Introducing Privacy Threats from Ad Libraries to Android Users Through Privacy Granules
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[2] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[3] Dan S. Wallach,et al. Longitudinal Analysis of Android Ad Library Permissions , 2013, ArXiv.
[4] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[5] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[6] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[7] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[8] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[9] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[10] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[11] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[12] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[13] Hao Chen,et al. Investigating User Privacy in Android Ad Libraries , 2012 .
[14] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[15] Lorrie Faith Cranor,et al. A user study of the expandable grid applied to P3P privacy policy visualization , 2008, WPES '08.
[16] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[17] Suman Nath,et al. Brahmastra: Driving Apps to Test the Security of Third-Party Components , 2014, USENIX Security Symposium.
[18] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[19] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[20] Peter Steenkiste,et al. Access Control to Information in Pervasive Computing Environments , 2003, HotOS.
[21] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.