Главная
Study mode:
on
1
Intro
2
Intimate Partner Violence is Pervasive
3
How Does Technology Enable Intimate Partner Violence?
4
Discovering the mobile apps that enable abuse
5
Goals and Outline
6
Background
7
Datasets and Representation
8
CreepRank Overview
9
Adding FP Prevention with Prior Belief
10
Comparison to Random Walk with Restart
11
CreepRank False Positives
12
Spoofing Creepware
13
Harassment Creepware
14
Control Creepware
15
Ongoing Research Questions and Open Problems
Description:
Explore the landscape of creepware used for interpersonal attacks in this 16-minute IEEE conference talk. Delve into the research conducted on over 50 million Android devices, uncovering a wide range of malicious applications designed for stalking, harassment, impersonation, fraud, and information theft. Learn about the innovative CreepRank algorithm, which utilizes the principle of guilt by association to identify previously unknown creepware. Discover the various categories of creepware, including apps for spoofing, harassment, and control, as well as those claiming to protect victims. Gain insights into the ongoing research questions and open problems in this field, and understand how this study has already led to the removal of hundreds of apps from the Google Play Store for policy violations. Examine the broader implications of this research for mitigating technology-facilitated interpersonal attacks and improving online safety.

The Many Kinds of Creepware Used for Interpersonal Attacks

IEEE
Add to list
0:00 / 0:00