Fawaz, K. and Shin, K. G. (2014). Location privacy protec-
tion for smartphone users. In Proceedings of the 2014
ACM SIGSAC Conference on Computer and Commu-
nications Security, pages 239–250. ACM.
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and
Wagner, D. (2012). Android permissions: User atten-
tion, comprehension, and behavior. In Proceedings of
the Eighth Symposium on Usable Privacy and Secu-
rity, page 3. ACM.
Fu, H., Yang, Y., Shingte, N., Lindqvist, J., and Gruteser,
M. (2014). A field study of run-time location access
disclosures on android smartphones. Proc. USEC, 14.
Gibler, C., Crussell, J., Erickson, J., and Chen, H. (2012).
Androidleaks: automatically detecting potential pri-
vacy leaks in android applications on a large scale.
In International Conference on Trust and Trustworthy
Computing, pages 291–307. Springer.
Grace, M. C., Zhou, W., Jiang, X., and Sadeghi, A.-R.
(2012). Unsafe exposure analysis of mobile in-app
advertisements. In Proceedings of the Fifth ACM Con-
ference on Security and Privacy in Wireless and Mo-
bile Networks, WISEC ’12, pages 101–112. ACM.
Guha, S., Jain, M., and Padmanabhan, V. N. (2012). Koi:
A location-privacy platform for smartphone apps. In
Proceedings of the 9th USENIX conference on Net-
worked Systems Design and Implementation, pages
14–14. USENIX Association.
Han, J., Owusu, E., Nguyen, L. T., Perrig, A., and Zhang,
J. (2012). Accomplice: Location inference using ac-
celerometers on smartphones. In 2012 Fourth Inter-
national Conference on Communication Systems and
Networks (COMSNETS 2012), pages 1–9. IEEE.
Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh,
N., and Wetherall, D. (2012). A conundrum of per-
missions: installing applications on an android smart-
phone. In Financial Cryptography and Data Security,
pages 68–79. Springer.
Kim, J., Yoon, Y., Yi, K., Shin, J., and Center, S. (2012).
Scandal: Static analyzer for detecting privacy leaks in
android applications.
Kotzanikolaou, P., Patsakis, C., Magkos, E., and Korakakis,
M. (2016). Lightweight private proximity testing for
geospatial social networks. Computer Communica-
tions, 73:263–270.
Krumm, J. and Horvitz, E. (2004). Locadio: inferring mo-
tion and location from wi-fi signal strengths. In Mo-
bile and Ubiquitous Systems: Networking and Ser-
vices, 2004. MOBIQUITOUS 2004. The First Annual
International Conference on, pages 4–13. IEEE.
Kune, D. F., Koelndorfer, J., Hopper, N., and Kim, Y. Lo-
cation leaks on the gsm air interface.
Michalevsky, Y., Schulman, A., Veerapandian, G. A.,
Boneh, D., and Nakibly, G. (2015). Powerspy: Loca-
tion tracking using mobile device power analysis. In
24th USENIX Security Symposium (USENIX Security
15), pages 785–800.
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg,
M., and Boneh, D. (2011). Location privacy via pri-
vate proximity testing. In NDSS.
Pandita, R., Xiao, X., Yang, W., Enck, W., and Xie, T.
(2013). Whyper: Towards automating risk assessment
of mobile applications. In Presented as part of the
22nd USENIX Security Symposium (USENIX Security
13), pages 527–542.
Patsakis, C., Kotzanikolaou, P., and Bouroche, M. (2015).
Private proximity testing on steroids: An ntru-based
protocol. In International Workshop on Security and
Trust Management, pages 172–184. Springer.
Polakis, I., Argyros, G., Petsios, T., Sivakorn, S., and
Keromytis, A. D. (2015). Where’s wally?: Precise
user discovery attacks in location proximity services.
In Proceedings of the 22nd ACM SIGSAC Conference
on Computer and Communications Security, pages
817–828. ACM.
Qin, G., Patsakis, C., and Bouroche, M. (2014). Playing
hide and seek with mobile dating applications. In IFIP
International Information Security Conference, pages
185–196. Springer.
Sapiezynski, P., Stopczynski, A., Gatej, R., and Lehmann,
S. (2015). Tracking human mobility using wifi sig-
nals. PloS one, 10(7):e0130824.
Shaik, A. (2016). Practical attacks against privacy and avail-
ability in 4g/lte mobile communication systems.
SnoopWall (2014). Flashlight apps threat assessment re-
port. http://www.snoopwall.com/wp-content/uploads/
2015/02/Flashlight-Spyware-Report-2014.pdf.
Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Tra-
chtenberg, A., Housley, R., and Cunningham, R. K.
(2016). Sok: Privacy on mobile devices–it’s compli-
cated. Proceedings on Privacy Enhancing Technolo-
gies, 2016(3):96–116.
Stevens, R., Gibler, C., Crussell, J., Erickson, J., and Chen,
H. (2012). Investigating user privacy in android ad
libraries. In Proceedings of the 2012 Workshop on
Mobile Security Technologies (MoST).
Theodorakopoulos, G., Shokri, R., Troncoso, C., Hubaux,
J.-P., and Le Boudec, J.-Y. (2014). Prolonging the
hide-and-seek game: Optimal trajectory privacy for
location-based services. In Proceedings of the 13th
Workshop on Privacy in the Electronic Society, pages
73–82. ACM.
Vanhoef, M., Matte, C., Cunche, M., Cardoso, L. S., and
Piessens, F. (2016). Why mac address randomization
is not enough: An analysis of wi-fi network discovery
mechanisms. In Proceedings of the 11th ACM on Asia
Conference on Computer and Communications Secu-
rity, pages 413–424. ACM.
Wernke, M., Skvortsov, P., D
¨
urr, F., and Rothermel, K.
(2014). A classification of location privacy attacks
and approaches. Personal and Ubiquitous Computing,
18(1):163–175.
Wind, D. K., Sapiezynski, P., Furman, M. A., and Lehmann,
S. (2016). Inferring stop-locations from wifi. PloS
one, 11(2):e0149105.
Zhou, Y., Zhang, X., Jiang, X., and Freeh, V. W. (2011).
Taming information-stealing smartphone applications
(on android). In International conference on Trust and
trustworthy computing, pages 93–107. Springer.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
284