Search Results

You are looking at 1 - 3 of 3 items for :

  • Computer Sciences, other x
  • Databases and Data Mining x
Clear All
Open access

Yousra Javed and Mohamed Shehab

References [1] Do you need mobile antivirus software? http://www.androidauthority.com/do-you-need-mobile-antivirus-software-663034/ . [2] The eye tribe tracker. https://theeyetribe.com . [3] Facebook security issue: Facebook color scam, back again. https://developers.facebook.com/docs/facebook-login/login-flow-for-web/v2.2 . [4] The ‘most used words’ facebook quiz app accused of data stealing. http://www.forbes.com/sites/amitchowdhry/2015/11/29/the-most-used-words-facebook-quiz-app/#73c615c14bb6 . [5] Facebook login flow. http

Open access

Oleksii Starov, Phillipa Gill and Nick Nikiforakis

, Mar. 2014. Springer. [7] P. Eckersley. How Unique Is Your Browser? In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), pages 1-17, 2010. [8] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):5, 2014. [9] S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman, J. Mayer, A. Narayanan, and E. W. Felten

Open access

Yu Pu and Jens Grossklags

. McDaniel, and A. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems, 32(2):5:1-5:29, 2014. [33] A. Felt and D. Evans. Privacy protection for social networking APIs. In Proceedings of the 2008 Workshop on Web 2.0 Security and Privacy (W2SP), 2008. [34] A. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In Proceedings of the 7th Symposium On Usable Privacy and Security (SOUPS