipelining, funded by a $17/quarter/household fee, began this summer to rein- service. By providing additional emer- force some of the sewer mains. gency information to 9-1-1, the City can • Pipe replacement, paid for by a bond which was approved by voters in November help residents faster in an emergency.
    [Show full text]