A technique for counting natted hosts
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Proceedings of the 16th international conference on World Wide Web
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
De-anonymizing the internet using unreliable IDs
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Where's that phone?: geolocating IP addresses on 3G networks
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Googling the internet: profiling internet endpoints via the world wide web
IEEE/ACM Transactions on Networking (TON)
Profiling users in a 3g network using hourglass co-clustering
Proceedings of the sixteenth annual international conference on Mobile computing and networking
A first look at traffic on smartphones
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks
IEEE Internet Computing
Analyzing facebook privacy settings: user expectations vs. reality
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Identifying diverse usage behaviors of smartphone apps
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
For sale : your data: by : you
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
With the proliferation of online social networking (OSN) and mobile devices, preserving user privacy has become a great challenge. While prior studies have directly focused on OSN services, we call attention to the privacy leakage in mobile network data. This concern is motivated by two factors. First, the prevalence of OSN usage leaves identifiable digital footprints that can be traced back to users in the real-world. Second, the association between users and their mobile devices makes it easier to associate traffic to its owners. These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities. To demonstrate its feasibility, we develop the Tessellation methodology. By applying Tessellation on traffic from a cellular service provider (CSP), we show that up to 50% of the traffic can be attributed to the names of users. In addition to revealing the user identity, the reconstructed profile, dubbed as "mosaic," associates personal information such as political views, browsing habits, and favorite apps to the users. We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.