Third party tracking in the mobile ecosystem

R Binns, U Lyngs, M Van Kleek, J Zhao… - Proceedings of the 10th …, 2018 - dl.acm.org
Third party tracking allows companies to identify users and track their behaviour across
multiple digital services. This paper presents an empirical study of the prevalence of third …

Delegate the smartphone user? Security awareness in smartphone platforms

A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …

Analysis of the communication between colluding applications on modern smartphones

C Marforio, H Ritzdorf, A Francillon… - Proceedings of the 28th …, 2012 - dl.acm.org
Modern smartphones that implement permission-based security mechanisms suffer from
attacks by colluding applications. Users are not made aware of possible implications of …

“Money makes the world go around”: Identifying Barriers to Better Privacy in Children's Apps From Developers' Perspectives

A Ekambaranathan, J Zhao, M Van Kleek - Proceedings of the 2021 CHI …, 2021 - dl.acm.org
The industry for children's apps is thriving at the cost of children's privacy: these apps
routinely disclose children's data to multiple data trackers and ad networks. As children …

The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls

ZC Schreuders, T McGill, C Payne - Computers & Security, 2013 - Elsevier
Under most widely-used security mechanisms the programs users run possess more
authority than is strictly necessary, with each process typically capable of utilising all of the …

Measuring third-party tracker power across web and mobile

R Binns, J Zhao, MV Kleek, N Shadbolt - ACM Transactions on Internet …, 2018 - dl.acm.org
Third-party networks collect vast amounts of data about users via websites and mobile
applications. Consolidations among tracker companies can significantly increase their …

A survey of security risks of mobile social media through blog mining and an extensive literature search

W He - Information Management & Computer Security, 2013 - emerald.com
Purpose As mobile malware and virus are rapidly increasing in frequency and
sophistication, mobile social media has recently become a very popular attack vector. The …

Application collusion attack on the permission-based security model and its implications for modern smartphone systems

C Marforio, A Francillon, S Capkun - 2011 - research-collection.ethz.ch
We show that the way in which permissionbased mechanisms are used on today's mobile
platforms enables attacks by colluding applications that communicate over overt and covert …

Secure software installation on smartphones

D Barrera, P Van Oorschot - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Secure Software Installation on Smartphones Page 1 Secure Software Installation on
Smartphones David Barrera, PC van Oorschot Carleton University November 3, 2010 1 …

Tracking on the Web, Mobile and the Internet of Things

R Binns - Foundations and Trends® in Web Science, 2022 - nowpublishers.com
Abstract “Tracking” is the collection of data about an individual's activity across multiple
distinct contexts and the retention, use, or sharing of data derived from that activity outside …