2018
DOI: 10.1007/978-3-030-05345-1_19
|View full text |Cite
|
Sign up to set email alerts
|

TrCMP: An App Usage Inference Method for Mobile Service Enhancement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Various methods have been leveraged, for instance, power usage [5], system behavior [6], and network traffic [7,8]. In [5,6], the authors developed malicious Android Apps to collect system information, such as current, voltage, network state, CPU and memory usage, from a victim's device. The collected data were analyzed and machine learning techniques were used to identify the Apps on the victim's device.…”
Section: App Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation
“…Various methods have been leveraged, for instance, power usage [5], system behavior [6], and network traffic [7,8]. In [5,6], the authors developed malicious Android Apps to collect system information, such as current, voltage, network state, CPU and memory usage, from a victim's device. The collected data were analyzed and machine learning techniques were used to identify the Apps on the victim's device.…”
Section: App Fingerprintingmentioning
confidence: 99%
“…Compared with their approaches, our work does not require to maliciously deploy an additional App [5,6] or a traffic sniff device [7,8] to collect data on the victim's device. Therefore, our approach can launch the sniffing attack easily by incentivizing users to visit our website.…”
Section: App Fingerprintingmentioning
confidence: 99%