首页 > 最新文献

Proceedings. IEEE Workshop on Mobile Computing Systems and Applications最新文献

英文 中文
EyeGuardian: a framework of eye tracking and blink detection for mobile device users EyeGuardian:一个针对移动设备用户的眼球追踪和眨眼检测框架
Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162090
Seongwon Han, Sungwon Yang, Jihyoung Kim, M. Gerla
Computer Vision Syndrome (CVS) is a common problem in the "Information Age", and it is becoming more serious as mobile devices (e.g. smartphones and tablet PCs) with small, low-resolution screens are outnumbering the home computers. The simplest way to avoid CVS is to blink frequently. However, most people do not realize that they blink less and some do not blink at all in front of the screen. In this paper, we present a mobile application that keeps track of the reader's blink rate and prods the user to blink if an exceptionally low blink rate is detected. The proposed eye detection and tracking algorithm is designed for mobile devices and can keep track of the eyes in spite of camera motion. The main idea is to predict the eye position in the camera frame using the feedback from the built-in accelerometer. The eye tracking system was built on a commercial Tablet PC. The experimental results consistently show that the scheme can withstand very aggressive mobility scenarios.
计算机视觉综合症(CVS)是“信息时代”的一个普遍问题,随着屏幕小、分辨率低的移动设备(如智能手机和平板电脑)的数量超过家用电脑,这一问题正变得越来越严重。避免CVS的最简单方法是频繁眨眼。然而,大多数人没有意识到他们在屏幕前眨眼的次数减少了,有些人根本不眨眼。在本文中,我们提出了一个移动应用程序,可以跟踪读者的眨眼率,并在检测到异常低的眨眼率时刺激用户眨眼。提出的眼球检测与跟踪算法是针对移动设备设计的,可以在相机运动的情况下对眼球进行跟踪。其主要思想是利用内置加速度计的反馈来预测眼睛在相机框架中的位置。眼动追踪系统是建立在商用平板电脑上的。实验结果一致表明,该方案可以承受非常激进的移动场景。
{"title":"EyeGuardian: a framework of eye tracking and blink detection for mobile device users","authors":"Seongwon Han, Sungwon Yang, Jihyoung Kim, M. Gerla","doi":"10.1145/2162081.2162090","DOIUrl":"https://doi.org/10.1145/2162081.2162090","url":null,"abstract":"Computer Vision Syndrome (CVS) is a common problem in the \"Information Age\", and it is becoming more serious as mobile devices (e.g. smartphones and tablet PCs) with small, low-resolution screens are outnumbering the home computers. The simplest way to avoid CVS is to blink frequently. However, most people do not realize that they blink less and some do not blink at all in front of the screen. In this paper, we present a mobile application that keeps track of the reader's blink rate and prods the user to blink if an exceptionally low blink rate is detected. The proposed eye detection and tracking algorithm is designed for mobile devices and can keep track of the eyes in spite of camera motion. The main idea is to predict the eye position in the camera frame using the feedback from the built-in accelerometer. The eye tracking system was built on a commercial Tablet PC. The experimental results consistently show that the scheme can withstand very aggressive mobility scenarios.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76774702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Can deterministic replay be an enabling tool for mobile computing? 确定性重放能成为移动计算的一种启用工具吗?
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184507
J. Flinn, Z. Morley Mao
Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We argue that there are several potential uses of replay that are especially beneficial when applied to mobile phones: dual execution on cloud or cloudlet computers to reduce latency and possibly phone energy use, operation shipping for file synchronization, and offloading of expensive security and reliability checks to remote servers. In this paper, we explore these potential uses, as well as some of the unique challenges posed by implementing replay on phones.
