CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks
暂无分享,去创建一个
Shehroze Farooqi | Fareed Zaffar | Zubair Shafiq | Maaz Musa | Zubair Shafiq | Fareed Zaffar | Shehroze Farooqi | M. Musa
[1] Gianluca Stringhini,et al. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns , 2011, LEET.
[2] Krishna P. Gummadi,et al. Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[3] Stefan Savage,et al. Following Their Footsteps: Characterizing Account Automation Abuse and Defenses , 2018, Internet Measurement Conference.
[4] Keith W. Ross,et al. I Know What You're Buying: Privacy Breaches on eBay , 2014, Privacy Enhancing Technologies.
[5] Edgar R. Weippl,et al. Appinspect: large-scale evaluation of social networking apps , 2013, COSN '13.
[6] Arvind Narayanan,et al. I never signed up for this! Privacy implications of email tracking , 2018, Proc. Priv. Enhancing Technol..
[7] Urs Hengartner,et al. PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices , 2015, SPSM@CCS.
[8] Pern Hui Chia,et al. Is this app safe?: a large scale study on application permissions and risk signals , 2012, WWW.
[9] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[10] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[11] Edward W. Felten,et al. Cookies That Give You Away: The Surveillance Implications of Web Tracking , 2015, WWW.
[12] Keshnee Padayachee. Aspectising honeytokens to contain the insider threat , 2015, IET Inf. Secur..
[13] Stefan Savage,et al. Tripwire: inferring internet site compromise , 2017, Internet Measurement Conference.
[14] Chris Kanich,et al. Botnet Judo: Fighting Spam with Itself , 2010, NDSS.
[15] Rayford B. Vaughn,et al. Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[16] Nick Nikiforakis,et al. Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms , 2016, Proc. Priv. Enhancing Technol..
[17] Arnaud Legout,et al. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.
[18] Narseo Vallina-Rodriguez,et al. Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem , 2018, NDSS.
[19] Narseo Vallina-Rodriguez,et al. Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions , 2018, NDSS.
[20] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[21] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[22] Balachander Krishnamurthy,et al. Privacy leakage vs . Protection measures : the growing disconnect , 2011 .
[23] Chris Kanich,et al. O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web , 2018, USENIX Security Symposium.
[24] Claude Castelluccia,et al. How Unique and Traceable Are Usernames? , 2011, PETS.
[25] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[26] Gang Wang,et al. Follow the green: growth and dynamics in twitter follower markets , 2013, Internet Measurement Conference.
[27] Emiliano De Cristofaro,et al. Measuring, Characterizing, and Detecting Facebook Like Farms , 2017, ACM Trans. Priv. Secur..
[28] Gianluca Stringhini,et al. What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild , 2016, Internet Measurement Conference.
[29] Narseo Vallina-Rodriguez,et al. “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale , 2018, Proc. Priv. Enhancing Technol..
[30] Shehroze Farooqi,et al. Measuring and mitigating oauth access token abuse by collusion networks , 2017, Internet Measurement Conference.
[31] Jens Grossklags,et al. Third-party apps on Facebook: privacy and the illusion of control , 2011, CHIMIT '11.