Mobilitics: Analyzing Privacy Leaks in Smartphones

被引:0
|
作者
Achara, Jagdish Prasad [1 ]
Baudot, Franck
Castelluccia, Claude [1 ]
Delcroix, Geoffrey
Roca, Vincent [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
ERCIM NEWS | 2013年 / 93期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Who, do you think, is aware of almost everything you do? Well, it's probably right there in your pocket, if you own a smartphone and carry it with you. In order to evaluate the actual privacy risks of smartphones and to raise public awareness of these risks, the CNIL (French data protection authority) and the Inria (French public science and technology institution dedicated to computational sciences) Privatics team started working together in 2012 as part of the Mobilitics project.
引用
收藏
页码:30 / 31
页数:2
相关论文
共 50 条
  • [1] Protecting contacts against privacy leaks in smartphones
    Cha, Youngrok
    Pak, Wooguil
    PLOS ONE, 2018, 13 (07):
  • [2] My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks
    Yu, Lingjing
    Motipalli, Sri Mounica
    Lee, Dongwon
    Liu, Peng
    Xu, Heng
    Liu, Qingyun
    Tan, Jianlong
    Luo, Bo
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 93 - 104
  • [3] Analyzing Application Private Information Leaks with Privacy Petri Net
    Fan, Lejun
    Wang, Yuanzhuo
    Cheng, Xueqi
    Li, Jinming
    2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2012, : 370 - 375
  • [4] Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones
    Qi, Wen
    Xu, Yichen
    Ding, Wanfu
    Jiang, Yonghang
    Wang, Jianping
    Lu, Kejie
    2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, : 201 - 211
  • [5] Privacy Tipping Points in Smartphones Privacy Preferences
    Shih, Fuming
    Liccardi, Ilaria
    Weitzner, Daniel J.
    CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, : 807 - 816
  • [6] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [7] Privacy leaks in java classes
    Andersen, Jacob Sparre
    Ada User Journal, 2014, 35 (03): : 191 - 193
  • [8] A Bayesian Approach to Privacy Enforcement in Smartphones
    Tripp, Omer
    Rubin, Julia
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 175 - 190
  • [9] Privacy Protection for Perceptual Applications on Smartphones
    Zhao, Kao
    Zou, Deqing
    Jin, Hai
    Tian, Zhangbiaoge
    Qiang, Weizhong
    Dai, Weiqi
    2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 174 - 181
  • [10] Privacy Slider: Fine-Grain Privacy Control for Smartphones
    Bemmann, Florian
    Stoll, Helena
    Mayer, Sven
    Proceedings of the ACM on Human-Computer Interaction, 2024, 8 (MHCI)