A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
PrivacyGuard
2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15
More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people's devices. ...
PrivacyGuard does not significantly increase the trusted computing base since PrivacyGuard runs in its entirety on the local device and traffic is not routed through a remote VPN server. ...
This work is supported by a Google Focused Research Award, the Natural Sciences and Engineering Research Council of Canada, and the Ontario Research Fund. ...
doi:10.1145/2808117.2808120
dblp:conf/ccs/SongH15
fatcat:7msqlxvdxrhhpepx7itgdsbmka
AutoPPG
2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. ...
Index Terms-Mobile applications, natural language processing, privacy policy, static code analysis. ...
ACKNOWLEDGMENT The authors thank the anonymous reviewers for their quality reviews and suggestions. ...
doi:10.1145/2808117.2808125
dblp:conf/ccs/YuZLX15
fatcat:iuxzihb6rrdude4radtetls65y
Context-Specific Access Control
2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15
We study 100 popular applications from Google Play store and find that existing applications are amenable to CSAC as most applications' use of privacy sensitive resources is limited to a small number of ...
Current mobile platforms take an all-or-nothing approach to assigning permissions to applications. ...
SPSM' 15 , 15 October 12 2015, Denver, CO, USA. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ...
doi:10.1145/2808117.2808121
dblp:conf/ccs/RahmatiM15
fatcat:n22p74b6mvdenlba7vrqb237ki
Security Metrics for the Android Ecosystem
2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15
Using a corpus of 20 400 devices we show that there is significant variability in the timely delivery of security updates across different device manufacturers and network operators. ...
We define the FUM security metric to rank the performance of device manufacturers and network operators, based on their provision of updates and exposure to critical vulnerabilities. ...
Ignoring devices classed as maybe secure, we find that on average 87.7 ± 0.0% of devices were classed as insecure and 12.3% classified as secure between July 2011 and July 2015. ...
doi:10.1145/2808117.2808118
dblp:conf/ccs/ThomasBR15
fatcat:2oddf6356jd2piwc4w52jcgz6m
Understanding the Service Life Cycle of Android Apps
2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15
A popular way in distributing malwares in the mobile world is through repackaging legitimate apps, embedding malicious code in them, and publishing them in app stores. ...
One way to detect malicious apps is to examine their service life cycle. In this paper, we examine the service life cycle of apps. We extract various features of app services. ...
SPSM'15, October 12, 2015, Denver, Colorado, USA.
Copyright 2015 ACM. ISBN 978-1-4503-3819-6/15/10 ... $15.00. ...
doi:10.1145/2808117.2808123
dblp:conf/ccs/KhanmohammadiRH15
fatcat:jucun5k4vrcfvma4n6ncco3zm4
Supporting Privacy-Conscious App Update Decisions with User Reviews
2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15
Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps. ...
Therefore, it is important to understand user behaviors around updating apps and help them to make security-conscious choices. We conducted two related studies in this area. ...
ACKNOWLEDGEMENT We would like to thank Jaeyeon Jung (Microsoft Research), Lujo Bauer (Carnegie Mellon University), and Cici Zhao (Duke University; now at Amazon.com) for their suggestions and help. ...
doi:10.1145/2808117.2808124
dblp:conf/ccs/TianLDUTC15
fatcat:nlhz7dcvv5fspldgycr6eylszq
The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method
[chapter]
2015
Network Security and Communication Engineering
No part of this publication or the information contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording ...
Although all care is taken to ensure integrity and the quality of this publication and the information herein, no responsibility is assumed by the publishers nor the author for any damage to the property ...
IEEE Transactions on Aerospace and Electronic System, 1973, 9(2): 237-252. ...
doi:10.1201/b18660-165
fatcat:jzfm3mzjp5eodi5gltayr4i544
The impact of timing on the salience of smartphone app privacy notices
[article]
2021
in Smartphones and Mobile Devices, October 2015 ...
The results suggest that even if a notice contains information users care about, it is unlikely to be recalled if only shown in the app store.Presented at 5th Annual ACM CCS Workshop on Security and Privacy ...
SPSM'15, October 12, 2015, Denver, Colorado, USA. ACM 978-1-4503-3819-6/15/10. DOI: http://dx.doi.org/10.1145/2808117.2808119.
.
Figure 1 : 1 A quiz question from employed app. ...
doi:10.1184/r1/14108927
fatcat:qwogltnz2fgm7mfdtxalhjmsyu
Establishing mandatory access control on Android OS
[article]
2016
-R., and Shastry, B. Practical and Lightweight Domain Isolation on Android. In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM 2011). ACM, 2011. ...
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module. In: Proceedings of the 5th Annual Workshop on Scalable Trusted Computing (STC 2010). ACM, 2010. ...
In the case of a one-way transaction, the sender immediately receives a dummy reply to prevent blocking (not depicted in Figure 7 .2). ...
doi:10.22028/d291-26642
fatcat:yeqularlsjbzvntfnxri4hm7q4