When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.

YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes… - ndss, 2017 - cs.uwaterloo.ca
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})

W He, M Golla, R Padhi, J Ofek, M Dürmuth… - 27th USENIX Security …, 2018 - usenix.org
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …

A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

Android security assessment: A review, taxonomy and research gap study

S Garg, N Baliyan - Computers & Security, 2021 - Elsevier
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

“Won't somebody think of the children?” examining COPPA compliance at scale

I Reyes, P Wijesekera, J Reardon… - The 18th Privacy …, 2018 - dspace.networks.imdea.org
We present a scalable dynamic analysis frame-work that allows for the automatic evaluation
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …

Discovering smart home internet of things privacy norms using contextual integrity

N Apthorpe, Y Shvartzshnaider, A Mathur… - Proceedings of the …, 2018 - dl.acm.org
The proliferation of Internet of Things (IoT) devices for consumer" smart" homes raises
concerns about user privacy. We present a survey method based on the Contextual Integrity …