Does this App Really Need My Location?
暂无分享,去创建一个
Jason I. Hong | Yuvraj Agarwal | Nishad Gothoskar | Saksham Chitkara | Suhas Harish | Jason I. Hong | Nishad Gothoskar | Yuvraj Agarwal | Saksham Chitkara | S. Harish
[1] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[2] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[3] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[4] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[5] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[6] Ardalan Amiri Sani,et al. Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems , 2016, IEEE Transactions on Mobile Computing.
[7] Jeff H. Perkins,et al. Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.
[8] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[9] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[10] Narseo Vallina-Rodriguez,et al. Haystack: A Multi-Purpose Mobile Vantage Point in User Space , 2015, 1510.01419.
[11] Lorrie Faith Cranor,et al. "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.
[12] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[13] Yao Guo,et al. PERUIM: understanding mobile application privacy with permission-UI mapping , 2016, UbiComp.
[14] David A. Wagner,et al. Short paper: location privacy: user behavior in the field , 2012, SPSM '12.
[15] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[16] David A. Wagner,et al. The effect of developer-specified explanations for permission requests on smartphone user behavior , 2014, CHI.
[17] Jun Zhao,et al. Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps , 2017, CHI.
[18] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[19] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[20] Haoyu Wang,et al. Using text mining to infer the purpose of permission use in mobile apps , 2015, UbiComp.
[21] Ilaria Liccardi,et al. Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.
[22] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.
[23] Alessandro Acquisti,et al. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.
[24] Arnaud Legout,et al. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.
[25] Fabio Massacci,et al. StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications , 2015, CODASPY.