2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00061
|View full text |Cite
|
Sign up to set email alerts
|

The Spyware Used in Intimate Partner Violence

Abstract: Survivors of intimate partner violence increasingly report that abusers install spyware on devices to track their location, monitor communications, and cause emotional and physical harm. To date there has been only cursory investigation into the spyware used in such intimate partner surveillance (IPS). We provide the first in-depth study of the IPS spyware ecosystem. We design, implement, and evaluate a measurement pipeline that combines web and app store crawling with machine learning to find and label apps t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
136
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 98 publications
(147 citation statements)
references
References 25 publications
4
136
1
Order By: Relevance
“…We suggest that the next steps in a multifaceted response to online GBV requires open discussion and debate as well as empirical research to better understand peoples' lived experiences of online GBV. While excellent work is emerging (see e.g., Chatterjee et al, 2018;Dragiewicz et al, 2018;Freed et al, 2017Freed et al, , 2018Lewis et al, 2017;Salter, 2017;Woodlock, 2017), more research is needed to understand the landscape of GBV and responses to it online. In particular, empirical research is needed in order to produce evidence to guide international efforts to modify and use Internet architecture to address GBV.…”
Section: Resultsmentioning
confidence: 99%
“…We suggest that the next steps in a multifaceted response to online GBV requires open discussion and debate as well as empirical research to better understand peoples' lived experiences of online GBV. While excellent work is emerging (see e.g., Chatterjee et al, 2018;Dragiewicz et al, 2018;Freed et al, 2017Freed et al, , 2018Lewis et al, 2017;Salter, 2017;Woodlock, 2017), more research is needed to understand the landscape of GBV and responses to it online. In particular, empirical research is needed in order to produce evidence to guide international efforts to modify and use Internet architecture to address GBV.…”
Section: Resultsmentioning
confidence: 99%
“…Abusers have used a variety of digital tools to spy on or exert control over their victims, most of which require minimal technical sophistication. Some abusers use off-the-shelf spyware apps, which are commonly available online and on app stores; these applications run in the background on victims' mobile phones and computers, reporting their activities back to an abuser surreptitiously [48,49].…”
Section: Intimate Partnersmentioning
confidence: 99%
“…Sometimes authentication can by bypassed altogether-for example, the abuser may be able to keep track of the victim's communications because they share a family plan for cellular service, or via browser history on a shared computer [46,54]. Child-tracking apps and employee-tracking apps are easily repurposed for surreptitiously monitoring intimate partners, and there are some indications that their developers are aware of and condone such use [48]. Social media also presents an easy route toward tracking, as many platforms offer up information like a user's location while posting or an indicator of whether the user is actively on the site.…”
Section: Intimate Partnersmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of the software coders take advantage of it and misuse their knowledge in creating malicious codes or mal-codes or malwares. Some software are designed for dual purpose (Chatterjee, 2018) in windows as well as android environment. This can be possible in the entire known operating system environment.…”
Section: Introductionmentioning
confidence: 99%