Mobile devices carry sensitive information that is routinely transmitted over the network and is often collected for analytics and targeted advertising purposes. Users are typically unaware of this data collection and have little control over their information. In this thesis, we develop systems and techniques that provide users with increased transparency and control over their mobile data. We develop AntMonitor - a user space app that can inspect and analyze all network traffic coming in and out of the device. AntMonitor outperforms prior art in terms of network throughput and CPU usage. Our tool enables real-time packet interception and analysis on the mobile device, including the following three applications. First, we build AntShield, ...
The widespread use of handheld devices (e.g., smartphones) has led to a significant evolution in the...
Mobile devices are increasingly becoming the primary device to access the Internet. De-spite this th...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
Mobile devices carry sensitive information that is routinely transmitted over the network and is oft...
Today’s mobile apps employ third-party advertising and tracking (A&T) libraries, which may pose a th...
Abstract Although advertising is a popular strategy for mobile app monetization, it i...
In this thesis, we propose AntMonitor – a complete system for passive monitoring, collection, and an...
Despite our growing reliance on mobile phones for a wide range of daily tasks, we remain largely in ...
As smartphones and mobile devices are becoming ubiquitous and mobile applications increasingly use t...
Today’s smart phones have access to personal stored data, including personally identifiable informat...
Smartphones have become very popular over the past years, thus being owned by almost every individua...
The advancements in the Internet technology and computer networks have led to an increased importanc...
© International Financial Cryptography Association 2017. Over the last decade, mobile devices and mo...
While smartphone usage become more and more pervasive, people start also asking to which extent such...
International audienceMobile traffic classification is a topic of interest for researchers focused o...
The widespread use of handheld devices (e.g., smartphones) has led to a significant evolution in the...
Mobile devices are increasingly becoming the primary device to access the Internet. De-spite this th...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...
Mobile devices carry sensitive information that is routinely transmitted over the network and is oft...
Today’s mobile apps employ third-party advertising and tracking (A&T) libraries, which may pose a th...
Abstract Although advertising is a popular strategy for mobile app monetization, it i...
In this thesis, we propose AntMonitor – a complete system for passive monitoring, collection, and an...
Despite our growing reliance on mobile phones for a wide range of daily tasks, we remain largely in ...
As smartphones and mobile devices are becoming ubiquitous and mobile applications increasingly use t...
Today’s smart phones have access to personal stored data, including personally identifiable informat...
Smartphones have become very popular over the past years, thus being owned by almost every individua...
The advancements in the Internet technology and computer networks have led to an increased importanc...
© International Financial Cryptography Association 2017. Over the last decade, mobile devices and mo...
While smartphone usage become more and more pervasive, people start also asking to which extent such...
International audienceMobile traffic classification is a topic of interest for researchers focused o...
The widespread use of handheld devices (e.g., smartphones) has led to a significant evolution in the...
Mobile devices are increasingly becoming the primary device to access the Internet. De-spite this th...
Mobile applications (apps) often transmit sensitive data through network with various intentions. So...