-
1
-
-
84883078013
-
Little brothers watching you": Raising awareness of data leaks on smart phones
-
R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen. "little brothers watching you": raising awareness of data leaks on smart phones. In Proc. of ACM SOUPS '13, pages 121-1211, 2013.
-
(2013)
Proc. of ACM SOUPS '13
, pp. 121-1211
-
-
Balebako, R.1
Jung, J.2
Lu, W.3
Cranor, L.F.4
Nguyen, C.5
-
2
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proc. of ACM CCS '10, pages 73-84, 2010.
-
(2010)
Proc. of ACM CCS '10
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Oorschot, P.C.V.3
Somayaji, A.4
-
3
-
-
84860764042
-
Mock droid: Trading privacy for application functionality on smart phones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mock droid: Trading privacy for application functionality on smart phones. In Proc. of ACM HotMobile '11, pages 49-54, 2011.
-
(2011)
Proc. of ACM HotMobile '11
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
5
-
-
84864978921
-
Measuring user confidence in smart phone security and privacy
-
E. Chin, A. P. Felt, V. Sekar, and D. Wagner. Measuring user confidence in smart phone security and privacy. In Proc. of ACM SOUPS '12, pages 11-116, 2012.
-
(2012)
Proc. of ACM SOUPS '12
, pp. 11-116
-
-
Chin, E.1
Felt, A.P.2
Sekar, V.3
Wagner, D.4
-
6
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
M. Dietz, S. Shekhar, D. S. Wallach, Y. Pisetsky, and A. Shu. Quire: Lightweight provenance for smart phone operating systems. In Proc. of Usenix Security Symposium, pages 347-362, 2011.
-
(2011)
Proc. of Usenix Security Symposium
, pp. 347-362
-
-
Dietz, M.1
Shekhar, S.2
Wallach, D.S.3
Pisetsky, Y.4
Shu, A.5
-
7
-
-
70349313631
-
Inferring friendship network structure by using mobile phone data
-
N. Eagle, A. Pentland, and D. Lazer. Inferring friendship network structure by using mobile phone data. Proc. of the National Academy of Sciences (PNAS), 106(36):15274-15278, 2009.
-
(2009)
Proc. of the National Academy of Sciences (PNAS)
, vol.106
, Issue.36
, pp. 15274-15278
-
-
Eagle, N.1
Pentland, A.2
Lazer, D.3
-
9
-
-
79955570859
-
Taintdroid: An information-flow tracking system for real time privacy monitoring on smart phones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for real time privacy monitoring on smart phones. In Proc. of OSDI'10, pages 1-6, 2010.
-
(2010)
Proc. of OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.N.7
-
13
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proc. of ACM CCS '11, pages 627-638, 2011.
-
(2011)
Proc. of ACM CCS '11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
14
-
-
84869821127
-
I've got 99 problems, but vibration ain't one: A survey of smart phone users' concerns
-
A. P. Felt, S. Egelman, and D. Wagner. I've got 99 problems, but vibration ain't one: A survey of smart phone users' concerns. In Proc. of ACM SPSM '12, pages 33-44, 2012.
-
(2012)
Proc. of ACM SPSM '12
, pp. 33-44
-
-
Felt, A.P.1
Egelman, S.2
Wagner, D.3
-
15
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: user attention, comprehension, and behavior. In Proc. of ACM SOUPS '12, pages 31-314, 2012.
-
(2012)
Proc. of ACM Soups '12
, pp. 31-314
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
16
-
-
84924320155
-
Survey: Most cell phone users don't protect mobile privacy
-
September
-
A. Gahran. Survey: Most cell phone users don't protect mobile privacy. CNN Tech, September 2012.
-
(2012)
CNN Tech
-
-
Gahran, A.1
-
18
-
-
70350731253
-
A "nutrition label" for privacy
-
P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder. A "nutrition label" for privacy. In Proc. of ACM SOUPS '09, pages 41-412, 2009.
-
(2009)
Proc. of ACM SOUPS '09
, pp. 41-412
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
-
19
-
-
84867438639
-
A conundrum of permissions: Installing applications on an android smart phone
-
P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A conundrum of permissions: Installing applications on an android smart phone. In Proc. of USEC '12, pages 1-12, 2012.
-
(2012)
Proc. of USEC '12
, pp. 1-12
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
20
-
-
84877938356
-
Privacy as part of the app decision-making process
-
P. G. Kelley, L. F. Cranor, and N. Sadeh. Privacy as part of the app decision-making process. In Proc. of ACM CHI'13, pages 3393-3402, 2013.
-
(2013)
Proc. of ACM CHI'13
, pp. 3393-3402
-
-
Kelley, P.G.1
Cranor, L.F.2
Sadeh, N.3
-
21
-
-
78650709933
-
On the leakage of personally identifiable information via online social networks
-
January
-
B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. SIGCOMM Comput. Commun. Rev., 40(1):112-117, January 2010.
-
(2010)
SIGCOMM Comput. Commun. Rev.
, vol.40
, Issue.1
, pp. 112-117
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
22
-
-
77956382087
-
A survey of mobile phone sensing
-
N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell. A survey of mobile phone sensing. Communications Magazine, IEEE, 48(9):140 -150, 2010.
-
(2010)
Communications Magazine, IEEE
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
23
-
-
84910073128
-
Improving mobile app selection through transparency and better permission analysis
-
I. Liccardi, J. Pato, and D. J. Weitzner. Improving Mobile App selection through Transparency and Better Permission Analysis. Journal of Privacy and Confidentiality: Vol. 5: Iss. 2, Article 1., pages 1-55, 2014.
