Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2646584.2646585acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Open access

Brave new world: privacy risks for mobile users

Published: 11 September 2014 Publication History
First page of PDF

References

[1]
AllJoyn: The Fast Track to the Internet of Everything. https://www.alljoyn.org/.
[2]
Apple Q/A on Location Data. http://www.apple.com/pr/library/2011/04/27Apple-Q-A-on-Location-Data.html.
[3]
Dear Fitbit Users, Kudos On the 30 Minutes of "Vigorous Sexual Activity" Last Night. http://gizmodo.com/5817784/dear-tbit-users-kudos-on-the-30-minutes-of-vigorous-sexual-activity-last-night.
[4]
Facebook Changes Privacy Settings for Millions of Users - Facial Recognition is Enabled. http://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/.
[5]
Friday. http://www.fridayed.com/.
[6]
Google Glass has a 30-Minute Battery Life While Shooting Video. http://www.digitaltrends.com/mobile/google-glass-30-minute-videobattery/.
[7]
Google Privacy Policies Get Major Revamp. http://www.huffngtonpost.com/2012/01/24/google-privacy-policies_n_1229470.html.
[8]
Haggle. http://code.google.com/p/haggle/.
[9]
Precautions to Take When Using Public WiFi Service. www.att.com/esupport/article.jsp?sid=KB112237.
[10]
Thousands of Amazon on S3 Data Stores Left Unsecured Due to Misconfiguration. http://www.engadget.com/2013/03/27/thousands-of-amazon-s3-data-stores-left-unsecured/.
[11]
US Prosecutors Want 'Kill Switch' to Stop Smartphone Theft. http://spectrum.ieee.org/tech-talk/consumer-electronics/gadgets/us-prosecutors-want-kill-switch-stop-smartphone-theft.
[12]
User Backlash Forces Facebook Privacy Tweaks, Again. http://www.fastcompany.com/1484919/user-backlash-forces-facebook-privacy-tweaks-again.
[13]
What They Know - Mobile. http://blogs.wsj.com/wtk-mobile/.
[14]
ACLU. Cell Phone Company Data Rentention Chart. http://www.aclu.org/cell-phone-location-tracking-request-response-cell-phone-company-data-retention-chart.
[15]
P. Aditya, et al. EnCore: Private, Context-based Communication for Mobile Social Apps, 2014.
[16]
ARM. ARM Security Technology. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf, 2009.
[17]
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In MOBICOM, 2008.
[18]
J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. In Advances in Cryptology - CRYPTO 2004, 2004.
[19]
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In CCS, 2011.
[20]
V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In Proceedings of the 3rd USENIX Virtual Machine Research And Technology Symposium, 2004.
[21]
J. A. Halderman, et al. Lest we Remember: Cold-boot Attacks on Encryption Keys. Communications of the ACM, 52(5):91--98, 2009.
[22]
Intel Corp. Software Guard Extension Programming Reference. http://software.intel.com/sites/default/files/329298-001.pdf, 2012.
[23]
M. Lentz, et al. SDDR: Light-Weight, Secure Mobile Encounters. In USENIX Security, 2014.

Cited By

View all
  • (2023)The iBuddy experience: A digital simulation-based approach to enhance secondary school students’ privacy awarenessEducational technology research and development10.1007/s11423-023-10309-xOnline publication date: 6-Nov-2023
  • (2020)Privacy Perception when Using Smartphone ApplicationsMobile Networks and Applications10.1007/s11036-020-01529-z25:3(1055-1061)Online publication date: 1-Jun-2020
  • (2019)Privacy perception and user behavior in the mobile ecosystemProceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good10.1145/3342428.3342690(177-182)Online publication date: 25-Sep-2019
  • Show More Cited By

Index Terms

  1. Brave new world: privacy risks for mobile users
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SPME '14: Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments
      September 2014
      48 pages
      ISBN:9781450330756
      DOI:10.1145/2646584
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 September 2014

      Check for updates

      Author Tags

      1. mobile
      2. privacy

      Qualifiers

      • Research-article

      Conference

      MobiCom'14
      Sponsor:

      Acceptance Rates

      SPME '14 Paper Acceptance Rate 7 of 12 submissions, 58%;
      Overall Acceptance Rate 7 of 12 submissions, 58%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)104
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 13 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)The iBuddy experience: A digital simulation-based approach to enhance secondary school students’ privacy awarenessEducational technology research and development10.1007/s11423-023-10309-xOnline publication date: 6-Nov-2023
      • (2020)Privacy Perception when Using Smartphone ApplicationsMobile Networks and Applications10.1007/s11036-020-01529-z25:3(1055-1061)Online publication date: 1-Jun-2020
      • (2019)Privacy perception and user behavior in the mobile ecosystemProceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good10.1145/3342428.3342690(177-182)Online publication date: 25-Sep-2019
      • (2019)Putting the privacy paradox to the testTelematics and Informatics10.1016/j.tele.2019.03.00341:C(55-69)Online publication date: 1-Aug-2019
      • (2018)FoxITProceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust10.1145/3167996.3167999(53-63)Online publication date: 5-Dec-2018
      • (2017)Selecting a cloud service provider to minimize privacy risks2017 Annual Reliability and Maintainability Symposium (RAMS)10.1109/RAM.2017.7889714(1-7)Online publication date: 23-Jan-2017
      • (2015)Efficient Privilege De-Escalation for Ad Libraries in Mobile AppsProceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2742647.2742668(89-103)Online publication date: 18-May-2015

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media