Subject: Personally Identifiable Information (PII) leakage | [ INFO.INFO-MC ] Computer Science [cs]/Mobile Computing | Wi-Fi related data | Privacy | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | User survey | Static and Dynamic Analysis of Applications | Android Permissions
A short version has been accepted for publication in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC'14) Oxford, United Kingdom, July 23rd -- 25th 2014; On Android, users can choose to install an application, or not, based on the permi... View more
 Android System Permissions Categories. http://developer.android.com/guide/topics/ manifest/permission-element.html.
 Android System Permissions Groups. http://developer.android.com/reference/ android/Manifest.permission_group.html.
 Google Play unofficial API. https://github.com/egirault/googleplay-api.
 J. R. Blum, D. G. Greencorn, and J. R. Cooperstock. Smartphone sensor reliability for augmented reality applications. In Mobile and Ubiquitous Systems: Computing, Networking, and Services, pages 127-138. Springer, 2013.
 T. Book, A. Pridgen, and D. S. Wallach. Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857, 2013.
 Y.-C. Cheng, Y. Chawathe, A. LaMarca, and J. Krumm. Accuracy characterization for metropolitan-scale wi-fi localization. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys '05, pages 233-245, New York, NY, USA, 2005. ACM.
 J. Cowie and W. Lehnert. Information extraction. Communications of the ACM, 39(1):80- 91, 1996.
 M. Cunche, M.-A. Kaafar, and R. Boreli. Linking wireless devices using information contained in wi-fi probe requests. Pervasive and Mobile Computing, (0):-, 2013.
 C. Daniel and W. Glenn. Snoopy: Distributed tracking and profiling framework. In 44Con 2012, 2012.