The Many Kinds of Creepware Used for Interpersonal Attacks

@article{Roundy2020TheMK,
  title={The Many Kinds of Creepware Used for Interpersonal Attacks},
  author={Kevin A. Roundy and Paula Barmaimon Mendelberg and Nicola Dell and Damon McCoy and Daniel N. Nissani and T. Ristenpart and Acar Tamersoy},
  journal={2020 IEEE Symposium on Security and Privacy (SP)},
  year={2020},
  pages={626-643}
}
Technology increasingly facilitates interpersonal attacks such as stalking, abuse, and other forms of harassment. While prior studies have examined the ecosystem of software designed for stalking, there exists an unstudied, larger landscape of apps—what we call creepware—used for interpersonal attacks. In this paper, we initiate a study of creepware using access to a dataset detailing the mobile apps installed on over 50 million Android devices. We develop a new algorithm, CreepRank, that uses… Expand
6 Citations
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
  • 5
  • PDF
How Did That Get In My Phone? Unwanted App Distribution on Android Devices
  • 3
  • Highly Influenced
  • PDF
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
  • 5
  • PDF
Characterizing the Evasion Attackability of Multi-label Classifiers
  • PDF

References

SHOWING 1-10 OF 40 REFERENCES
When Governments Hack Opponents: A Look at Actors and Technology
  • 53
  • PDF
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
  • 31
  • PDF
Guilt by association: large scale malware detection by mining file-relation graphs
  • 125
  • PDF
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
  • 51
  • PDF
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps
  • 13
  • PDF
The Spyware Used in Intimate Partner Violence
  • 55
  • PDF
...
1
2
3
4
...