A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enhanced Identification of Sensitive User Inputs in Mobile Applications
2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy
While smartphones and its apps have a fundamental role in our lives, privacy is a critical issue. ...
This issue is even worse with the current absence of methods that can notify users of possibly dangerous privacy leaks in mobile apps without disturbing users with apps' legitimate privacy exposes. ...
Even though user inputs can be greatly security-sensitive and have risky consequences once it is exposed, little has been done so far to detect them at a large-scale (Nan et al. 2015) . ...
doi:10.5220/0006238405060515
dblp:conf/icissp/AldayelA17
fatcat:hgl23jryjfarfkmi4wvq4kyx6y
A survey of privacy protection techniques for mobile devices
2016
Journal of Communications and Information Networks
Static data propagation analysis Androidleaks [5] proposes a static approach to automatically checking the leakage of sensitive information in Android applications on a large scale. ...
Many efforts have been devoted to protecting mobile users from privacy leakage. ...
difficult to conduct a fast, large-scale, and precise analysis for detecting privacy leakage in Android applications. ...
doi:10.1007/bf03391582
fatcat:t3ohgh5zlja3rdms7vqm6lyqtq
Human mobility data may lead to privacy concerns because a resident can be re-identified from these data by malicious attacks even with anonymized user IDs. ...
Such a large-scale long-term training data collection contradicts the purpose of privacy risk prediction for new urban services, which is to ensure that the quality of high-risk human mobility data is ...
In particular, our study on ve large-scale mobility datasets covers a broad spectrum of spatial and temporal granularity. ...
doi:10.1145/3534581
fatcat:m77bomjehbfdxdbh4lvpi6n4vu
Demo: AntMonitor
2015
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking - MobiCom '15
We propose AntMonitor -the first system of its kind that supports (i) collection of large-scale, semantic-rich network traffic in a way that respects users' privacy preferences and (ii) detection and prevention ...
The first property makes AntMonitor a powerful tool for network researchers who want to collect and analyze large-scale yet fine-grained mobile measurements. ...
LogServer receives crowdsourced data from a large number of devices, which enables global large-scale analysis. ...
doi:10.1145/2789168.2789170
dblp:conf/mobicom/ShubaLGVLM15
fatcat:3unytrhmwfbxxondwm5ynsnipi
Research on the Association of Mobile Social Network Users Privacy Information Based on Big Data Analysis
2019
Journal of Information Hiding and Privacy Protection
The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications. ...
The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control. ...
, and conduct simulation experiments and comparative analysis to comprehensively solve the problem of user privacy leakage in mobile social network applications. ...
doi:10.32604/jihpp.2019.05942
fatcat:476cvi3mwzea3i3f75gm4wnpne
Vision
2011
Proceedings of the second international workshop on Mobile cloud computing and services - MCS '11
test coverage, and scaling to large numbers of apps. ...
Fortunately, unlike in the PC world, we have a unique opportunity to improve the security of mobile applications thanks to the centralized nature of app distribution through popular app markets. ...
This will enable a large-scale security validation service to be built at low cost by utilizing the cloud for computation. ...
doi:10.1145/1999732.1999740
fatcat:y5x2h24qvva3bluyz3wtym67gq
UIPicker: User-Input Privacy Identification in Mobile Applications
2015
USENIX Security Symposium
Identifying sensitive user inputs is a prerequisite for privacy protection. ...
Manually marking them involves a lot of effort, impeding a large-scale, automated analysis of apps for potential information leaks. ...
We also thank Cheetah Mobile Inc. (NYSE:CMCM), Antiy labs, Li Tan and Yifei Wu for their assistance in our experiments. ...
dblp:conf/uss/NanYYZGW15
fatcat:5teqdtvuzneplgzdmise2s5zua
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
[article]
2013
arXiv
pre-print
.), a number of privacy concerns need to be taken into account prior to a large-scale deployment of these applications. ...
Participants collect and report measurements from their mobile devices and entrust them to the cloud to be made available to applications and users. ...