确定性记录和重放正迅速成为桌面和服务器计算环境中的一项重要技术。然而,这项技术在小型移动设备(如手机)上的计算适用性尚未得到探索。我们认为,当应用于移动电话时,重播有几个潜在的用途是特别有益的:在云或cloudlet计算机上进行双重执行,以减少延迟和可能的电话能源使用,文件同步的操作传输,以及将昂贵的安全性和可靠性检查卸载到远程服务器。在本文中,我们探讨了这些潜在的用途,以及在手机上实现重放所带来的一些独特挑战。
{"title":"Can deterministic replay be an enabling tool for mobile computing?","authors":"J. Flinn, Z. Morley Mao","doi":"10.1145/2184489.2184507","DOIUrl":"https://doi.org/10.1145/2184489.2184507","url":null,"abstract":"Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We argue that there are several potential uses of replay that are especially beneficial when applied to mobile phones: dual execution on cloud or cloudlet computers to reduce latency and possibly phone energy use, operation shipping for file synchronization, and offloading of expensive security and reliability checks to remote servers. In this paper, we explore these potential uses, as well as some of the unique challenges posed by implementing replay on phones.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"64 1","pages":"84-89"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88313836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes AdNext:针对城市商业综合体的基于访问模式的移动广告系统
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184492
Byoungjip Kim, J. Ha, Sang Jeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, L. Nachman, Junehwa Song
As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this paper, we present AdNext, a visit-pattern-aware mobile advertising system for urban commercial complexes. AdNext can provide highly relevant ads to users by predicting places that the users will next visit. AdNext predicts the next visit place by learning the sequential visit patterns of commercial complex users in a collective manner. As one of the key enabling techniques for AdNext, we develop a probabilistic prediction model that predicts users' next visit place from their place visit history. To automatically collect the users' place visit history by smartphones, we utilize Wi-Fi-based indoor localization. We demonstrate the feasibility of AdNext by evaluating the accuracy of the prediction model. For the evaluation, we used a dataset collected from COEX Mall, the largest commercial complex in South Korea. Also, we implemented an initial prototype of AdNext with the latest smartphones, and deployed it in COEX Mall.
随着智能手机的普及,移动广告越来越受到人们的关注,因为它不仅是未来移动商务的杀手级应用,也是新兴移动应用的重要盈利模式。在本文中,我们提出了AdNext,一个访问模式感知移动广告系统的城市商业综合体。AdNext可以通过预测用户下次访问的地点,为用户提供高度相关的广告。AdNext通过集体学习商业综合体用户的顺序访问模式,预测下一次访问地点。作为AdNext的关键实现技术之一,我们开发了一个概率预测模型,该模型可以根据用户的地点访问历史预测用户下一次访问地点。为了通过智能手机自动收集用户的地点访问历史,我们利用基于wi - fi的室内定位。我们通过评估预测模型的准确性来证明AdNext的可行性。为了进行评估,我们使用了从韩国最大的商业综合体COEX Mall收集的数据集。此外,我们在最新的智能手机上实现了AdNext的初始原型,并将其部署在COEX Mall。
{"title":"AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes","authors":"Byoungjip Kim, J. Ha, Sang Jeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, L. Nachman, Junehwa Song","doi":"10.1145/2184489.2184492","DOIUrl":"https://doi.org/10.1145/2184489.2184492","url":null,"abstract":"As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this paper, we present AdNext, a visit-pattern-aware mobile advertising system for urban commercial complexes. AdNext can provide highly relevant ads to users by predicting places that the users will next visit. AdNext predicts the next visit place by learning the sequential visit patterns of commercial complex users in a collective manner. As one of the key enabling techniques for AdNext, we develop a probabilistic prediction model that predicts users' next visit place from their place visit history. To automatically collect the users' place visit history by smartphones, we utilize Wi-Fi-based indoor localization. We demonstrate the feasibility of AdNext by evaluating the accuracy of the prediction model. For the evaluation, we used a dataset collected from COEX Mall, the largest commercial complex in South Korea. Also, we implemented an initial prototype of AdNext with the latest smartphones, and deployed it in COEX Mall.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81994050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Towards end-to-end security in branchless banking 迈向无分支银行的端到端安全
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184496
S. Panjwani
Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-layer services for securing transactions and do not implement any application-layer security. Recent results show that several of these systems are, in fact, not end-to-end secure. In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer and guarantee end-to-end security to system users. We present a threat model which captures the goals of authenticated transactions in these systems and then provide recommendations for solution design based on our model's requirements.
