ipShield: A Framework For Enforcing Context-Aware Privacy
暂无分享,去创建一个
Mani B. Srivastava | Yasser Shoukry | Supriyo Chakraborty | Chenguang Shen | Kasturi Rangan Raghavan | Matt Millar | M. Srivastava | Supriyo Chakraborty | Chenguang Shen | Yasser Shoukry | K. Raghavan | Matt Millar
[1] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[2] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[3] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[4] Mani B. Srivastava,et al. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment , 2011, CHI.
[5] Mani B. Srivastava,et al. A framework for context-aware privacy of sensor data on mobile systems , 2013, HotMobile '13.
[6] David A. Basin,et al. An information-theoretic model for adaptive side-channel attacks , 2007, CCS '07.
[7] Seth J. Teller,et al. Online pose classification and walking speed estimation using handheld devices , 2012, UbiComp '12.
[8] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[9] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[10] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[11] Vitaly Shmatikov,et al. πBox: A Platform for Privacy-Preserving Apps , 2013 .
[12] Deborah Estrin,et al. Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.
[13] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[14] Deborah Estrin,et al. Using mobile phones to determine transportation modes , 2010, TOSN.
[15] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[16] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[17] Wei Pan,et al. SoundSense: scalable sound sensing for people-centric applications on mobile phones , 2009, MobiSys '09.
[18] Daniel Gatica-Perez,et al. StressSense: detecting stress in unconstrained acoustic environments using smartphones , 2012, UbiComp.
[19] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[20] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[21] Jie Liu,et al. Mobile Apps: It's Time to Move Up to CondOS , 2011, HotOS.
[22] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[23] Anind K. Dey,et al. Proceedings of the 2012 ACM Conference on Ubiquitous Computing , 2012, UBICOMP 2012.
[24] Niels Brouwers Delft. Detecting Dwelling in Urban Environments Using GPS , WiFi , and Geolocation Measurements , 2011 .
[25] Deborah Estrin,et al. SensLoc: sensing everyday places and paths using less energy , 2010, SenSys '10.
[26] Meng-Chieh Chiu,et al. Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing , 2013, MobiSys '13.
[27] 吉田 則裕,et al. Android Open Source Projectを対象としたパッチレビュー活動の調査 , 2012 .
[28] Ling Bao,et al. Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.
[29] Lara Dolecek,et al. Protecting data against unwanted inferences , 2013, 2013 IEEE Information Theory Workshop (ITW).
[30] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[31] Emre Ertin,et al. Continuous inference of psychological stress from sensory measurements collected in the natural environment , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.
[32] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[33] J. Canny,et al. AMMON : A Speech Analysis Library for Analyzing Affect , Stress , and Mental Health on Mobile Phones , 2011 .
[34] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[35] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[36] Qiang Li,et al. Auditeur: a mobile-cloud service platform for acoustic event detection on smartphones , 2013, MobiSys '13.
[37] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[38] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[39] Emre Ertin,et al. mConverse: inferring conversation episodes from respiratory measurements collected in the field , 2011, Wireless Health.
[40] Lukasz Ziarek,et al. Flow Permissions for Android , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[41] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[42] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[43] Vitaly Shmatikov,et al. Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 , 2011, CCS.
[44] Cecilia Mascolo,et al. EmotionSense: a mobile phones based adaptive platform for experimental social psychology research , 2010, UbiComp.
[45] Ramesh Govindan,et al. Cloud-enabled privacy-preserving collaborative learning for mobile sensing , 2012, SenSys '12.
[46] Marcus Chang,et al. Accurate caloric expenditure of bicyclists using cellphones , 2012, SenSys '12.
[47] Todd Millstein,et al. Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android , 2011 .
[48] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[49] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[50] Sriram Subramanian,et al. Talking about tactile experiences , 2013, CHI.
[51] D. Estrin,et al. Open mHealth Architecture: An Engine for Health Care Innovation , 2010, Science.