When machine learning meets privacy: A survey and outlook
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
[PDF][PDF] ContexloT: Towards providing contextual integrity to appified IoT platforms.
The Internet-of-Things (IoT) has quickly evolved to a new appified era where third-party
developers can write apps for IoT platforms using programming frameworks. Like other …
developers can write apps for IoT platforms using programming frameworks. Like other …
Reliable third-party library detection in android and its security applications
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …
adding security vulnerabilities to their host apps or by misusing inherited access rights …
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …
multiple users with complex social relationships interact with a single device. Currently …
A design space for effective privacy notices
F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
Android security assessment: A review, taxonomy and research gap study
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …
specifically Android. In recent years the number of attacks has not only increased but each …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …
{SmartAuth}:{User-Centered} authorization for the internet of things
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
“Won't somebody think of the children?” examining COPPA compliance at scale
I Reyes, P Wijesekera, J Reardon… - The 18th Privacy …, 2018 - dspace.networks.imdea.org
We present a scalable dynamic analysis frame-work that allows for the automatic evaluation
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …
Discovering smart home internet of things privacy norms using contextual integrity
N Apthorpe, Y Shvartzshnaider, A Mathur… - Proceedings of the …, 2018 - dl.acm.org
The proliferation of Internet of Things (IoT) devices for consumer" smart" homes raises
concerns about user privacy. We present a survey method based on the Contextual Integrity …
concerns about user privacy. We present a survey method based on the Contextual Integrity …