Proceedings of the 2015 ACM on Conference on Online Social Networks 2015
DOI: 10.1145/2817946.2817947
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Personal Information in Internet Traffic

Abstract: Users today access a multitude of online services-among the most popular of which are online social networks (OSNs)-via both web sites and dedicated mobile applications (apps), using a range of devices (traditional PCs, tablets, and smartphones) that are connected via a variety of networks. The resulting infrastructure makes these services conveniently available anytime and anywhere, enabling them to become an integral part of daily life. As a consequence, users explicitly and implicitly provide a wealth of Pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…Herein, we apply our proposed approach to the dataset and evaluate its performance by comparing it with the baseline approach [3]. We then present interesting findings on the users' PII via an in-depth analysis of the discovered SKs and values.…”
Section: Comparisonmentioning
confidence: 99%
See 3 more Smart Citations
“…Herein, we apply our proposed approach to the dataset and evaluate its performance by comparing it with the baseline approach [3]. We then present interesting findings on the users' PII via an in-depth analysis of the discovered SKs and values.…”
Section: Comparisonmentioning
confidence: 99%
“…A more serious offense is the trading of personal information to third parties by a few malicious applications without the users' permission. However, users are usually not mostly notified that their PII has been surreptitiously collected by malicious applications [3,4]. Therefore, users cannot inspect the information collected by the application and prevent privacy leaks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Dynamic execution is a popular technique used for auditing [34,37,66,72] and validating [18,45,60,33] mobile apps. For example, a security auditor often monitors the network traffic generated by an app to ensure that user-sensitive info is sent encrypted over the network [45,60] and that it is sent to recognized third-party servers only [18,33]. It is common for the auditor to know which part of the app is responsible for the functionality of interest, but dynamically triggering that functionality is still a challenging task.…”
Section: Problem Statementmentioning
confidence: 99%