Privacy leakage in mobile computing: Tools, methods, and characteristics

M Haris, H Haddadi, P Hui - arXiv preprint arXiv:1410.4978, 2014 - arxiv.org
The number of smartphones, tablets, sensors, and connected wearable devices are rapidly
increasing. Today, in many parts of the globe, the penetration of mobile computers has …

UI driven Android application reduction

J Huang, Y Aafer, D Perry, X Zhang… - 2017 32nd IEEE/ACM …, 2017 - ieeexplore.ieee.org
While smartphones and mobile apps have been an integral part of our life, modern mobile
apps tend to contain a lot of rarely used functionalities. For example, applications contain …

Short paper: initial recommendations for the design of privacy management tools for smartphones

A Carelli, M Sinclair, D Southee - … –INTERACT 2019: 17th IFIP TC 13 …, 2019 - Springer
The continuing rise in the popularity of smartphones has led to an accompanying rise in the
exposure of users to privacy threats as in the case of unintended leakage of personal …