基于手机的无网点银行业务已成为向世界发展中地区低收入人群提供金融服务的关键机制之一。当今无分支银行系统的一个缺点是,它们在很大程度上依赖于网络层服务来保护事务,而不实现任何应用层安全性。最近的结果表明,其中一些系统实际上并不是端到端安全的。本文提出了一种基于移动端的无分支银行系统的设计方案,该方案将安全性构建到应用层,保证了系统用户端到端的安全性。我们提出了一个威胁模型,该模型捕获了这些系统中经过身份验证的事务的目标,然后根据模型的需求为解决方案设计提供建议。
{"title":"Towards end-to-end security in branchless banking","authors":"S. Panjwani","doi":"10.1145/2184489.2184496","DOIUrl":"https://doi.org/10.1145/2184489.2184496","url":null,"abstract":"Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-layer services for securing transactions and do not implement any application-layer security. Recent results show that several of these systems are, in fact, not end-to-end secure.\u0000 In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer and guarantee end-to-end security to system users. We present a threat model which captures the goals of authenticated transactions in these systems and then provide recommendations for solution design based on our model's requirements.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"64 1","pages":"28-33"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83242537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering SMSAssassin:众包驱动的基于手机的SMS垃圾邮件过滤系统
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184491
Kuldeep Yadav, P. Kumaraguru, A. Goyal, Ashish Gupta, Vinayak Naik
Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and stylistic features of the SMS to classify spam and ham. SMS spam filtering can be largely influenced by the presence of regional words, abbreviations and idioms. We have tested the feasibility of applying Bayesian learning and Support Vector Machine(SVM) based machine learning techniques which were reported to be most effective in email spam filtering on a India centric dataset. In our ongoing research, as an exploratory step, we have developed a mobile-based system SMSAssassin that can filter SMS spam messages based on bayesian learning and sender blacklisting mechanism. Since the spam SMS keywords and patterns keep on changing, SMSAssassin uses crowd sourcing to keep itself updated. Using a dataset that we are collecting from users in the real-world, we evaluated our approaches and found some interesting results.
由于发展中国家手机短信服务(SMS)的使用增加,垃圾短信激增。基于内容的机器学习方法在过滤垃圾邮件方面是有效的。研究人员利用短信的主题和风格特征来分类垃圾邮件和火腿。短信垃圾邮件过滤在很大程度上受到地区词汇、缩写和习语的影响。我们已经测试了应用贝叶斯学习和基于支持向量机(SVM)的机器学习技术的可行性,据报道,这些技术在以印度为中心的数据集上过滤电子邮件垃圾邮件是最有效的。在我们正在进行的研究中,作为一个探索性的步骤,我们开发了一个基于移动端的SMSAssassin系统,该系统可以基于贝叶斯学习和发送者黑名单机制过滤垃圾短信。由于垃圾短信的关键字和模式不断变化,SMSAssassin使用群众外包来保持自己的更新。使用我们从现实世界的用户那里收集的数据集,我们评估了我们的方法并发现了一些有趣的结果。
{"title":"SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering","authors":"Kuldeep Yadav, P. Kumaraguru, A. Goyal, Ashish Gupta, Vinayak Naik","doi":"10.1145/2184489.2184491","DOIUrl":"https://doi.org/10.1145/2184489.2184491","url":null,"abstract":"Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and stylistic features of the SMS to classify spam and ham. SMS spam filtering can be largely influenced by the presence of regional words, abbreviations and idioms. We have tested the feasibility of applying Bayesian learning and Support Vector Machine(SVM) based machine learning techniques which were reported to be most effective in email spam filtering on a India centric dataset. In our ongoing research, as an exploratory step, we have developed a mobile-based system SMSAssassin that can filter SMS spam messages based on bayesian learning and sender blacklisting mechanism. Since the spam SMS keywords and patterns keep on changing, SMSAssassin uses crowd sourcing to keep itself updated. Using a dataset that we are collecting from users in the real-world, we evaluated our approaches and found some interesting results.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"84 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86206356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Mobile token-based authentication on a budget 基于预算的移动令牌身份验证
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184494
Hristo Bojinov, D. Boneh
We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless authentication can offer a convenient and secure alternative to PIN-based unlocking.
