What demographic attributes do our digital footprints reveal? A systematic review

J Hinds, AN Joinson - PloS one, 2018 - journals.plos.org
To what extent does our online activity reveal who we are? Recent research has
demonstrated that the digital traces left by individuals as they browse and interact with …

Recon: Revealing and controlling pii leaks in mobile network traffic

J Ren, A Rao, M Lindorfer, A Legout… - Proceedings of the 14th …, 2016 - dl.acm.org
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …

The cracked cookie jar: HTTP cookie hijacking and the exposure of private information

S Sivakorn, I Polakis… - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The widespread demand for online privacy, also fueled by widely-publicized demonstrations
of session hijacking attacks against popular websites, has spearheaded the increasing …

The long-standing privacy debate: Mobile websites vs mobile apps

EP Papadopoulos, M Diamantaris… - Proceedings of the 26th …, 2017 - dl.acm.org
The vast majority of online services nowadays, provide both a mobile friendly website and a
mobile application to their users. Both of these choices are usually released for free, with …

Why are they collecting my data? inferring the purposes of network traffic in mobile apps

H Jin, M Liu, K Dodhia, Y Li, G Srivastava… - Proceedings of the …, 2018 - dl.acm.org
Many smartphone apps collect potentially sensitive personal data and send it to cloud
servers. However, most mobile users have a poor understanding of why their data is being …

Is the web ready for OCSP must-staple?

T Chung, J Lok, B Chandrasekaran… - Proceedings of the …, 2018 - dl.acm.org
TLS, the de facto standard protocol for securing communications over the Internet, relies on
a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the …

Spaces and traces: Implications of smart technology in public housing

S Kozubaev, F Rochaix, C DiSalvo… - Proceedings of the 2019 …, 2019 - dl.acm.org
Smart home technologies are beginning to become more widespread and common, even as
their deployment and implementation remain complex and spread across different …

Assessing discrepancies between network traffic and privacy policies of public sector web services

T Heino, R Carlsson, S Rauti, V Leppänen - Proceedings of the 17th …, 2022 - dl.acm.org
Online services are increasingly being used to complete everyday tasks, and ordinary users
with very little technical knowledge have learned to use web services and applications. At …

Tracking personal identifiers across the web

M Falahrastegar, H Haddadi, S Uhlig… - Passive and Active …, 2016 - Springer
User tracking has become de facto practice of the Web, however, our understanding of the
scale and nature of this practice remains rudimentary. In this paper, we explore the …

Should you use the app for that? comparing the privacy implications of app-and web-based online services

C Leung, J Ren, D Choffnes, C Wilson - Proceedings of the 2016 …, 2016 - dl.acm.org
Many popular, free online services provide cross-platform interfaces via Web browsers as
well as apps on iOS and Android. To monetize these services, many additionally include …