2014 Twelfth Annual International Conference on Privacy, Security and Trust 2014
DOI: 10.1109/pst.2014.6890922
|View full text |Cite
|
Sign up to set email alerts
|

Inferring social relationships from technology-level device connections

Abstract: Technology is present in every area of our lives and, for many, life without it has become unthinkable. As a consequence of this dependence and the extent to which technology devices (computers, tablets and smartphones) are being used for work and social activities, a clear coupling between devices and their owners can now be observed. By coupling, we specifically refer to the fact that information present on a person's device, be it user-generated or created by the native OS, can produce great insight into th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…An analysis of the scanned log data revealed several facts worthy of the attention of all who use the aforementioned devices. We present only a few of our findings here [7].…”
Section: What Does Your Tech Leak About You?mentioning
confidence: 85%
See 1 more Smart Citation
“…An analysis of the scanned log data revealed several facts worthy of the attention of all who use the aforementioned devices. We present only a few of our findings here [7].…”
Section: What Does Your Tech Leak About You?mentioning
confidence: 85%
“…The nodes are colorcoded with scanned systems labeled according to their computer type and shown in red and yellow and discovered systems presented in other colors. Graph edges represent connections between the devices (for example, a USB plugged into a system, or a system connected to a Wi-Fi access point) [7]. of them are currently available.…”
Section: What Does Your Tech Leak About You?mentioning
confidence: 99%
“…This may allow us to identify hidden friendships, where users try to cover their friendship by not creating a direct link between them. This type of analysis is valuable to the field of cybercrime investigation, particular in combination with work such as [38], [39], where we do not have enough information about the group hierarchy, however, may have access to their communication.…”
Section: Discussionmentioning
confidence: 99%
“…The first level sought to apply social network analysis (SNA) techniques to build a visual network that would better allow the identification of relationships within the site-domain listings. SNA can be described as a set of methods that allow the links between elements (e.g., people, devices, or things) to be studied [30]. We were keen on applying this technique to identify the third-party domains that were the most common across sites generally, or specifically when considering the site's locale.…”
Section: Methodsmentioning
confidence: 99%