2017
DOI: 10.1007/978-3-662-54970-4_22
|View full text |Cite
|
Sign up to set email alerts
|

Leaky Birds: Exploiting Mobile Application Traffic for Surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 18 publications
0
18
0
Order By: Relevance
“…Related work suggested the use of deep packet inspection (DPI) for this purpose. Some approaches attempt to automatically identify clear-text snippets in network traffic that are unique to an app [64,68]. Other classifiers focus specifically on HTTP headers in combination with traditional machine learning [44] or deep learning approaches [19].…”
Section: Related Workmentioning
confidence: 99%
“…Related work suggested the use of deep packet inspection (DPI) for this purpose. Some approaches attempt to automatically identify clear-text snippets in network traffic that are unique to an app [64,68]. Other classifiers focus specifically on HTTP headers in combination with traditional machine learning [44] or deep learning approaches [19].…”
Section: Related Workmentioning
confidence: 99%
“…Previous work has analyzed the collection of personal information through both static and dynamic analysis [1,10,24]. Static analysis consists of evaluating soft-ware without execution [1,7], whereas dynamic analysis focuses on tracking the transmission of sensitive information at runtime [10,36,40,50]. Runtime behavior is often paired with the observation of network traffic to identify personal data dissemination.…”
Section: Analysis Of Mobile App Privacymentioning
confidence: 99%
“…Vanrykel et al [88] use a non-learning approach to user fingerprinting is described. A PC connected to a mobile device installs and performs scripted actions on applications and signals VPN servers to start and stop data capture.…”
Section: User and Device Fingerprintingmentioning
confidence: 99%