Proceedings on Privacy Enhancing Technologies ; 2018 (4):49–50
[41] Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio
Nucci, and Dawn Song. NetworkProfiler: Towards Auto-
matic Fingerprinting of Android Apps. In Proc. of IEEE
International Conference on Computer Communications
(INFOCOM), 2013.
[42] Anupam Das, Nikita Borisov, and Matthew Caesar. Do You
Hear What I Hear?: Fingerprinting Smart Devices Through
Embedded Acoustic Components. In Proc. of the ACM
Conference on Computer and Communications Security
(CCS), 2014.
[43] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P.
Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth.
TaintDroid: An Information-Flow Tracking System for Re-
altime Privacy Monitoring on Smartphones. In Proc. of
the USENIX Symposium on Operating Systems Design and
Implementation (OSDI), 2010.
[44] Steven Englehardt. No boundaries: Exfiltration of per-
sonal data by session-replay scripts. https://freedom-to-
tinker.com/2017/11/15/no-boundaries-exfiltration-
of-personal-data-by-session-replay-scripts/, Novem-
ber 2017.
[45] Tobias Fiebig, Jan Krissler, and Ronny Hänsch. Security
Impact of High Resolution Smartphone Cameras. In Proc. of
the USENIX Workshop on Offensive Technologies (WOOT),
2014.
[46] Jessica Fridrich. Sensor Defects in Digital Image Forensic. In
Digital Image Forensics, pages 179–218. Springer, 2013.
[47] Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao
Chen. AndroidLeaks: Automatically Detecting Potential
Privacy Leaks in Android Applications on a Large Scale.
In Proc. of the International Conference on Trust and
Trustworthy Computing (TRUST), 2012.
[48] Lorenzo Gomez, Iulian Neamtiu, Tanzirul Azim, and Todd
Millstein. RERAN: Timing- and Touch-sensitive Record and
Replay for Android. In Proc. of the International Conference
on Software Engineering (ICSE), 2013.
[49] Shuai Hao, Bin Liu, Suman Nath, William G.J. Halfond, and
Ramesh Govindan. PUMA: Programmable UI-Automation
for Large-Scale Dynamic Analysis of Mobile Apps. In
Proc. of the International Conference on Mobile Systems,
Applications and Services (MobiSys), 2014.
[50] Jinseong Jeon, Kristopher K. Micinski, and Jeffrey S. Foster.
SymDroid: Symbolic Execution for Dalvik Bytecode. Tech-
nical Report CS-TR-5022, University of Maryland, College
Park, 2012.
[51] Michael Kassner. Take secret photos by exploiting Android’s
camera app. https://www.techrepublic.com/article/
take-secret-photos-by-exploiting-androids-camera-
app/, June 2014.
[52] Jinyung Kim, Yongho Yoon, Kwangkeun Yi, and Junbum
Shin. SCANDAL: Static Analyzer for Detecting Privacy
Leaks in Android Applications. In Proc. of the IEEE Mobile
Security Technologies Workshop (MoST), 2012.
[53] Tadayoshi Kohno, Andre Broido, and KC Claffy. Remote
Physical Device Fingerprinting. IEEE Transactions on
Dependable and Secure Computing, 2(2):93–108, 2005.
[54] Anh Le, Janus Varmarken, Simon Langhoff, Anastasia
Shuba, Minas Gjoka, and Athina Markopoulou. AntMoni-
tor: A System for Monitoring from Mobile Devices. In Proc.
of the ACM Workshop on Crowdsourcing and Crowdsharing
of Big (Internet) Data (C2B(1)D), 2015.
[55] Christophe Leung, Jingjing Ren, David Choffnes, and
Christo Wilson. Should You Use the App for That?: Com-
paring the Privacy Implications of App- and Web-based
Online Services. In Proc. of the Internet Measurement
Conference (IMC), 2016.
[56] Martina Lindorfer, Matthias Neugschwandtner, Lukas We-
ichselbaum, Yanick Fratantonio, Victor van der Veen, and
Christian Platzer. Andrubis - 1,000,000 Apps Later: A View
on Current Android Malware Behaviors. In Proc. of the
International Workshop on Building Analysis Datasets and
Gathering Experience Returns for Security (BADGERS),
2014.
[57] Ziang Ma, Haoyu Wang, Yao Guo, and Xiangqun Chen.
LibRadar: Fast and Accurate Detection of Third-party Li-
braries in Android Apps. In Proc. of the International
Conference on Software Engineering (ICSE), 2016.
[58] Aravind Machiry, Rohan Tahiliani, and Mayur Naik. Dyn-
odroid: An Input Generation System for Android Apps.
In Proc. of the Joint Meeting on Foundations of Software
Engineering (ESEC/FSE), 2013.
[59] Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Fed-
erico Maggi, Giovanni Vigna, and Christopher Kruegel. On
the Privacy and Security of the Ultrasound Ecosystem. In
Proc. of the Privacy Enhancing Technologies Symposium
(PETS), 2017.
[60] Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, and Ahmad
Atamli. AuDroid: Preventing Attacks on Audio Channels in
Mobile Devices. In Proc. of the Annual Computer Security
Applications Conference (ACSAC), 2015.
[61] Ashwin Rao, Arash Molavi Kakhki, Abbas Razaghpanah,
Anke Li, David Choffnes nad Arnaud Legout, Alan Mis-
love, and Phillipa Gill. Meddle: Enabling Transparency and
Control for Mobile Internet Traffic. Journal of Technology
Science (JoTS), (2015103003), October 2015.
[62] Ashwin Rao, Arash Molavi Kakhki, Abbas Razaghpanah,
Amy Tang, Shen Wang, Justine Sherry, Phillipa Gill, Arvind
Krishnamurthy, Arnaud Legout, Alan Mislove, and David
Choffnes. Using the Middle to Meddle with Mobile. Tech-
nical Report NEU-CCS-2013-12-10, Northeastern University,
2013.
[63] Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-
Rodriguez, Srikanth Sundaresan, Mark Allman, Christian
Kreibich, and Phillipa Gill. Apps, Trackers, Privacy, and
Regulators: A Global Study of the Mobile Tracking Ecosys-
tem. In Proc. of the Network and Distributed System
Security Symposium (NDSS), 2018.
[64] Jingjing Ren, Martina Lindorfer, Daniel Dubois, Ashwin
Rao, David Choffnes, and Narseo Vallina-Rodriguez. Bug
Fixes, Improvements, ... and Privacy Leaks – A Longitudinal
Study of PII Leaks Across Android App Versions. In Proc.
of the Network and Distributed System Security Symposium
(NDSS), 2018.
[65] Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud
Legout, and David Choffnes. ReCon: Revealing and Control-
ling Privacy Leaks in Mobile Network Traffic. In Proc. of the
International Conference on Mobile Systems, Applications
and Services (MobiSys), 2016.
[66] Irwin Reyes, Primal Wiesekera, Joel Reardon, Amit
Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-