WifiLeaks: Underestimated Privacy Implications of the ACCESS WIFI STATE Android Permission, INRIA Research Report, vol.8539, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00994926
Smartphone Sensor Reliability for Augmented Reality Applications, Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013. ,
DOI : 10.1111/j.1467-9671.2009.01152.x
Longitudinal analysis of android ad library permissions, 2013. ,
Information extraction, Communications of the ACM, vol.39, issue.1, 1996. ,
DOI : 10.1145/234173.234209
Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, 2013. ,
DOI : 10.1016/j.pmcj.2013.04.001
URL : https://hal.archives-ouvertes.fr/hal-00816374
Snoopy: Distributed tracking and profiling framework, 2012. ,
Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12 ,
DOI : 10.1145/2335356.2335360
Can Ferris Bueller still have his day off? protecting privacy in the wireless era, USENIX HotOS workshop, 2007. ,
Place Lab: Device Positioning Using Radio Beacons in the Wild, Pervasive computing, 2005. ,
DOI : 10.1007/11428572_8
Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009. ,
DOI : 10.1145/1514274.1514293
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012. ,
DOI : 10.1145/2426656.2426685
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.2431
Identity, location, disease and more, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13 ,
DOI : 10.1145/2508859.2516661