-
Notifications
You must be signed in to change notification settings - Fork 0
/
proposal.bib
367 lines (327 loc) · 14.1 KB
/
proposal.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
@electronic{moz-privacy-icons,
key = {Mozilla Privacy Icons},
title = {Privacy Icons - {M}ozilla{W}iki},
url = {https://wiki.mozilla.org/Privacy_Icons},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronic{gplay-50-billion,
key = {Android App Downloads Reach 50B},
title = {Google: {A}ndroid app downloads have crossed 50 billion, over 1 million apps in {P}lay},
url = {http://www.theverge.com/2013/7/24/4553010/google-50-billion-android-app-downloads-1m-apps-available},
retrieved.year = 2014,
retrieved.month = jan,
retrieved.day = 9,
}
@electronic{apple-50-billion,
key = {iOS App Downloads Reach 50B},
title = {Apple's app store hits 50 billion downloads},
url = {http://gigaom.com/2013/05/15/apples-app-store-hits-50-billion-downloads/},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronic{ms-homeos,
key = {Microsoft HomeOS},
title = {homeos - {M}icrosoft {R}esearch},
url = {http://research.microsoft.com/en-us/projects/homeos/},
retrieved.year = 2015, retrieved.month = apr, retrieved.day = 17
}
@electronic{amazon-mturk,
key = {Amazon MTurk},
title = {Amazon Mechanical Turk},
url = {https://www.mturk.com/mturk/welcome},
retrieved.year = 2015, retrieved.month = apr, retrieved.day = 17
}
https://www.mturk.com/mturk/welcome
@electronic{apple-carplay,
key = {Apple CarPlay},
title = {Apple -- {C}ar{P}lay},
url = {https://www.apple.com/ios/carplay/},
retrieved.year = 2015, retrieved.month = apr, retrieved.day = 17
}
@electronic{cars-google,
key = {Android In Cars},
title = {Google's {A}ndroid {OS} is mating with cars at {CES}, promising big things for your ride},
url = {http://www.techradar.com/news/car-tech/google-s-android-os-is-mating-with-cars-at-ces-promising-big-things-for-your-ride-1212393},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronic{cars-apple,
key = {iOS In Cars},
title = {Apple redesigns {S}iri with new features in {iOS} 7, introduces {iOS} in the Car},
url = {http://9to5mac.com/2013/06/10/apple-redesigns-siri-with-new-features-in-ios-7-introduces-ios-in-the-car/},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronic{android-market-share,
key = {Android Market Share},
title = {WHO'S WINNING THE {U.S.} SMARTPHONE MARKET?},
url = {http://www.nielsen.com/us/en/newswire/2013/whos-winning-the-u-s-smartphone-market-.html},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronic{android-market-share-2013,
key = {Android Market Share 2013},
author = {Fingas, Jon},
title = {Android climbed to 79 percent of smartphone market share in 2013, but its growth has slowed},
url = {http://www.engadget.com/2014/01/29/strategy-analytics-2013-smartphone-share/},
retrieved.year = 2014, retrieved.month = mar, retrieved.day = 3
}
@electronic{eff-applaud-android,
key = {EFF - Awesome Android Privacy Tools},
title = {Awesome Privacy Tools in {A}ndroid 4.3+},
url = {https://www.eff.org/deeplinks/2013/11/awesome-privacy-features-android-43},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronic{eff-denounce-android,
key = {EFF - Awesome Removes Privacy Tools},
title = {Google Removes Vital Privacy Feature From {A}ndroid, Claiming Its Release Was Accidental},
url = {https://www.eff.org/deeplinks/2013/12/google-removes-vital-privacy-features-android-shortly-after-adding-them},
retrieved.year = 2014, retrieved.month = jan, retrieved.day = 9
}
@electronitc{septa-perm-explain,
key = {Independent SEPTA App Explains Permissions},
title = {{SEPTA I}nstant},
url = {https://play.google.com/store/apps/details?id=com.staticfish.septainstant&hl=en},
retrieved.year = 2015, retrieved.month = apr,
}
@inproceedings{mockDroid-HOTMOBILE11,
author = {Beresford, Alastair R. and Rice, Andrew and Skehin, Nicholas and Sohan, Ripduman},
title = {Mock{D}roid: Trading Privacy for Application Functionality on Smartphones},
booktitle = {Mobile Computing Systems and Applications},
year = {2011},
location = {Phoenix, Arizona},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{mturk-data-quality-PPS11,
author = {Buhrmester, Michael and Kwang, Tracy and Gosling, Samuel D.},
title = {Amazon's {M}echanical {T}urk: A New Source of Inexpensive, Yet High-Quality, Data?},
volume = {6},
number = {1},
year = {2011},
journal = {Perspectives on Psychological Science}
}
@inproceedings{comDroid-MOBISYS11,
author = {Chin, Erika and Felt, Adrienne Porter and Greenwood, Kate and Wagner, David},
title = {Analyzing Inter-application Communication in {A}ndroid},
