ACKNOWLEDGEMENTS
This paper is part of the PATRON research project
which is commissioned by the Baden-Wrttemberg Stif-
tung gGmbH. The authors would like to thank the
BW-Stiftung for the funding of this research.
REFERENCES
Barrera, D., Kayacik, H. G., van Oorschot, P. C., and Somay-
aji, A. (2010). A Methodology for Empirical Analysis
of Permission-based Security Models and Its Appli-
cation to Android. In Proceedings of the 17
th
ACM
Conference on Computer and Communications Secu-
rity, CCS ’10, pages 73–84.
Barrera, D. and Van Oorschot, P. (2011). Secure Software In-
stallation on Smartphones. IEEE Security and Privacy,
9(3):42–48.
B
¨
ohme, R. and Grossklags, J. (2011). The Security Cost of
Cheap User Interaction. In Proceedings of the 2011
New Security Paradigms Workshop, NSPW ’11, pages
67–82.
Chan, M., Est
`
eve, D., Fourniols, J.-Y., Escriba, C., and
Campo, E. (2012). Smart Wearable Systems: Current
Status and Future Challenges. Artificial Intelligence in
Medicine, 56(3):137–156.
Davis, B. and Chen, H. (2013). RetroSkeleton: Retrofitting
Android Apps. In Proceeding of the 11
th
Annual Inter-
national Conference on Mobile Systems, Applications,
and Services, MobiSys ’13, pages 181–192.
Davis, B., Sanders, B., Khodaverdian, A., and Chen, H.
(2012). I-ARM-Droid: A Rewriting Framework for In-
App Reference Monitors for Android Applications. In
Proceedings of the 2012 IEEE Conference on Mobile
Security Technologies, MoST ’12, pages 28:1–28:9.
Enck, W., Ongtang, M., and McDaniel, P. (2009). Under-
standing Android Security. IEEE Security and Privacy,
7(1):50–57.
Felt, A. P., Egelman, S., Finifter, M., Akhawe, D., and Wag-
ner, D. (2012a). How to Ask for Permission. In Pro-
ceedings of the 7
th
USENIX Conference on Hot Topics
in Security, HotSec ’12, pages 1–6.
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and
Wagner, D. (2012b). Android Permissions: User Atten-
tion, Comprehension, and Behavior. In Proceedings of
the Eighth Symposium on Usable Privacy and Security,
SOUPS ’12, pages 3:1–3:14.
Funk, C. (2015). IoT Research - Smartbands. Technical
report, Kaspersky Lab.
Hornyack, P., Han, S., Jung, J., Schechter, S., and Wetherall,
D. (2011). These Aren’t the Droids You’re Looking for:
Retrofitting Android to Protect Data from Imperious
Applications. In Proceedings of the 18
th
ACM Con-
ference on Computer and Communications Security,
CCS ’11, pages 639–652.
Khorakhun, C. and Bhatti, S. N. (2015). mHealth through
quantified-self: A user study. In Proceedings of the
2015 17
th
International Conference on E-health Net-
working, Application & Services, HealthCom ’15, pa-
ges 329–335.
Knighten, J., McMillan, S., Chambers, T., and Payton, J.
(2015). Recognizing Social Gestures with a Wrist-
Worn SmartBand. In Proceedings of the 2015 IEEE
International Conference on Pervasive Computing and
Communication Workshops, PerCom Workshops ’15,
pages 544–549.
Lee, M., Lee, K., Shim, J., Cho, S.-j., and Choi, J. (2016).
Security Threat on Wearable Services: Empirical
Study using a Commercial Smartband. In Proceedings
of the IEEE International Conference on Consumer
Electronics-Asia, ICCE-Asia ’16, pages 1–5.
Leontiadis, I., Efstratiou, C., Picone, M., and Mascolo, C.
(2012). Don’t kill my ads!: Balancing Privacy in an Ad-
Supported Mobile Application Market. In Proceedings
of the Twelfth Workshop on Mobile Computing Systems
& Applications, HotMobile ’12, pages 2:1–2:6.
Mayfield, J. and Jagielski, K. (2015). FTC Report on Internet
of Things Urges Companies to Adopt Best Practices to
Address Consumer Privacy and Security Risks. Techni-
cal report, Federal Trade Commission.
Nauman, M., Khan, S., and Zhang, X. (2010). Apex: Exten-
ding Android Permission Model and Enforcement with
User-defined Runtime Constraints. In Proceedings of
the 5
th
ACM Symposium on Information, Computer
and Communications Security, ASIACCS ’10, pages
328–332.
Patel, M. (2015). The Security and Privacy of Wearable
Health and Fitness Devices. Technical report, IBM
SecurityIntelligence.
Pombo, N. and Garcia, N. M. (2016). ubiSleep: An Ubiqui-
tous Sensor System for Sleep Monitoring. In Procee-
dings of the 2016 IEEE 12
th
International Conference
on Wireless and Mobile Computing, Networking and
Communications, WiMob ’16, pages 1–4.
Saracino, A., Martinelli, F., Alboreto, G., and Dini, G.
(2016). Data-Sluice: Fine-grained traffic control for
Android application. In Proceedings of the 2016
IEEE Symposium on Computers and Communication,
ISCC ’16, pages 702–709.
Stach, C. (2013). How to Assure Privacy on Android Phones
and Devices? In Proceedings of the 2013 IEEE 14
th
In-
ternational Conference on Mobile Data Management,
MDM ’13, pages 350–352.
Stach, C. (2015). How to Deal with Third Party Apps in a Pri-
vacy System — The PMP Gatekeeper. In Proceedings
of the 2015 IEEE 16
th
International Conference on
Mobile Data Management, MDM ’15, pages 167–172.
Stach, C. (2016). Secure Candy Castle — A Prototype for
Privacy-Aware mHealth Apps. In Proceedings of the
2016 IEEE 17
th
International Conference on Mobile
Data Management, MDM ’16, pages 361–364.
Stach, C., D
¨
urr, F., Mindermann, K., Palanisamy, S. M., Ta-
riq, M. A., Mitschang, B., and Wagner, S. (2017a). PA-
TRON — Datenschutz in Datenstromverarbeitungssys-
temen. In Informatik 2017: Digitale Kulturen, Ta-
gungsband der 47. Jahrestagung der Gesellschaft f
¨
ur
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
22