• Corpus ID: 46564019

Privacy Challenges in Smart Devices

  title={Privacy Challenges in Smart Devices},
  author={Katarzyna Olejnik},
The number of smart devices around us continues to increase as we enter the era of ubiquitous computing. These devices typically use various sensors, store data about the user, and connect to the Internet. They are also very personal: we bring them around with us, or have them in our homes or workplaces. As a result, these devices pose novel privacy risks. The most prominent example of such a device is the smartphone. Our research goal is to identify these privacy risks and propose solutions… 

Figures from this paper



Understanding and capturing people’s privacy policies in a mobile social networking application

This article reports on the work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others, and explores technologies that empower users to more effectively and efficiently specify their privacy preferences.

Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?

A study analyzing people's privacy preferences when it comes to granting permissions to different mobile apps suggests that, while people's mobile app privacy preferences are diverse, a relatively small number of profiles can be identified that offer the promise of significantly simplifying the decisions mobile users have to make.

ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing

A novel crowdsourced recommendation engine driven by users who contribute their protection decisions, which provides app specific privacy recommendations, and shows the effectiveness of its recommendation engine with users accepting 67.1% of all recommendations provide to them, thereby helping them make informed privacy choices.

Privacy wizards for social networking sites

A template for the design of a social networking privacy wizard based on an active learning paradigm called uncertainty sampling, which is able to recommend high-accuracy privacy settings using less user input than existing policy-specification tools.

User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models

A user-controllable method based on multivariate Gaussian mixtures that is suitably modified so as to restrict the evolution of the underlying policy to favor incremental and therefore human-understandable changes as new data arrives is presented.

Empirical models of privacy in location sharing

Locaccino, a mobile location sharing system, was deployed in a four week long field study, where the behavior of study participants who shared their location with their acquaintances was examined, showing that users appear more comfortable sharing their presence at locations visited by a large and diverse set of people.

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

TaintDroid is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data and enabling realtime analysis by leveraging Android’s virtualized execution environment.

Mining Permission Request Patterns from Android and Facebook Applications

This work clusters a corpus of 188,389 Android applications and 27,029 Facebook applications to find patterns in permission requests and finds that Facebook permission requests follow a clear structure that can be fitted well with only five patterns, whereas Android applications demonstrate more complex permission requests.

AppGuard - Enforcing User Requirements on Android Apps

This work presents AppGuard, a powerful and flexible system for the enforcement of user-customizable security policies on untrusted Android applications, which offers complete mediation of security-relevant methods based on callee-site inline reference monitoring.