booktitle = {Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services},
series = {MobiSys '11},
year = {2011},
location = {Bethesda, Maryland, USA},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{smartphone-user-conf-SOUPS12,
author = {Chin, Erika and Felt, Adrienne Porter and Sekar, Vyas and Wagner, David},
title = {Measuring User Confidence in Smartphone Security and Privacy},
booktitle = {Proceedings of the Eighth Symposium on Usable Privacy and Security},
series = {SOUPS '12},
year = {2012},
location = {Washington, D.C.},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{cohen-kappa-EPM60,
author = {Cohen, J.},
title = {A Coefficient of Agreement for Nominal Scales},
journal = {Educational and Psychological Measurement},
volume = 20,
year = 1960
}
@inproceedings{phisher-wanings-SIGCHI08,
author={Egelman, Serge and Cranor, Lorrie Faith and Hong, Jason},
title={You've been warned: an empirical study of the effectiveness of {W}eb browser phishing warnings},
booktitle={SIGCHI Conference on Human Factors in Computing Systems},
year={2008},
organization={ACM}
}
@inproceedings{taintDroid-OSDI10,
author = {Enck, William and Gilbert, Peter and Chun, Byung-Gon and Cox, Landon P. and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol N.},
title = {Taint{D}roid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones},
booktitle = {Operating Systems Design and Implementation},
year = {2010},
location = {Vancouver, BC, Canada},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
}
@inproceedings{perms-demystified-CCS11,
author = {Felt, Adrienne Porter and Chin, Erika and Hanna, Steve and Song, Dawn and Wagner, David},
title = {Android Permissions Demystified},
booktitle = {Proceedings of the 18th ACM Conference on Computer and Communications Security},
series = {CCS '11},
year = {2011},
location = {Chicago, Illinois, USA},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{99-problems-SPSM12,
author = {Felt, Adrienne Porter and Egelman, Serge and Wagner, David},
title = {I'Ve Got 99 Problems, but Vibration Ain'T One: A Survey of Smartphone Users' Concerns},
booktitle = {Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices},
series = {SPSM '12},
year = {2012},
location = {Raleigh, North Carolina, USA},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{effectivness-perms-USENIX11,
author={Felt, Adrienne Porter and Greenwood, Kate and Wagner, David},
title={The effectiveness of application permissions},
booktitle={Proceedings of the 2nd USENIX conference on Web application development},
year={2011},
organization={USENIX Association}
}
@inproceedings{android-attention-SOUPS12,
author = {Felt, Adrienne Porter and Ha, Elizabeth and Egelman, Serge and Haney, Ariel and Chin, Erika and Wagner, David},
title = {Android Permissions: User Attention, Comprehension, and Behavior},
booktitle = {Proceedings of the Eighth Symposium on Usable Privacy and Security},
series = {SOUPS '12},
year = {2012},
location = {Washington, D.C.},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{dr-android-hide-SPSM12,
author = {Jeon, Jinseong and Micinski, Kristopher K. and Vaughan, Jeffrey A. and Fogel, Ari and Reddy, Nikhilesh and Foster, Jeffrey S. and Millstein, Todd},
title = {Dr. {A}ndroid and {M}r. Hide: Fine-grained Permissions in {A}ndroid Applications},
booktitle = {Security and Privacy in Smartphones and Mobile Devices},
year = {2012},
location = {Raleigh, North Carolina, USA},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{nutrition-labels-SOUPS09,
author = {Kelley, Patrick Gage and Bresee, Joanna and Cranor, Lorrie Faith and Reeder, Robert W.},
title = {A ``Nutrition Label'' for Privacy},
booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security},
series = {SOUPS '09},
year = {2009},
location = {Mountain View, California},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{permission-tracking-UBICOMM12,
title={Permission Tracking in {A}ndroid},
author={Kern, Michael and Sametinger, Johannes},
booktitle={Mobile Ubiquitous Computing, Systems, Services and Technologies},
year={2012}
}
@inproceedings{expect-purpose-UbiComp12,
author = {Lin, Jialiu and Amini, Shahriyar and Hong, Jason I. and Sadeh, Norman and Lindqvist, Janne and Zhang, Joy},
title = {Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy Through Crowdsourcing},
booktitle = {Ubiquitous Computing},
year = {2012},
location = {Pittsburgh, Pennsylvania},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{reseach-mturk-BRM12,
author={Mason, Winter and Suri, Siddharth},
year={2012},
