The Many Kinds of Creepware Used for Interpersonal Attacks

  title={The Many Kinds of Creepware Used for Interpersonal Attacks},
  author={Kevin A. Roundy and Paula Barmaimon Mendelberg and Nicola Dell and D. McCoy and Daniel N. Nissani and T. Ristenpart and Acar Tamersoy},
  journal={2020 IEEE Symposium on Security and Privacy (SP)},
  • Kevin A. Roundy, Paula Barmaimon Mendelberg, +4 authors Acar Tamersoy
  • Published 2020
  • Computer Science
  • 2020 IEEE Symposium on Security and Privacy (SP)
  • Technology increasingly facilitates interpersonal attacks such as stalking, abuse, and other forms of harassment. While prior studies have examined the ecosystem of software designed for stalking, there exists an unstudied, larger landscape of apps—what we call creepware—used for interpersonal attacks. In this paper, we initiate a study of creepware using access to a dataset detailing the mobile apps installed on over 50 million Android devices. We develop a new algorithm, CreepRank, that uses… CONTINUE READING
    5 Citations
    SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
    • 1
    • PDF
    How Did That Get In My Phone? Unwanted App Distribution on Android Devices
    • Highly Influenced
    • PDF
    The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
    • 3
    • PDF
    Patriarchy and Social Media: Women Only Facebook Groups as Safe Spaces for Support Seeking in Pakistan
    • 4
    Characterizing the Evasion Attackability of Multi-label Classifiers
    • PDF


    When Governments Hack Opponents: A Look at Actors and Technology
    • 52
    • PDF
    To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
    • 30
    • PDF
    Guilt by association: large scale malware detection by mining file-relation graphs
    • 122
    • PDF
    Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
    • 46
    • PDF
    Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps
    • 13
    • PDF
    The Spyware Used in Intimate Partner Violence
    • 48
    • PDF