Bind your phone number with caution: automated user profiling through address book matching on smartphone
暂无分享,去创建一个
Dengguo Feng | Yao Cheng | Purui Su | Lingyun Ying | Sibei Jiao | Purui Su | D. Feng | Lingyun Ying | Yao Cheng | Sibei Jiao
[1] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[2] Markus Jakobsson,et al. Why and How to Perform Fraud Experiments , 2008, IEEE Security & Privacy.
[3] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[4] Christopher Krügel,et al. Abusing Social Networks for Automated User Profiling , 2010, RAID.
[5] Jessica Staddon,et al. Indirect content privacy surveys: measuring privacy without asking about it , 2011, SOUPS.
[6] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[7] Edgar R. Weippl,et al. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.
[8] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[9] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.