journal={Behavior Research Methods},
volume={44},
title={Conducting behavioral research on {A}mazon's {M}echanical {T}urk},
publisher={Springer-Verlag},
}
@inproceedings{apex-ASIACCS10,
author = {Nauman, Mohammad and Khan, Sohail and Zhang, Xinwen},
title = {Apex: Extending {A}ndroid Permission Model and Enforcement with User-defined Runtime Constraints},
booktitle = {Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security},
series = {ASIACCS '10},
year = {2010},
location = {Beijing, China},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{whyper-SEC13,
author = {Pandita, Rahul and Xiao, Xusheng and Yang, Wei and Enck, William and Xie, Tao},
title = {{WHYPER}: Towards Automating Risk Assessment of Mobile Applications},
booktitle = {22Nd USENIX Conference on Security},
series = {SEC'13},
year = {2013},
location = {Washington, D.C.},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
}
@inproceedings{addroid-ASIACCS12,
author = {Pearce, Paul and Felt, Adrienne Porter and Nunez, Gabriel and Wagner, David},
title = {Ad{D}roid: Privilege Separation for Applications and Advertisers in {A}ndroid},
booktitle = {Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security},
series = {ASIACCS '12},
year = {2012},
location = {Seoul, Korea},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{cog-walkthrough-IJMMS92,
author = {Peter G. Polson and Clayton Lewis and John Rieman and Cathleen Wharton},
title = {Cognitive walkthroughs: a method for theory-based evaluation of user interfaces},
journal = {International Journal of Man-Machine Studies},
volume = {36},
number = {5},
year = {1992},
}
@inproceedings{usable-sec-analysis-ONWARD13,
author = {Quay-de la Vallee, Hannah and Walsh, James M. and Zimrin, William and Fisler, Kathi and Krishnamurthi, Shriram},
title = {Usable Security As a Static-analysis Problem: Modeling and Reasoning About User Permissions in Social-sharing Systems},
booktitle = {Proceedings of the 2013 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming \& Software},
series = {Onward! '13},
year = {2013},
location = {Indianapolis, Indiana, USA},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{privacy-purchasing-effect-INFORMS11,
author = {Tsai, Janice Y. and Egelman, Serge and Cranor, Lorrie and Acquisti, Alessandro},
title = {The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study},
journal = {Information Systems Research},
volume = {22},
number = {2},
year = {2011},
URL = {http://pubsonline.informs.org/doi/abs/10.1287/isre.1090.0260},
}
@article{iterative-design-med-JAMIA03,
author = {Wachter, S Blake and Agutter, Jim and Syroid, Noah and Drews, Frank and Weinger, Matthew B and Westenskow, Dwayne},
title = {The Employment of an Iterative Design Process to Develop a Pulmonary Graphical Display},
volume = {10},
number = {4},
year = {2003},
URL = {http://jamia.bmj.com/content/10/4/363.abstract},
journal = {Journal of the American Medical Informatics Association}
}
@incollection{droidrisk-2013,
author={Wang, Yang and Zheng, Jun and Sun, Chen and Mukkamala, Srinivas},
title={Quantitative Security Risk Assessment of {A}ndroid Permissions and Applications},
year={2013},
booktitle={Data and Applications Security and Privacy XXVII},
volume={7964},
series={Lecture Notes in Computer Science},
editor={Wang, Lingyu and Shafiq, Basit},
publisher={Springer Berlin Heidelberg},
}
@inproceedings{droidganger-SPSM12,
author={Yang, Liu and Boushehrinejadmoradi, Nader and Roy, Pallab and Ganapathy, Vinod and Iftode, Liviu},
title={Enhancing users' comprehension of {A}ndroid permissions},
booktitle = {Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices},
series={SPSM'12},
year={2012},
location={Raleigh, North Carolina, USA},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{android-repackaged-CODASPY12,
author = {Zhou, Wu and Zhou, Yajin and Jiang, Xuxian and Ning, Peng},
title = {Detecting Repackaged Smartphone Applications in Third-party {A}ndroid Marketplaces},
booktitle = {Proceedings of the Second ACM Conference on Data and Application Security and Privacy},
series = {CODASPY '12},
year = {2012},
location = {San Antonio, Texas, USA},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {privacy and security, repackaging, smartphones},
}
@inproceedings{TISSA-Trust11,
author = {Zhou, Yajin and Zhang, Xinwen and Jiang, Xuxian and Freeh, Vincent W.},
title = {Taming Information-stealing Smartphone Applications (on {A}ndroid)},
booktitle = {Trust and Trustworthy Computing},
year = {2011},
location = {Pittsburgh, PA},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
}