Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








49,509 Hits in 4.0 sec

Enhanced Identification of Sensitive User Inputs in Mobile Applications

Mashael Aldayel, Mohammad Alhussain
2017 Proceedings of the 3rd International Conference on Information Systems Security and Privacy  
While smartphones and its apps have a fundamental role in our lives, privacy is a critical issue.  ...  This issue is even worse with the current absence of methods that can notify users of possibly dangerous privacy leaks in mobile apps without disturbing users with apps' legitimate privacy exposes.  ...  Even though user inputs can be greatly security-sensitive and have risky consequences once it is exposed, little has been done so far to detect them at a large-scale (Nan et al. 2015) .  ... 
doi:10.5220/0006238405060515 dblp:conf/icissp/AldayelA17 fatcat:hgl23jryjfarfkmi4wvq4kyx6y

A survey of privacy protection techniques for mobile devices

Lei Zhang, Donglai Zhu, Zhemin Yang, Limin Sun, Min Yang
2016 Journal of Communications and Information Networks  
Static data propagation analysis Androidleaks [5] proposes a static approach to automatically checking the leakage of sensitive information in Android applications on a large scale.  ...  Many efforts have been devoted to protecting mobile users from privacy leakage.  ...  difficult to conduct a fast, large-scale, and precise analysis for detecting privacy leakage in Android applications.  ... 
doi:10.1007/bf03391582 fatcat:t3ohgh5zlja3rdms7vqm6lyqtq

TransRisk

Xiaoyang Xie, Zhiqing Hong, Zhou Qin, Zhihan Fang, Yuan Tian, Desheng Zhang
2022 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
Human mobility data may lead to privacy concerns because a resident can be re-identified from these data by malicious attacks even with anonymized user IDs.  ...  Such a large-scale long-term training data collection contradicts the purpose of privacy risk prediction for new urban services, which is to ensure that the quality of high-risk human mobility data is  ...  In particular, our study on ve large-scale mobility datasets covers a broad spectrum of spatial and temporal granularity.  ... 
doi:10.1145/3534581 fatcat:m77bomjehbfdxdbh4lvpi6n4vu

Demo: AntMonitor

Anastasia Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, Athina Markopoulou
2015 Proceedings of the 21st Annual International Conference on Mobile Computing and Networking - MobiCom '15  
We propose AntMonitor -the first system of its kind that supports (i) collection of large-scale, semantic-rich network traffic in a way that respects users' privacy preferences and (ii) detection and prevention  ...  The first property makes AntMonitor a powerful tool for network researchers who want to collect and analyze large-scale yet fine-grained mobile measurements.  ...  LogServer receives crowdsourced data from a large number of devices, which enables global large-scale analysis.  ... 
doi:10.1145/2789168.2789170 dblp:conf/mobicom/ShubaLGVLM15 fatcat:3unytrhmwfbxxondwm5ynsnipi

Research on the Association of Mobile Social Network Users Privacy Information Based on Big Data Analysis

Pingshui Wang, Zecheng Wang, Qinjuan Ma
2019 Journal of Information Hiding and Privacy Protection  
The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.  ...  The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.  ...  , and conduct simulation experiments and comparative analysis to comprehensively solve the problem of user privacy leakage in mobile social network applications.  ... 
doi:10.32604/jihpp.2019.05942 fatcat:476cvi3mwzea3i3f75gm4wnpne

Vision

Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung
2011 Proceedings of the second international workshop on Mobile cloud computing and services - MCS '11  
test coverage, and scaling to large numbers of apps.  ...  Fortunately, unlike in the PC world, we have a unique opportunity to improve the security of mobile applications thanks to the centralized nature of app distribution through popular app markets.  ...  This will enable a large-scale security validation service to be built at low cost by utilizing the cloud for computation.  ... 
doi:10.1145/1999732.1999740 fatcat:y5x2h24qvva3bluyz3wtym67gq

UIPicker: User-Input Privacy Identification in Mobile Applications

Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang
2015 USENIX Security Symposium  
Identifying sensitive user inputs is a prerequisite for privacy protection.  ...  Manually marking them involves a lot of effort, impeding a large-scale, automated analysis of apps for potential information leaks.  ...  We also thank Cheetah Mobile Inc. (NYSE:CMCM), Antiy labs, Li Tan and Yifei Wu for their assistance in our experiments.  ... 
dblp:conf/uss/NanYYZGW15 fatcat:5teqdtvuzneplgzdmise2s5zua

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) [article]

Emiliano De Cristofaro, Claudio Soriente
2013 arXiv   pre-print
.), a number of privacy concerns need to be taken into account prior to a large-scale deployment of these applications.  ...  Participants collect and report measurements from their mobile devices and entrust them to the cloud to be made available to applications and users.  ...  Nevertheless, the feasibility of the approach in large scale participatory sensing applications would be severely limited by cost and availability of per-user proxies.  ... 
arXiv:1308.2921v1 fatcat:xxku5q424jhoxbc47con6pkpau

