Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate
partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately …

" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …

Mobile Spyware Identification and Categorization: A Systematic Review

M Naser, H Albazar, H Abdel-Jaber - Informatica, 2023 - informatica.si
Smartphones have revolutionized the way we live, work, and interact with the world. They
have become indispensable companions, seamlessly integrating into our daily routines …

Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices

R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …

No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps

E Liu, S Rao, S Havron, G Ho, S Savage… - Proceedings on …, 2023 - petsymposium.org
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …

Navigating traumatic stress reactions during computer security interventions

L Ramjit, N Dolci, F Rossi, R Garcia… - 33rd USENIX Security …, 2024 - usenix.org
At-risk populations need direct support from computer security and privacy consultants, what
we refer to as a security intervention. However, at-risk populations often face security threats …

The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance

M Almansoori, M Islam, S Ghosh… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Previous research has shown that abusers in an intimate relationship can find plenty of
technical advice, tools, and how-to guides online for covertly conducting intimate partner …

" I Had Sort of a Sense that I Was Always Being Watched... Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications

K Childs, C Gibson, A Crowder, K Warren… - Proceedings of the …, 2024 - dl.acm.org
Continuous location sharing (CLS) applications are widely used for safety and social
convenience. However, these applications have privacy concerns that can be used for …

Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR

A Sabir, A Das - arXiv preprint arXiv:2403.05499, 2024 - arxiv.org
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …

[PDF][PDF] Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking

N Ceccio, N Gupta, M Almansoori, R Chatterjee - 2023 - ndss-symposium.org
Intimate partner violence (IPV) is a prevalent societal issue that affects many people
globally. Unfortunately, abusers rely on technology to spy on their partners. Prior works …