2022
DOI: 10.1145/3510579
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Privacy Vulnerabilities of Mobile Device Sensors

Abstract: The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing to almost 6.8 billion by 2022, and along with it, the amount of personal and sensitive data captured by them. This survey overviews the state of the art of what personal and sensitive user attributes can be extracted from mobile device sensors, emphasising critical aspects such as demographics, health and body features, activity and behaviour recognition, etc. In addition, we review popular metrics in the literature … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
2

Relationship

3
7

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 163 publications
0
21
0
Order By: Relevance
“…Given the variety and volume of data collected, it is essential to ensure data privacy and confidentiality. Although the topic of privacy in mobile sensing is a whole issue in itself [ 99 , 100 , 104 , 105 , 106 , 107 , 108 ], few studies have discussed approaches to minimize privacy invasion of users. Data such as audio recordings from the microphone, keyboard presses, and content of text messages are some examples of particularly sensitive data.…”
Section: Resultsmentioning
confidence: 99%
“…Given the variety and volume of data collected, it is essential to ensure data privacy and confidentiality. Although the topic of privacy in mobile sensing is a whole issue in itself [ 99 , 100 , 104 , 105 , 106 , 107 , 108 ], few studies have discussed approaches to minimize privacy invasion of users. Data such as audio recordings from the microphone, keyboard presses, and content of text messages are some examples of particularly sensitive data.…”
Section: Resultsmentioning
confidence: 99%
“…As we observed, the Autoencoder of ECGXtractor was not trained specifically for recognition tasks. Hence, the features extracted from ECG segments are generic, and we expect that they can be successfully exploited in other applications, revealing sensitive information such as age, sex, or medical pathologies [47]. The risk assessment related to this aspect and eventual countermeasures shall be further investigated.…”
Section: Discussionmentioning
confidence: 99%
“…Mobile security involves many fields. An endless stream of attacks makes researchers pay attention to the research of vulnerabilities in electronic products and smart phones ( Niu et al, 2008 ; Zhou et al, 2016 ; Hur and Shamsi, 2017 ; Delgado-Santos et al, 2021 ). In order to get the optimal solution, bionic algorithms derived from nature often provide a novel research idea ( Liu et al, 2021a ; Xu et al, 2022 ; Zhang et al, 2022 ).…”
Section: Related Workmentioning
confidence: 99%