2020
DOI: 10.1007/978-3-030-44081-7_19
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Traffic Analysis: It has been shown that a vast amount of PII is directly embedded in queries, headers or post body of HTTP requests. By using ISP traffic logs or self-collected datasets, numerous mobile advertising and tracking services were uncovered, in which persistent identifiers including IMEI, IMSI, MAC address and advertising IDs are often transmitted [21,24,32,33]. Note that most of the services are hosted by third-party companies instead of phone vendors.…”
Section: Related Workmentioning
confidence: 99%
“…Traffic Analysis: It has been shown that a vast amount of PII is directly embedded in queries, headers or post body of HTTP requests. By using ISP traffic logs or self-collected datasets, numerous mobile advertising and tracking services were uncovered, in which persistent identifiers including IMEI, IMSI, MAC address and advertising IDs are often transmitted [21,24,32,33]. Note that most of the services are hosted by third-party companies instead of phone vendors.…”
Section: Related Workmentioning
confidence: 99%
“…Nikiforakis et al [44] demonstrated in 2012 that large proportions of websites rely on JavaScript libraries hosted on ill-maintained external web servers, making JavaScript exploits trivial. Wang et al [57] studied use of third parties in China, highlighting differences to Western studies. Lauinger et al [38] led a further study, classifying sensitive libraries and the vulnerabilities caused by them.…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge this work is the first in-depth measurement study of the data privacy practices of popular proprietary variants of the Android OS. The analysis of whether mobile apps disclose sensitive information to their associated back-end servers has been the focus of much research [3][4][5][6][7][8], especially with a view to risks such user de-anonymization, location tracking, behaviour profiling, and cross-linking of data by different stakeholders in the device/software supply chain. Probably closest to the present work are recent analyses of the data that web browsers share with their back-end servers [9] and of the data shared by Google Play Services [10][11][12].…”
Section: Introductionmentioning
confidence: 99%