Filters








9 Hits in 6.1 sec

PrivacyGuard

Yihang Song, Urs Hengartner
2015 Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15  
More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people's devices.  ...  PrivacyGuard does not significantly increase the trusted computing base since PrivacyGuard runs in its entirety on the local device and traffic is not routed through a remote VPN server.  ...  This work is supported by a Google Focused Research Award, the Natural Sciences and Engineering Research Council of Canada, and the Ontario Research Fund.  ... 
doi:10.1145/2808117.2808120 dblp:conf/ccs/SongH15 fatcat:7msqlxvdxrhhpepx7itgdsbmka

AutoPPG

Le Yu, Tao Zhang, Xiapu Luo, Lei Xue
2015 Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15  
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine.  ...  Index Terms-Mobile applications, natural language processing, privacy policy, static code analysis.  ...  ACKNOWLEDGMENT The authors thank the anonymous reviewers for their quality reviews and suggestions.  ... 
doi:10.1145/2808117.2808125 dblp:conf/ccs/YuZLX15 fatcat:iuxzihb6rrdude4radtetls65y

Context-Specific Access Control

Amir Rahmati, Harsha V. Madhyastha
2015 Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15  
We study 100 popular applications from Google Play store and find that existing applications are amenable to CSAC as most applications' use of privacy sensitive resources is limited to a small number of  ...  Current mobile platforms take an all-or-nothing approach to assigning permissions to applications.  ...  SPSM' 15 , 15 October 12 2015, Denver, CO, USA. Copyright is held by the owner/author(s). Publication rights licensed to ACM.  ... 
doi:10.1145/2808117.2808121 dblp:conf/ccs/RahmatiM15 fatcat:n22p74b6mvdenlba7vrqb237ki

Security Metrics for the Android Ecosystem

Daniel R. Thomas, Alastair R. Beresford, Andrew Rice
2015 Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15  
Using a corpus of 20 400 devices we show that there is significant variability in the timely delivery of security updates across different device manufacturers and network operators.  ...  We define the FUM security metric to rank the performance of device manufacturers and network operators, based on their provision of updates and exposure to critical vulnerabilities.  ...  Ignoring devices classed as maybe secure, we find that on average 87.7 ± 0.0% of devices were classed as insecure and 12.3% classified as secure between July 2011 and July 2015.  ... 
doi:10.1145/2808117.2808118 dblp:conf/ccs/ThomasBR15 fatcat:2oddf6356jd2piwc4w52jcgz6m

Understanding the Service Life Cycle of Android Apps

Kobra Khanmohammadi, Mohammad Reza Rejali, Abdelwahab Hamou-Lhadj
2015 Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15  
A popular way in distributing malwares in the mobile world is through repackaging legitimate apps, embedding malicious code in them, and publishing them in app stores.  ...  One way to detect malicious apps is to examine their service life cycle. In this paper, we examine the service life cycle of apps. We extract various features of app services.  ...  SPSM'15, October 12, 2015, Denver, Colorado, USA. Copyright 2015 ACM. ISBN 978-1-4503-3819-6/15/10 ... $15.00.  ... 
doi:10.1145/2808117.2808123 dblp:conf/ccs/KhanmohammadiRH15 fatcat:jucun5k4vrcfvma4n6ncco3zm4

Supporting Privacy-Conscious App Update Decisions with User Reviews

Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick Tague, Lorrie Faith Cranor
2015 Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15  
Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps.  ...  Therefore, it is important to understand user behaviors around updating apps and help them to make security-conscious choices. We conducted two related studies in this area.  ...  ACKNOWLEDGEMENT We would like to thank Jaeyeon Jung (Microsoft Research), Lujo Bauer (Carnegie Mellon University), and Cici Zhao (Duke University; now at Amazon.com) for their suggestions and help.  ... 
doi:10.1145/2808117.2808124 dblp:conf/ccs/TianLDUTC15 fatcat:nlhz7dcvv5fspldgycr6eylszq

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
No part of this publication or the information contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording  ...  Although all care is taken to ensure integrity and the quality of this publication and the information herein, no responsibility is assumed by the publishers nor the author for any damage to the property  ...  IEEE Transactions on Aerospace and Electronic System, 1973, 9(2): 237-252.  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

The impact of timing on the salience of smartphone app privacy notices [article]

Rebecca Balebako, Florian Schaub, Idris Adjerid, Alessandro Acquisti, Lorrie Cranor
2021
in Smartphones and Mobile Devices, October 2015  ...  The results suggest that even if a notice contains information users care about, it is unlikely to be recalled if only shown in the app store.Presented at 5th Annual ACM CCS Workshop on Security and Privacy  ...  SPSM'15, October 12, 2015, Denver, Colorado, USA. ACM 978-1-4503-3819-6/15/10. DOI: http://dx.doi.org/10.1145/2808117.2808119. . Figure 1 : 1 A quiz question from employed app.  ... 
doi:10.1184/r1/14108927 fatcat:qwogltnz2fgm7mfdtxalhjmsyu

Establishing mandatory access control on Android OS [article]

Sven Bugiel, Universität Des Saarlandes, Universität Des Saarlandes
2016
-R., and Shastry, B. Practical and Lightweight Domain Isolation on Android. In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM 2011). ACM, 2011.  ...  Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module. In: Proceedings of the 5th Annual Workshop on Scalable Trusted Computing (STC 2010). ACM, 2010.  ...  In the case of a one-way transaction, the sender immediately receives a dummy reply to prevent blocking (not depicted in Figure 7 .2).  ... 
doi:10.22028/d291-26642 fatcat:yeqularlsjbzvntfnxri4hm7q4