메뉴 건너뛰기




Volumn , Issue , 2015, Pages 297-304

Can't you hear me knocking: Identification of user actions on android apps via traffic analysis

Author keywords

Machine learning; Mobile security; Network traffic analysis; Privacy

Indexed keywords

DATA PRIVACY; LEARNING SYSTEMS; MACHINE LEARNING; MOBILE SECURITY; REMOTE CONTROL;

EID: 84928136695     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2699026.2699119     Document Type: Conference Paper
Times cited : (104)

References (37)
  • 1
    • 84928119742 scopus 로고    scopus 로고
    • Androidrank. http://www.androidrank.org/.
    • Androidrank
  • 4
    • 34249668253 scopus 로고    scopus 로고
    • Knowing the user's every move: User activity tracking for website usability evaluation and implicit interaction
    • R. Atterer, M. Wnuk, and A. Schmidt. Knowing the user's every move: User activity tracking for website usability evaluation and implicit interaction. In Proceedings of ACM WWW, 2006.
    • (2006) Proceedings of ACM WWW
    • Atterer, R.1    Wnuk, M.2    Schmidt, A.3
  • 5
    • 84858438065 scopus 로고    scopus 로고
    • Characterizing user navigation and interactions in online social networks
    • July
    • F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user navigation and interactions in online social networks. Inf. Sci., July 2012.
    • (2012) Inf. Sci
    • Benevenuto, F.1    Rodrigues, T.2    Cha, M.3    Almeida, V.4
  • 8
    • 84869419567 scopus 로고    scopus 로고
    • Touching from a distance: Website fingerprinting attacks and defenses
    • X. Cai, X. C. Zhang, B. Joshi, and R. Johnson. Touching from a distance: Website fingerprinting attacks and defenses. In Proceedings of ACM CCS, 2012.
    • (2012) Proceedings of ACM CCS
    • Cai, X.1    Zhang, X.C.2    Joshi, B.3    Johnson, R.4
  • 9
    • 77955197190 scopus 로고    scopus 로고
    • Side-channel leaks in web applications: A reality today, a challenge tomorrow
    • S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proceedings of IEEE S&P, 2010.
    • (2010) Proceedings of IEEE S&P
    • Chen, S.1    Wang, R.2    Wang, X.3    Zhang, K.4
  • 10
    • 84910657043 scopus 로고    scopus 로고
    • Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities
    • Springer
    • M. Conti, N. Dragoni, and S. Gottardo. Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities. In Security and Trust Management. Springer, 2013.
    • (2013) Security and Trust Management
    • Conti, M.1    Dragoni, N.2    Gottardo, S.3
  • 19
    • 74049147408 scopus 로고    scopus 로고
    • Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier
    • D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In Proceedings of ACM CCSW, 2009.
    • (2009) Proceedings of ACM CCSW
    • Herrmann, D.1    Wendolsky, R.2    Federrath, H.3
  • 20
    • 84878656775 scopus 로고    scopus 로고
    • Privacy and online social networks: Can colorless green ideas sleep furiously?
    • B. Krishnamurthy. Privacy and online social networks: Can colorless green ideas sleep furiously? IEEE Security and Privacy, 2013.
    • (2013) IEEE Security and Privacy
    • Krishnamurthy, B.1
  • 26
    • 0038311863 scopus 로고    scopus 로고
    • Traffc analysis: Protocols, attacks, design issues, and open problems
    • Springer
    • J.-F. Raymond. Traffc analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies. Springer, 2001.
    • (2001) Designing Privacy Enhancing Technologies
    • Raymond, J.-F.1
  • 35
    • 74049138076 scopus 로고    scopus 로고
    • Traffc morphing: An efficient defense against statistical traffic analysis
    • C. V. Wright, S. E. Coull, and F. Monrose. Traffc morphing: An efficient defense against statistical traffic analysis. In Proceedings of NDSS, 2009.
    • (2009) Proceedings of NDSS
    • Wright, C.V.1    Coull, S.E.2    Monrose, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.