-
1
Addressing syntactic privacy for privacy-preserving data analysis and data release
Published 2020Subjects:Thesis -
2
Security and privacy in app ecosystems
Published 2017“…While smartphone apps have undoubtedly provided immeasurable benefit to users, they also contribute their fair share of drawbacks, such as increases in security risks and the erosion of user privacy. In this thesis, I focus on the Android smartphone operating system, and pave the way for improving the security and privacy of its app ecosystem.…”
Thesis -
3
-
4
Security and privacy in speaker recognition systems
Published 2021“…</p> <p>In this thesis we examine the security and privacy aspects of these systems, with a particular focus on remotely accessed speaker recognition. …”
Thesis -
5
Continuous touchscreen biometrics: authentication and privacy concerns
Published 2022“…In particular, we look into any threats that can affect the privacy of the user, such as tracking them and revealing their personal information based on their behaviour on smartphones.…”
Thesis -
6
Security and privacy in location-aware mobile systems
Published 2018“…While the advantages of location-aware mobile systems to improve security are undisputed, methods to ensure the reliability of location information and minimise the impact on user privacy still require further research.</p> <p>In this dissertation, we aim to extend the knowledge about security and privacy implications of location information. …”
Thesis -
7
There are many apps for that: Quantifying the availability of privacy-preserving apps
Published 2017“…When searching for these apps, users are often presented with a vast array of choices, but no distinction is made in the user interface to highlight the relative privacy risks inherent in choosing one app over an- other. …”
Conference item -
8
Security and Privacy Impacts of a Unique Personal Identifier
Published 2016“…From a technical systems perspective, we review the objectives of such schemes, along with the resulting requirements, particularly the strong need to ensure appropriate levels of privacy and security. These objectives and requirements are addressed within the context of the broad range of threats against the system. …”
Working paper -
9
Measuring operational realities of security and privacy for deployed avionics
Published 2018“…Privacy in the near-term is somewhat harder, but steps towards it in the longer term are underway.…”
Thesis -
10
Undermining privacy in the aircraft communications addressing and reporting system (ACARS)
Published 2018“…In this paper, we present an analysis of ACARS usage by privacy sensitive actors-military, government and business. …”
Conference item -
11
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
Published 2017“…But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. …”
Conference item -
12
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband
Published 2019Conference item -
13
#PrettyFlyForAWiFi: real-world detection of privacy invasion attacks by drones
Published 2021“…But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s home. …”
Journal article -
14
Economy class crypto: Exploring weak cipher usage in avionic communications via ACARS
Published 2017“…Our results show that the decrypted data leaks privacy sensitive information including existence, intent and status of aircraft owners.…”
Conference item -
15
To update or not to update: Insights From a two-year study of Android app evolution
Published 2017“…Although there are over 1,900,000 third-party Android apps in the Google Play Store, little is understood about how their security and privacy characteristics, such as dangerous permission usage and the vulnerabilities they contain, have evolved over time. …”
Conference item -
16
Fingerprinting and personal information leakage from touchscreen interactions
Published 2022“…The study aims to understand and quantify the privacy threat landscape of touch-based biometrics. …”
Conference item -
17
The real first class? Inferring confidential corporate mergers and government relations from air traffic communication
Published 2018“…This paper exploits publicly available aircraft meta data in conjunction with unfiltered air traffic communication gathered from a global collaborative sensor network to study the privacy impact of large-scale aircraft tracking on governments and public corporations. …”
Conference item -
18
Securing new space: on satellite cyber-security
Published 2021“…</p> <p>Our method is developed through in-depth analysis of the security and privacy properties of modern satellite broadband services. …”
Thesis -
19
Security in next generation air traffic communication networks
Published 2016“…</p> <p>Finally, we analyse the privacy consequences of open air traffic control protocols. …”
Thesis -
20
Biometric Identification System based on Object Interactions in Internet of Things Environments
Published 2022“…If you intend to use this dataset, please cite: @inproceedings{bisiot2022, title={Biometric Identification System based on Object Interactions in Internet of Things Environments}, author={Krawiecka, Klaudia and Birnbach, Simon and Eberz, Simon, and Martinovic, Ivan}, booktitle={2022 IEEE Security and Privacy Workshops (SPW)}, year={2022}, organization={IEEE} }…”
Dataset