Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information
暂无分享,去创建一个
Kai Chih Chang | K. Suzanne Barber | Razieh Nokhbeh Zaeem | Kai-Chi Chang | Razieh Nokhbeh | Z. K. S. Barber | The Suzanne Barber
[1] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[2] K. Suzanne Barber,et al. Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem , 2018, WPES@CCS.
[3] Agusti Solanas,et al. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.
[4] Shuang Zhao,et al. I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing , 2016, ACISP.
[5] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[6] John Conyers,et al. U.S. Citizenship and Immigration Services , 2020, Federal Regulatory Guide.
[7] Kim-Kwang Raymond Choo,et al. A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps , 2015, 2015 48th Hawaii International Conference on System Sciences.
[8] Chandrajit L. Bajaj,et al. Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).
[9] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[10] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[11] Ali Sunyaev,et al. Availability and quality of mobile health app privacy policies , 2015, J. Am. Medical Informatics Assoc..
[12] Mark Rowan,et al. A Privacy Policy Comparison of Health and Fitness Related Mobile Applications , 2014, EUSPN/ICTH.
[13] Lorrie Faith Cranor,et al. "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.
[14] Arnaud Legout,et al. Using the Middle to Meddle with Mobile , 2013 .
[15] D. Wetherall,et al. A Study of Third-Party Tracking by Mobile Apps in the Wild , 2012 .
[16] Razieh Nokhbeh Zaeem,et al. Identity Threat Assessment and Prediction , 2019 .
[17] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[18] Eric Smith. iPhone Applications & Privacy Issues: An Analysis of Application Transmission of iPhone Unique Device Identifiers (UDIDs) , 2010 .
[19] Chang Liu,et al. An Examination of Privacy Policies in Fortune 500 Web Sites , 2002 .
[20] George Theodorakopoulos,et al. Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted? , 2017, ATCS/SePrIoT@SecureComm.