Nevertheless, the feasibility of the approach in large scale participatory sensing applications would be severely limited by cost and availability of per-user proxies. ...
arXiv:1308.2921v1
fatcat:xxku5q424jhoxbc47con6pkpau
Mobile crowdsensing: current state and future challenges
2011
IEEE Communications Magazine
These devices will fuel the evolution of the Internet of Things as they feed sensor data to the Internet at a societal scale. ...
In this paper, we will examine a category of applications that we term mobile crowdsensing, where individuals with sensing and computing devices collectively share data and extract information to measure ...
Further, we would also like to thank Maria Ebling, Thomas Erickson, and Wendy Kellog for their valuable inputs to this paper. ...
doi:10.1109/mcom.2011.6069707
fatcat:76torv6jlbbc3ihpyyhew3wqu4
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
2013
IEEE Transactions on Information Forensics and Security
Users produce measurements from their mobile devices, thus, a number of privacy concerns -due to the personal information conveyed by reports -may hinder the large-scale deployment of participatory sensing ...
We explore realistic architectural assumptions and a minimal set of formal requirements aiming at protecting privacy of both data producers and consumers. ...
We are also grateful to Nokia for the devices used in our experiments. ...
doi:10.1109/tifs.2013.2287092
fatcat:zmhmt2eyuffjro6zwd6ucqeape
The Road Towards Private Proximity Services
2019
2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
To improve user's privacy from a system point of view, we analyzed different security mechanisms in the domain of device-to-device (D2D) communication such as access control, location privacy. ...
Towards private proximity services, we realized a set of proximity services at different spatial resolutions. ...
The popularity of PBS is largely driven by social networking applications, in which the direct communication between nearby mobile devices is particularly interesting. ...
doi:10.1109/wowmom.2019.8793013
dblp:conf/wowmom/HausDO19
fatcat:orb4val6srfprg6tiuhunzmkta
Privacy-preserving computation for location-based information survey via mobile cloud computing
2013
2013 IEEE/CIC International Conference on Communications in China (ICCC)
The design objective is twofold: i) calculate an information distribution for a pool of mobile users, and ii) protecting the location and value privacy of individual user, in the presence of malicious ...
Our proposed solution leverages a mobile cloud computing paradigm, in which each mobile device is replicated with a system-level clone in a proximate cloud environment. ...
large scale applications. ...
doi:10.1109/iccchina.2013.6671097
fatcat:k5casnxq2bgp7acb3odihupdkm
Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics
[article]
2014
arXiv
pre-print
We then discuss a number of methods, recommendations, and ongoing research in limiting the privacy leakages and associated risks by mobile computing. ...
In this paper, we survey the current state of the art on mobile computing research, focusing on privacy risks and data leakage effects. ...
PCLeaks performed a large scale experiment on 2000 applications. It has been found that large number of applications pose potential capability leaks. ...
arXiv:1410.4978v1
fatcat:tp6hjepjqjghjaydu2litxrm7e
Antecedents of Smartphone user Satisfaction, Trust and Loyalty Towards Mobile Applications
2016
Indian Journal of Science and Technology
Online retailers try a number of campaign and strategy to improve mobile commerce adaptation rates. The annual Mobile applications investment activity is raised in the last few years. ...
Any transactions with a monetary value that can be made through the applications that are downloaded from the smartphone are referred to as Mobile applications 2,3. ...
The identified input factors such as User interface quality and perceived privacy towards mobile applications among the smartphone users were found to have a strong influence on user satisfaction and user ...
doi:10.17485/ijst/2016/v9i32/98651
fatcat:fvgn4kx465dcpaxk45rqegxziu
Making Connections
2017
Circulation. Cardiovascular Quality and Outcomes
Efforts include analyses of large-scale anonymized logs of queries input to web search engines and words appearing in posts on Twitter. ...
Studies span such topics as tracking the incidence and spread of infectious diseases, 6,7 stratification of people at risk for illness, 8, 9 and identifying adverse effects of medications. 10 Logs of user ...
Efforts include analyses of large-scale anonymized logs of queries input to web search engines and words appearing in posts on Twitter. ...
doi:10.1161/circoutcomes.117.003573
pmid:28325752
fatcat:p7disazvjzektabtddbofx7hk4
« Previous
Showing results 1 — 15 out of 49,509 results