Skip to main content

Showing 1–3 of 3 results for author: Kleidermacher, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.22639  [pdf, ps, other

    cs.CR

    Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device Fingerprinting

    Authors: Michael A. Specter, Mihai Christodorescu, Abbie Farr, Bo Ma, Robin Lassonde, Xiaoyang Xu, Xiang Pan, Fengguo Wei, Saswat Anand, Dave Kleidermacher

    Abstract: This paper presents a large-scale analysis of fingerprinting-like behavior in the mobile application ecosystem. We take a market-based approach, focusing on third-party tracking as enabled by applications' common use of third-party SDKs. Our dataset consists of over 228,000 SDKs from popular Maven repositories, 178,000 Android applications collected from the Google Play store, and our static analy… ▽ More

    Submitted 27 June, 2025; originally announced June 2025.

    Comments: To appear in ACM CCS 2025. Extended from conference version; has added appendices more inclusive author list

  2. arXiv:2404.13220  [pdf

    cs.CR cs.LG

    Security and Privacy Product Inclusion

    Authors: Dave Kleidermacher, Emmanuel Arriaga, Eric Wang, Sebastian Porst, Roger Piqueras Jover

    Abstract: In this paper, we explore the challenges of ensuring security and privacy for users from diverse demographic backgrounds. We propose a threat modeling approach to identify potential risks and countermeasures for product inclusion in security and privacy. We discuss various factors that can affect a user's ability to achieve a high level of security and privacy, including low-income demographics, p… ▽ More

    Submitted 23 April, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

  3. arXiv:2304.02810  [pdf, other

    cs.CR

    Robust, privacy-preserving, transparent, and auditable on-device blocklisting

    Authors: Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier LlorĂ , Stephan Somogyi, David Kleidermacher

    Abstract: With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device blocklisting that allow a client to determine whether an object (e.g., URL, document, image, etc.) is harmful based on threat information possessed by a so… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.