我们提出了一种轻量级、廉价的身份验证设备,用于解锁用户的智能手机。该设备可以挂在钥匙链上,当用户想要使用智能手机时,它就会自动解锁。我们的目标是制造一款与现有智能手机兼容的设备,不需要充电或维护,并且始终可用。我们提出了两种方法:一种是基于智能手机指南针探测到的磁场,另一种是基于声波发射器产生的信号,由手机的麦克风接收。我们对这两种方法进行了试验,并报告了它们的有效性。这些设备可能会在智能手机之外找到应用,比如解锁笔记本电脑、汽车和家庭。这些设计表明,非接触式身份验证可以为基于pin码的解锁提供方便和安全的替代方案。
{"title":"Mobile token-based authentication on a budget","authors":"Hristo Bojinov, D. Boneh","doi":"10.1145/2184489.2184494","DOIUrl":"https://doi.org/10.1145/2184489.2184494","url":null,"abstract":"We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless authentication can offer a convenient and secure alternative to PIN-based unlocking.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"46 1","pages":"14-19"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85698283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
FollowMe: enhancing mobile applications with open infrastructure sensing FollowMe:通过开放基础设施感知增强移动应用
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184511
Ben Greenstein, B. Longstaff
Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting mobile applications use these sensors for richer context and better applications. We discuss the benefits of such a system and the new applications it can support. We then describe the key challenges, including establishing relationships between users and sensors that meet the privacy and security requirements of different settings (e.g., a bedroom vs. a public park) with minimal setup overhead, and improving awareness of and control over how data about a person is used by other people.
尽管上下文丰富的智能手机应用程序正以前所未有的速度被采用,但很少有人使用墙上和其他固定基础设施上的众多摄像头和麦克风产生的数据。我们提出了一个名为FollowMe的系统设计,旨在让移动应用程序使用这些传感器来实现更丰富的环境和更好的应用。我们讨论了这样一个系统的好处以及它可以支持的新应用程序。然后,我们描述了主要挑战,包括在用户和传感器之间建立关系,以满足不同设置(例如,卧室与公园)的隐私和安全要求,并以最小的设置开销,以及提高对其他人如何使用个人数据的认识和控制。
{"title":"FollowMe: enhancing mobile applications with open infrastructure sensing","authors":"Ben Greenstein, B. Longstaff","doi":"10.1145/2184489.2184511","DOIUrl":"https://doi.org/10.1145/2184489.2184511","url":null,"abstract":"Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting mobile applications use these sensors for richer context and better applications. We discuss the benefits of such a system and the new applications it can support. We then describe the key challenges, including establishing relationships between users and sensors that meet the privacy and security requirements of different settings (e.g., a bedroom vs. a public park) with minimal setup overhead, and improving awareness of and control over how data about a person is used by other people.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"104 1","pages":"105-110"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76028343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MockDroid: trading privacy for application functionality on smartphones MockDroid:用隐私换取智能手机上的应用功能
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184500
A. Beresford, A. Rice, Nicholas Skehin, R. Sohan
MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Existing applications continue to work on MockDroid, possibly with reduced functionality, since existing applications are already written to tolerate resource failure, such as network unavailability or lack of a GPS signal. We demonstrate the practicality of our approach by successfully running a random sample of twenty-three popular applications from the Android Market.
MockDroid是Android操作系统的修改版本,它允许用户“模拟”应用程序对资源的访问。该资源随后在应用程序请求访问时报告为空或不可用。这种方法允许用户在运行时撤销对特定资源的访问,鼓励用户在使用应用程序时考虑功能和个人信息泄露之间的权衡。现有的应用程序继续在MockDroid上工作,可能会减少功能,因为现有的应用程序已经被编写为可以容忍资源故障,例如网络不可用或缺乏GPS信号。我们通过成功运行Android Market中23个流行应用程序的随机样本来证明我们方法的实用性。
{"title":"MockDroid: trading privacy for application functionality on smartphones","authors":"A. Beresford, A. Rice, Nicholas Skehin, R. Sohan","doi":"10.1145/2184489.2184500","DOIUrl":"https://doi.org/10.1145/2184489.2184500","url":null,"abstract":"MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Existing applications continue to work on MockDroid, possibly with reduced functionality, since existing applications are already written to tolerate resource failure, such as network unavailability or lack of a GPS signal. We demonstrate the practicality of our approach by successfully running a random sample of twenty-three popular applications from the Android Market.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"108 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79207505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 477
Sensor tricorder: what does that sensor know about me? 传感器三录仪:这个传感器知道我什么?
