|
[1] Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. ACM Sigmod Record, 29(2):439–450, 2000. [2] Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David Wagner. An- alyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, pages 239–252. ACM, 2011. [3] Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627–638. ACM, 2011. [4] Google. Android developers. https://developer.android.com/, 2013. Ac- cessed: 2013-06-27. [5] U.S. Government. Official u.s. government information about the global posi- tioning system (gps) and related topics. http://www.gps.gov, 2013. Accessed: 2013-06-29. [6] L.J. Harte, R. Levine, and G. Livingston. GSM SuperPhones. McGraw-Hill Telecommunications. McGraw-Hill Osborne Media, 1999. ISBN 9780070381773. [7] Nathaniel Husted and Steven Myers. Mobile location tracking in metro areas: malnets and others. In Proceedings of the 17th ACM conference on Computer and communications security, pages 85–96. ACM, 2010. [8] NN Katugampala, KT Al-Naimi, S Villette, and AM Kondoz. Real time end to end secure voice communications over gsm voice channel. In 13th European signal processing conference, pages 27–31, 2005. [9] John Krumm. Inference attacks on location tracks. In Pervasive Computing, pages 127–143. Springer, 2007. [10] Reto Meier. Professional Android 4 application development. Wrox, 2012. [11] Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. Semantically rich application-centric security in android. Security and Commu- nication Networks, 5(6):658–673, 2012. [12] Oracle. The reflection api. http://docs.oracle.com/javase/tutorial/reflect/, 2013. Accessed: 2013-07-02. [13] Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. Acces- sory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012. [14] S.H. Redl, M.K. Weber, and M.W. Oliphant. An Introduction to Gsm. Mobile communications series. Artech House, Incorporated, 1995. ISBN 9780890067857. [15] PA Roberts and S Challinor. Ip address management. BT technology journal, 18(3):127–136, 2000. [16] Shobhank Sharma, Rajmohan Rajanayagam, Sagar Chinchani, Neel Sheth, and Prathyusha Vadlamudi. Multihop internet access using android. ECE-575 Introduction to Wireless Networking, 2011. [17] Xianhua Shu, Zhenjun Du, and Rong Chen. Research on mobile location ser- vice design based on android. In Wireless Communications, Networking and Mobile Computing, 2009. WiCom’09. 5th International Conference on, pages 1–4. IEEE, 2009. [18] Nirmali Sivapragasam, Ayesha Zainudeen, and Dimuthu Ratnadiwakara. Hit me with a missed call: The use of missed calls at the bottom of the pyramid. In 3rd Communication Policy Research South Conference (CPRsouth3) Beijing, China, 2008. [19] Janice Tsai, Patrick Kelley, Lorrie Cranor, and Norman Sadeh. Location- sharing technologies: Privacy risks and controls. TPRC, 2009. [20] Zhi Xu, Kun Bai, and Sencun Zhu. Taplogger: Inferring user inputs on smart- phone touchscreens using on-board motion sensors. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pages 113–124. ACM, 2012. [21] Hyeon-Ju Yoon. A study on the performance of android platform. International Journal on Computer Science and Engineering, 4(4):532–537, 2012. [22] Paul A Zandbergen. Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5–25, 2009. |