
2019 IEEE 16th International Conference on Mobile
Ad Hoc and Sensor Systems Workshops (MASSW).
Baraniuk, C. (2019). The rise of stalkerware. New Scientist,
244.
Boserup, B., McKenney, M., and Elkbuli, A. (2020).
Alarming trends in US domestic violence during the
COVID-19 pandemic. The American Journal of
Emergency Medicine, 38. https://www.ajemjournal.
com/article/S0735-6757(20)30307-7/fulltext.
Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer,
J., Freed, D., Levy, K., Dell, N., McCoy, D., and Ris-
tenpart, T. (2018). The Spyware Used in Intimate Part-
ner Violence. 2018 IEEE Symposium on Security and
Privacy (SP).
Fassl, M., Anell, S., Houy, S., Lindorfer, M., and Kromb-
holz, K. (2022). Comparing User Perceptions of Anti-
Stalkerware Apps with the Technical Reality. In Eigh-
teenth Symposium on Usable Privacy and Security
(SOUPS 2022). USENIX Association.
Gallardo, A., Kim, H., Kim, K., Leelamanthep, C., and
Li, T. (2021). POSTER: Mobile Security Strategies
and Usability Problems in IPV and Stalking Contexts.
In Proceedings of the USENIX Security Symposium.
USENIX, USENIX Association.
Gallardo, A., Kim, H., Li, T., Bauer, L., and Cranor, L.
(2022). Detecting iPhone Security Compromise in
Simulated Stalking Scenarios: Strategies and Obsta-
cles. In Eighteenth Symposium on Usable Privacy
and Security (SOUPS 2022). https://www.usenix.org/
conference/soups2022/presentation/gallardo.
Gibson, C., Frost, V., Platt, K., Garcia, W., Vargas, L., Ram-
pazzi, S., Bindschaedler, V., Traynor, P., and Butler,
K. (2022). Analyzing the Monetization Ecosystem
of Stalkerware. Proceedings on Privacy Enhancing
Technologies, 2022.
Han, Y., Roundy, K. A., and Tamersoy, A. (2021). Towards
Stalkerware Detection with Precise Warnings. Annual
Computer Security Applications Conference.
Harkin, D., Molnar, A., and Vowles, E. (2019). The com-
modification of mobile phone surveillance: An analy-
sis of the consumer spyware industry. Crime, Media,
Culture: An International Journal, 16.
Hsu, L.-C. and Henke, A. (2020). COVID-19, staying at
home, and domestic violence. Review of Economics
of the Household, 19.
Hutchinson, S., Zhou, B., and Karabiyik, U. (2019). Are
We Really Protected? an Investigation into the Play
Protect Service. 2019 IEEE International Conference
on Big Data (Big Data).
Kaspersky (2021). Digital Stalking in Relationships
What is stalkerware, and do people recognize
it? https://media.kasperskydaily.com/wp-content/
uploads/sites/86/2021/11/17164103/Kaspersky
Digital-stalking-in-relationships Report FINAL.pdf
(Visited: 2024-11-02).
Kourti, A., Stavridou, A., Panagouli, E., Psaltopoulou, T.,
Spiliopoulou, C., Tsolia, M., Sergentanis, T. N., and
Tsitsika, A. (2021). Domestic Violence During the
COVID-19 Pandemic: A Systematic Review. Trauma,
Violence, & Abuse.
Liu, E., Rao, S., Havron, S., Ho, G., Savage, S., Voelker,
G. M., and McCoy, D. (2023). No Privacy Among
Spies: Assessing the Functionality and Insecurity
of Consumer Android Spyware Apps. Proceed-
ings on Privacy Enhancing Technologies (PoPETs),
2023(1):207–224.
Mangeard, P., Tejaswi, B., Mannan, M., and Youssef, A.
(2024). WARNE: A stalkerware evidence collection
tool. Forensic Science International: Digital Investi-
gation, 48:301677.
Mangeard, P., Yu, X., Mannan, M., and Youssef, A.
(2023). No Place to Hide: Privacy Exposure in Anti-
stalkerware Apps and Support Websites. In Fritsch,
L., Hassan, I., and Paintsil, E., editors, Secure IT Sys-
tems, pages 18–36. Springer Nature Switzerland.
Mendelberg, P. and Nissani, D. (2020). Understanding
Technological Abuse: An Exploration of Creepware.
https://doi.org/10.7298/7szt-nz87.
Morgan, R., Truman, J., and Statisticians, B. (2022). Stalk-
ing Victimization, 2019. https://bjs.ojp.gov/content/
pub/pdf/sv19.pdf (Visited: 2024-11-30).
Pierazzi, F., Mezzour, G., Han, Q., Colajanni, M., and Sub-
rahmanian, V. S. (2020). A Data-driven Characteriza-
tion of Modern Android Spyware. ACM Transactions
on Management Information Systems, 11.
Qabalin, M. K., Naser, M., and Alkasassbeh, M. (2022).
Android Spyware Detection Using Machine Learning:
A Novel Dataset. Sensors, 22.
Reisinger, P. P. (2022). Through the Spying-Glass:
Data Privacy Concerns Regarding Mobile Spyware
Apps. Boston College Intellectual Property and
Technology Forum, 2022. https://lira.bc.edu/work/ns/
2a5b5a37-a3eb-4907-a980-beb4daba2ddc.
Roundy, K. A., Mendelberg, P. B., Dell, N., McCoy, D.,
Nissani, D., Ristenpart, T., and Tamersoy, A. (2020).
The Many Kinds of Creepware Used for Interpersonal
Attacks. 2020 IEEE Symposium on Security and Pri-
vacy (SP).
Shamsujjoha, M., Grundy, J., Li, L., Khalajzadeh, H., and
Lu, Q. (2021). Checking App Behavior Against App
Descriptions: What If There are No App Descrip-
tions? 2021 IEEE/ACM 29th International Confer-
ence on Program Comprehension (ICPC).
Shan, Z., Neamtiu, I., and Samuel, R. (2018). Self-hiding
behavior in Android apps. Proceedings of the 40th
International Conference on Software Engineering.
Su, Z., Cheshmehzangi, A., McDonnell, D., Chen, H.,
Ahmad, J.,
ˇ
Segalo, S., and da Veiga, C. (2022).
Technology-Based Mental Health Interventions for
Domestic Violence Victims Amid COVID-19. Inter-
national Journal of Environmental Research and Pub-
lic Health, 19.
UN Women Data Hub (2021). Measuring the shadow
pandemic: Violence against women during COVID-
19. https://data.unwomen.org/publications/vaw-rga
(Visited: 2024-10-22).
VPNRanks (2021). Cyberstalking statistics and
trends. https://www.vpnranks.com/resources/
cyberstalking-statistics/ (Visited: 2024-10-22).
Current Research, Challenges, and Future Directions in Stalkerware Detection Techniques for Mobile Ecosystems
415