2017
DOI: 10.1109/msp.2017.25
|View full text |Cite
|
Sign up to set email alerts
|

The Perils of User Tracking Using Zero-Permission Mobile Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Most of these works exploits IMU sensors like accelerometer and gyroscope or the traces from other sensors like GPS and acoustic for fine grained mobility context (say, vehicle type) detection [15], [16]. However, despite all these successes in detecting the mobility just by using IMU sensors and GPS information, there has been a consistent criticism of these sensors for leaking out private information regarding the location of users [7]. Most of these works concentrate on detecting the mobility first and then subsequently use the mobility along with the spatiotemporal information to predict the location of the user [4], [8].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Most of these works exploits IMU sensors like accelerometer and gyroscope or the traces from other sensors like GPS and acoustic for fine grained mobility context (say, vehicle type) detection [15], [16]. However, despite all these successes in detecting the mobility just by using IMU sensors and GPS information, there has been a consistent criticism of these sensors for leaking out private information regarding the location of users [7]. Most of these works concentrate on detecting the mobility first and then subsequently use the mobility along with the spatiotemporal information to predict the location of the user [4], [8].…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, several research works have come up with proper definitions and threat models that deal with such privacy breaches involving leakage of location information [5]- [7]. However, a common approach suggested by most of these works is in devising policies that restrict the usage of IMU sensors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In designing such tools and APIs, openness of data and analytics services hereby need to be balanced with data privacy, as these may be suspect to location-based data mining attempts/attacks (e.g., see [65,66]). …”
Section: Implication For Future Geospatial Game Analytics Platformsmentioning
confidence: 99%
“…Finally, and hand in hand with custom event types as discussed in the previous point, the future geospatial analytics platform should support custom geospatial computation and custom metrics specification and execution at the server side, accompanied by convenient tools and APIs to support developers in handling the full metrics life-cycle (i.e., definition, execution, spatial analysis, interpretation of results). In designing such tools and APIs, openness of data and analytics services hereby need to be balanced with data privacy, as these may be suspect to location-based data mining attempts/attacks (e.g., see Narain et al (2017); Jia et al (2015)).…”
Section: Implication For Future Geospatial Game Analytics Platformsmentioning
confidence: 99%