-
(2014)
Journal of Privacy and Confidentiality
, vol.5
, Issue.2
, pp. 1-55
-
-
Liccardi, I.1
Pato, J.2
Weitzner, D.J.3
-
24
-
-
84867459428
-
Expectation and purpose: Understanding users' mental models of mobile app privacy through crowd sourcing
-
J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowd sourcing. In Proc. of ACM UBICOMP '12, pages 501-510, 2012.
-
(2012)
Proc. of ACM UBICOMP '12
, pp. 501-510
-
-
Lin, J.1
Amini, S.2
Hong, J.I.3
Sadeh, N.4
Lindqvist, J.5
Zhang, J.6
-
25
-
-
84952636117
-
How free apps can make more money than paid apps
-
August
-
J. Manoogian. How free apps can make more money than paid apps. Tech Crunch, August 2012.
-
(2012)
Tech Crunch
-
-
Manoogian, J.1
-
26
-
-
84877916057
-
Beliefs and behaviors: Internet users' understanding of behavioral advertising
-
A. McDonald and L. F. Cranor. Beliefs and behaviors: Internet users' understanding of behavioral advertising. In TPRC, pages 1-31. 2010.
-
(2010)
TPRC
, pp. 1-31
-
-
McDonald, A.1
Cranor, L.F.2
-
27
-
-
32644445298
-
The effectiveness of targeted mobile advertising in selling mobile services: An empirical study
-
M. Merisavo, J. Vesanen, A. Arponen, S. Kajalo, and M. Raulas. The effectiveness of targeted mobile advertising in selling mobile services: An empirical study. International Journal of Mobile Communications, 4(2):119-127, 2006.
-
(2006)
International Journal of Mobile Communications
, vol.4
, Issue.2
, pp. 119-127
-
-
Merisavo, M.1
Vesanen, J.2
Arponen, A.3
Kajalo, S.4
Raulas, M.5
-
31
-
-
80055040446
-
Composite social network for predicting mobile apps installation
-
W. Pan, N. Aharony, and A. S. Pentland. Composite social network for predicting mobile apps installation. In Proc. of ACM AAAI '11, pages 821-827, 2011.
-
(2011)
Proc. of ACM AAAI '11
, pp. 821-827
-
-
Pan, W.1
Aharony, N.2
Pentland, A.S.3
-
32
-
-
51749117552
-
Effective advertising on mobile phones: A literature review and presentation of results from 53 case studies
-
T. Parka, R. Shenoya, and G. Salvendya. Effective advertising on mobile phones: A literature review and presentation of results from 53 case studies. Journal of Behaviour Information Technology, 27(5):355-373, 2008.
-
(2008)
Journal of Behaviour Information Technology
, vol.27
, Issue.5
, pp. 355-373
-
-
Parka, T.1
Shenoya, R.2
Salvendya, G.3
-
33
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. Addroid: privilege separation for applications and advertisers in android. In Proc. of ACM ASIACCS '12, pages 71-82, 2012.
-
(2012)
Proc. of ACM ASIACCS '12
, pp. 71-82
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
34
-
-
84909313878
-
Mobile apps take data without permission
-
February
-
N. Perlroth and N. Bilton. Mobile apps take data without permission. New York Times, February 2012.
-
(2012)
New York Times
-
-
Perlroth, N.1
Bilton, N.2
-
35
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. Porter Felt, S. Hanna, E. Chin, H. J. Wang, and E. Moshchuk. Permission re-delegation: Attacks and defenses. In Proc. of Usenix Security Symposium, pages 331-346, 2011.
-
(2011)
Proc. of Usenix Security Symposium
, pp. 331-346
-
-
Felt, A.P.1
Hanna, S.2
Chin, E.3
Wang, H.J.4
Moshchuk, E.5
-
36
-
-
77954021717
-
Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection
-
K. Shilton. Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection. Communications of the ACM, 52(11):48-53, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
, pp. 48-53
-
-
Shilton, K.1
-
39
-
-
84877733931
-
Measuring serendipity: Connecting people, locations and interests in a mobile 3g network
-
I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci. Measuring serendipity: connecting people, locations and interests in a mobile 3g network. In Proc. of ACM IMC '09, pages 267-279, 2009.
-
(2009)
Proc. of ACM IMC '09
, pp. 267-279
-
-
Trestian, I.1
Ranjan, S.2
Kuzmanovic, A.3
Nucci, A.4
-
40
-
-
77749333391
-
The role of push-pull technology in privacy calculus: The case of location-based services
-
H. Xu, H.-H. Teo, B. C. Y. Tan, and R. Agarwal. The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3):135-174, 2009.
-
(2009)
Journal of Management Information Systems
, vol.26
, Issue.3
, pp. 135-174
-
-
Xu, H.1
Teo, H.-H.2
Tan, B.C.Y.3
Agarwal, R.4
-
41
-
-
84888985669
-
No surprises: Measuring intrusiveness of smart phone applications by detecting objective context deviations
-
F. Zhang, F. Shih, and D. Weitzner. No surprises: Measuring intrusiveness of smart phone applications by detecting objective context deviations. In Workshop on Privacy in the Electronic Society (ACM CCS' 13), pages 1-6, 2013.
-
(2013)
Workshop on Privacy in the Electronic Society (ACM CCS' 13)
, pp. 1-6
-
-
Zhang, F.1
Shih, F.2
Weitzner, D.3
|