skip to main content
column

Brave New World: Privacy Risks for Mobile Users

Published:13 January 2015Publication History
First page image

References

  1. AllJoyn: The Fast Track to the Internet of Everything. https://www.alljoyn.org/.Google ScholarGoogle Scholar
  2. Apple Q/A on Location Data. http://www.apple.com/pr/library/2011/04/27Apple-QA-on-Location-Data.html.Google ScholarGoogle Scholar
  3. Dear Fitbit Users, Kudos On the 30 Minutes of "Vigorous Sexual Activity" Last Night. http://gizmodo.com/5817784/dear-fitbitusers-kudos-on-the-30-minutes-of-vigoroussexual-activity-last-night.Google ScholarGoogle Scholar
  4. Facebook Changes Privacy Settings for Millions of Users - Facial Recognition is Enabled. http://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facialrecognition-enabled/.Google ScholarGoogle Scholar
  5. Friday. http://www.fridayed.com/.Google ScholarGoogle Scholar
  6. Google Glass has a 30-Minute Battery Life While Shooting Video. http://www.digitaltrends.com/mobile/googleglass-30-minute-videobattery/.Google ScholarGoogle Scholar
  7. Google Privacy Policies Get Major Revamp. http://www.huffingtonpost.com/2012/01/24/google-privacy-policies n 1229470.html.Google ScholarGoogle Scholar
  8. Haggle. http://code.google.com/p/haggle/.Google ScholarGoogle Scholar
  9. Precautions to Take When Using Public WiFi Service. www.att.com/esupport/article.jsp?sid=KB112237.Google ScholarGoogle Scholar
  10. Thousands of Amazon on S3 Data Stores Left Unsecured Due to Misconfiguration. http://www.engadget.com/2013/03/27/thousandsof-amazon-s3-data-stores-left-unsecured/.Google ScholarGoogle Scholar
  11. US Prosecutors Want 'Kill Switch' to Stop Smartphone Theft. http://spectrum.ieee.org/tech-talk/consumerelectronics/gadgets/us-prosecutors-wantkill-switch-stop-smartphone-theft.Google ScholarGoogle Scholar
  12. User Backlash Forces Facebook Privacy Tweaks, Again. http://www.fastcompany.com/1484919/user-backlash-forcesfacebook-privacy-tweaks-again.Google ScholarGoogle Scholar
  13. What They Know - Mobile. http://blogs.wsj.com/wtk-mobile/.Google ScholarGoogle Scholar
  14. ACLU. Cell Phone Company Data Rentention Chart. http://www.aclu.org/cell-phone-locationtracking-request-response-cell-phone-companydata-retention-chart.Google ScholarGoogle Scholar
  15. P. Aditya, et al. EnCore: Private, Contextbased Communication for Mobile Social Apps. In MobiSys, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ARM. ARM Security Technology. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C trustzone security whitepaper.pdf, 2009.Google ScholarGoogle Scholar
  17. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In MOBICOM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Camenisch and A. Lysyanskaya. Signature Schemes and Anonymous Credentials from Bilinear Maps. In Advances in Cryptology - CRYPTO 2004, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In Proceedings of the 3rd USENIX Virtual Machine Research And Technology Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. A. Halderman, et al. Lest we Remember: Cold-boot Attacks on Encryption Keys. Communications of the ACM, 52(5):91--98, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Intel Corp. Software Guard Extension Programming Reference. http://software.intel.com/sites/default/files/329298-001.pdf, 2012.Google ScholarGoogle Scholar
  23. M. Lentz, et al. SDDR: Light-Weight, Secure Mobile Encounters. In USENIX Security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Brave New World: Privacy Risks for Mobile Users
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGMOBILE Mobile Computing and Communications Review
      ACM SIGMOBILE Mobile Computing and Communications Review  Volume 18, Issue 3
      July 2014
      89 pages
      ISSN:1559-1662
      EISSN:1931-1222
      DOI:10.1145/2721896
      Issue’s Table of Contents

      Copyright © 2015 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 January 2015

      Check for updates

      Qualifiers

      • column

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader