Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23287
|View full text |Cite
|
Sign up to set email alerts
|

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
47
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(47 citation statements)
references
References 0 publications
0
47
0
Order By: Relevance
“…Most of these works are orthogonal to our system as their motivation and techniques differ. Examples of such work include, but are not limited to, recommending new frameworks/privacy metrics [35], [25], [36], [37], [38], [39], [40], location obfuscation [1], [2], [3], [4], [5], location cloaking [6], generating dummy locations [7], [8], [9], [10], [11], [41], tainting sensitive data [42], [43], dynamic analysis [44], [45], static code analysis [46], [47], [48], [49], permissions analysis [50], and application retrofitting [51], [52], [53].…”
Section: Related Workmentioning
confidence: 99%
“…Most of these works are orthogonal to our system as their motivation and techniques differ. Examples of such work include, but are not limited to, recommending new frameworks/privacy metrics [35], [25], [36], [37], [38], [39], [40], location obfuscation [1], [2], [3], [4], [5], location cloaking [6], generating dummy locations [7], [8], [9], [10], [11], [41], tainting sensitive data [42], [43], dynamic analysis [44], [45], static code analysis [46], [47], [48], [49], permissions analysis [50], and application retrofitting [51], [52], [53].…”
Section: Related Workmentioning
confidence: 99%
“…AsDroid [22] leverages the inconsistency between the code and GUI to detect malicious behaviors. AAPL [28] examines inconsistent behaviors within similar functionalities of similar apps to detect privacy leaks. Our work is fundamentally different from all these efforts, as we do not focus on apps nor specific services.…”
Section: Related Workmentioning
confidence: 99%
“…AAPL is an automated system for discovering privacy leaks. This system is based on static analysis techniques, such as conditional flow identification and joint flow tracking.…”
Section: Related Workmentioning
confidence: 99%