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184510
Gabriel Y. Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, D. Wetherall
As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and transparency serve as our guiding principles in designing the Sensor Tricorder, a system that enables people to query third party sensors with their smartphones in order to learn about the data collection activities and privacy policies of the applications using the sensors. We leverage the increasing ubiquity of QR Codes in mobile applications and utilize them in a novel way. Our prototype system uses active QR Codes to visually communicate dynamic data such as the sensor activities and application privacy policies to smartphone users. Based on our experiences in building this prototype, we identify the key properties that sensor platforms must provide to support transparency and openness and highlight the main challenges involved in realizing these properties.
随着丰富的传感应用的普及,人们越来越发现自己的能力有限,无法确定应用程序正在收集关于他们的传感器数据以及应用程序如何使用传感器数据。开放和透明是我们设计Sensor Tricorder的指导原则,该系统使人们能够用智能手机查询第三方传感器,以了解使用传感器的应用程序的数据收集活动和隐私政策。我们利用移动应用程序中日益普及的QR码,并以一种新颖的方式利用它们。我们的原型系统使用活动QR码直观地向智能手机用户传达动态数据,如传感器活动和应用程序隐私政策。根据我们构建该原型的经验,我们确定了传感器平台必须提供的关键属性,以支持透明度和开放性,并强调了实现这些属性所涉及的主要挑战。
{"title":"Sensor tricorder: what does that sensor know about me?","authors":"Gabriel Y. Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, D. Wetherall","doi":"10.1145/2184489.2184510","DOIUrl":"https://doi.org/10.1145/2184489.2184510","url":null,"abstract":"As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and transparency serve as our guiding principles in designing the Sensor Tricorder, a system that enables people to query third party sensors with their smartphones in order to learn about the data collection activities and privacy policies of the applications using the sensors. We leverage the increasing ubiquity of QR Codes in mobile applications and utilize them in a novel way. Our prototype system uses active QR Codes to visually communicate dynamic data such as the sensor activities and application privacy policies to smartphone users. Based on our experiences in building this prototype, we identify the key properties that sensor platforms must provide to support transparency and openness and highlight the main challenges involved in realizing these properties.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"98-103"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82453118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
User controllable security and privacy for mobile mashups 移动mashup的用户可控安全性和隐私性
Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184498
Shruthi Adappa, Vikas Agarwal, Sunil Goyal, P. Kumaraguru, S. Mittal
A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of mobile mashups, they fail to address a very important issue of handling security and privacy considerations of a mobile user. In this paper, we characterize the nature of access control required for utilizing device features in a mashup setting; design a security and privacy middleware based on the well known XACML policy language; and describe how the middleware enables a user to easily control usage of device features. Implementation-wise, we realize our middleware on Android platform (but easily generalizable to other platforms), integrate it with an existing mashup framework, and demonstrate its utility through an e-commerce mobile mashup.
移动应用领域的一个新范例是“移动mashup”,即在移动浏览器上呈现的Web内容与设备上可用的数据和功能(如用户位置、日历信息和相机)相结合。尽管存在许多支持创建和执行移动mashup的框架,但它们未能解决一个非常重要的问题,即处理移动用户的安全性和隐私考虑。在本文中,我们描述了在mashup设置中利用设备特性所需的访问控制的性质;设计了基于XACML策略语言的安全和隐私中间件;并描述中间件如何使用户能够轻松地控制设备特性的使用。在实现方面,我们在Android平台上实现我们的中间件(但很容易推广到其他平台),将其与现有的mashup框架集成,并通过电子商务移动mashup演示其实用性。
{"title":"User controllable security and privacy for mobile mashups","authors":"Shruthi Adappa, Vikas Agarwal, Sunil Goyal, P. Kumaraguru, S. Mittal","doi":"10.1145/2184489.2184498","DOIUrl":"https://doi.org/10.1145/2184489.2184498","url":null,"abstract":"A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of mobile mashups, they fail to address a very important issue of handling security and privacy considerations of a mobile user. In this paper, we characterize the nature of access control required for utilizing device features in a mashup setting; design a security and privacy middleware based on the well known XACML policy language; and describe how the middleware enables a user to easily control usage of device features. Implementation-wise, we realize our middleware on Android platform (but easily generalizable to other platforms), integrate it with an existing mashup framework, and demonstrate its utility through an e-commerce mobile mashup.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"25 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80191251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1