Mobile crowdsensing: current state and future challenges

Raghu Ganti, Fan Ye, Hui Lei
2011 IEEE Communications Magazine  
These devices will fuel the evolution of the Internet of Things as they feed sensor data to the Internet at a societal scale.  ...  In this paper, we will examine a category of applications that we term mobile crowdsensing, where individuals with sensing and computing devices collectively share data and extract information to measure  ...  Further, we would also like to thank Maria Ebling, Thomas Erickson, and Wendy Kellog for their valuable inputs to this paper.  ... 
doi:10.1109/mcom.2011.6069707 fatcat:76torv6jlbbc3ihpyyhew3wqu4

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)

Emiliano De Cristofaro, Claudio Soriente
2013 IEEE Transactions on Information Forensics and Security  
Users produce measurements from their mobile devices, thus, a number of privacy concerns -due to the personal information conveyed by reports -may hinder the large-scale deployment of participatory sensing  ...  We explore realistic architectural assumptions and a minimal set of formal requirements aiming at protecting privacy of both data producers and consumers.  ...  We are also grateful to Nokia for the devices used in our experiments.  ... 
doi:10.1109/tifs.2013.2287092 fatcat:zmhmt2eyuffjro6zwd6ucqeape

The Road Towards Private Proximity Services

Michael Haus, Aaron Yi Ding, Jorg Ott
2019 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
To improve user's privacy from a system point of view, we analyzed different security mechanisms in the domain of device-to-device (D2D) communication such as access control, location privacy.  ...  Towards private proximity services, we realized a set of proximity services at different spatial resolutions.  ...  The popularity of PBS is largely driven by social networking applications, in which the direct communication between nearby mobile devices is particularly interesting.  ... 
doi:10.1109/wowmom.2019.8793013 dblp:conf/wowmom/HausDO19 fatcat:orb4val6srfprg6tiuhunzmkta

Privacy-preserving computation for location-based information survey via mobile cloud computing

Hao Zhang, Yonggang Wen, Nenghai Yu, Xinwen Zhang
2013 2013 IEEE/CIC International Conference on Communications in China (ICCC)  
The design objective is twofold: i) calculate an information distribution for a pool of mobile users, and ii) protecting the location and value privacy of individual user, in the presence of malicious  ...  Our proposed solution leverages a mobile cloud computing paradigm, in which each mobile device is replicated with a system-level clone in a proximate cloud environment.  ...  large scale applications.  ... 
doi:10.1109/iccchina.2013.6671097 fatcat:k5casnxq2bgp7acb3odihupdkm

Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics [article]

Muhammad Haris, Hamed Haddadi, Pan Hui
2014 arXiv   pre-print
We then discuss a number of methods, recommendations, and ongoing research in limiting the privacy leakages and associated risks by mobile computing.  ...  In this paper, we survey the current state of the art on mobile computing research, focusing on privacy risks and data leakage effects.  ...  PCLeaks performed a large scale experiment on 2000 applications. It has been found that large number of applications pose potential capability leaks.  ... 
arXiv:1410.4978v1 fatcat:tp6hjepjqjghjaydu2litxrm7e

Antecedents of Smartphone user Satisfaction, Trust and Loyalty Towards Mobile Applications

R. Deepika, V. Karpagam
2016 Indian Journal of Science and Technology  
Online retailers try a number of campaign and strategy to improve mobile commerce adaptation rates. The annual Mobile applications investment activity is raised in the last few years.  ...  Any transactions with a monetary value that can be made through the applications that are downloaded from the smartphone are referred to as Mobile applications 2,3.  ...  The identified input factors such as User interface quality and perceived privacy towards mobile applications among the smartphone users were found to have a strong influence on user satisfaction and user  ... 
doi:10.17485/ijst/2016/v9i32/98651 fatcat:fvgn4kx465dcpaxk45rqegxziu

Making Connections

Eric Horvitz, Ryen W. White
2017 Circulation. Cardiovascular Quality and Outcomes  
Efforts include analyses of large-scale anonymized logs of queries input to web search engines and words appearing in posts on Twitter.  ...  Studies span such topics as tracking the incidence and spread of infectious diseases, 6,7 stratification of people at risk for illness, 8, 9 and identifying adverse effects of medications. 10 Logs of user  ...  Efforts include analyses of large-scale anonymized logs of queries input to web search engines and words appearing in posts on Twitter.  ... 
doi:10.1161/circoutcomes.117.003573 pmid:28325752 fatcat:p7disazvjzektabtddbofx7hk4
« Previous Showing results 1 — 15 out of 49,509 results