A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks

K Dhondt, V Le Pochat, A Voulimeneas… - Proceedings of the …, 2022 - dl.acm.org
Fitness tracking social networks such as Strava allow users to record sports activities and
share them publicly. Sharing encourages peer interaction but also constitutes a risk …

Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?

WU Hassan, S Hussain, A Bates - 27th USENIX Security Symposium …, 2018 - usenix.org
Mobile fitness tracking apps allow users to track their workouts and share them with friends
through online social networks. Although the sharing of personal data is an inherent risk in …

Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective

U Meteriz-Yildiran, NF Yildiran, J Kim… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The extensive use of smartphones and wearable devices has facilitated many useful
applications. For example, with Global Positioning System (GPS)-equipped smart and …

Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps

J Mink, AR Yuile, U Pal, AJ Aviv, A Bates - Proceedings Of The 2022 CHI …, 2022 - dl.acm.org
Fitness tracking applications allow athletes to record and share their exercises online,
including GPS routes of their activities. However, sharing mobility data potentially raises real …

You can run, but you cannot hide: using elevation profiles to breach location privacy through trajectory prediction

Ü Meteriz, NF Yıldıran, A Mohaisen - arXiv preprint arXiv:1910.09041, 2019 - arxiv.org
The extensive use of smartphones and wearable devices has facilitated many useful
applications. For example, with Global Positioning System (GPS)-equipped smart and …

Protecting against velocity-based, proximity-based, and external event attacks in location-centric social networks

G Ghinita, ML Damiani, C Silvestri… - ACM Transactions on …, 2016 - dl.acm.org
Mobile devices with positioning capabilities allow users to participate in novel and exciting
location-based applications. For instance, users may track the whereabouts of their …

Smartwalk: Enhancing social network security via adaptive random walks

Y Liu, S Ji, P Mittal - Proceedings of the 2016 ACM SIGSAC Conference …, 2016 - dl.acm.org
Random walks form a critical foundation in many social network based security systems and
applications. Currently, the design of such social security mechanisms is limited to the …

: Toward Preserving Privacy and Functionality in Geosocial Networks

B Carbunar, M Rahman, J Ballesteros… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Profit is the main participation incentive for social network providers. Its reliance on user
profiles, built from a wealth of voluntarily revealed personal information, exposes users to a …

Is hidden safe? Location protection against machine-learning prediction attacks in social networks

X Han, L Wang, W Fan - Mis Quarterly, 2021 - papers.ssrn.com
User privacy protection is a vital issue in online social networks (OSNs). Even though users
often intentionally hide their private information in OSNs, adversaries may conduct …

iFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks

R Potharaju, B Carbunar, C Nita-Rotaru - … of the 17th ACM conference on …, 2010 - dl.acm.org
Online Social Networks (OSNs) such as Facebook have become ubiquitous in the past few
years, counting hundreds of millions of people as members. OSNs allow users to form …