The Many Kinds of Creepware Used for Interpersonal Attacks
Offered By: IEEE via YouTube
Course Description
Overview
Explore the landscape of creepware used for interpersonal attacks in this 16-minute IEEE conference talk. Delve into the research conducted on over 50 million Android devices, uncovering a wide range of malicious applications designed for stalking, harassment, impersonation, fraud, and information theft. Learn about the innovative CreepRank algorithm, which utilizes the principle of guilt by association to identify previously unknown creepware. Discover the various categories of creepware, including apps for spoofing, harassment, and control, as well as those claiming to protect victims. Gain insights into the ongoing research questions and open problems in this field, and understand how this study has already led to the removal of hundreds of apps from the Google Play Store for policy violations. Examine the broader implications of this research for mitigating technology-facilitated interpersonal attacks and improving online safety.
Syllabus
Intro
Intimate Partner Violence is Pervasive
How Does Technology Enable Intimate Partner Violence?
Discovering the mobile apps that enable abuse
Goals and Outline
Background
Datasets and Representation
CreepRank Overview
Adding FP Prevention with Prior Belief
Comparison to Random Walk with Restart
CreepRank False Positives
Spoofing Creepware
Harassment Creepware
Control Creepware
Ongoing Research Questions and Open Problems
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Health in Numbers: Quantitative Methods in Clinical & Public Health ResearchHarvard University via edX Quantitative Methods for Business
Temple University via Open Education by Blackboard Public Relations Research
National University of Singapore via Coursera Quantitative Methods
University of Amsterdam via Coursera Mobile Application Experiences Part 4: Understanding Use
Massachusetts Institute of Technology via edX