Privacy-Invasive Software

نویسنده

  • Martin Boldt
چکیده

As computers are increasingly more integrated into our daily lives we become more dependent on software. This situation is exploited by villainous actors on the Internet that distribute malicious software in search for fast financial gains at the expense of deceived computer users. As a result, computer users need more accurate and aiding mechanisms to assist them when separating legitimate software from its unwanted counterparts. However, such separations are complicated due to a grey zone of software that exists between legitimate and purely malicious software. The software in this grey zone is often vaguely labelled spyware. This work introduces both user-aiding mechanisms and an attempt to clarify the grey zone by introducing the concept of privacy-invasive software (PIS) as a category of software that ignores the users’ right to be left alone. Such software is distributed with a specific intent (often of commercial nature), which negatively affects the users to various degree. PIS is therefore classified with respect to the degree of informed consent and the amount of negative consequences for the users. To mitigate the effects from PIS, two novel mechanisms for safeguarding user consent during software installation are introduced; a collaborative software reputation system; and automated End User License Agreement (EULA) classification. In the software reputation system, users collaborate by sharing experiences of previously used software programs, allowing new users to rely on the collective experience when installing software. The EULA classification generalizes patterns from a set of both legitimate and questionable software EULAs, so that computer users can automatically classify previously unknown EULAs as belonging to legitimate software or not. Both techniques increase user awareness about software program behavior, which allow users to make more informed decisions concerning software installations, which arguably reduces the threat from PIS. We present experimental results showing a set of data mining algorithms ability to perform automated EULA classification. In addition, we also present a prototype implementation of a software reputation system, together with simulation results of the largescale use of the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing Privacy-Invasive Software Using Computer Forensic Methods

User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also prese...

متن کامل

Preventing Privacy-Invasive Software Using Collaborative Reputation Systems

Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This paper proposes the use of a specialized reputation system to gather an...

متن کامل

Privacy Invasive Software in File-Sharing Tools

Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet. Although there was no exchange of files by way of the file-sharing tools, they generated a significant amou...

متن کامل

Privacy-protection technology for video surveillance

Terrorist threats and high rates of criminal behavior in urban areas guarantee that securitywill remain a major public concern. Video surveillance is becoming ubiquitous,with systems widely deployed at strategic locations in airports, banks, public transportation, and city centers. However, their widespread use raises the specter of an invasive ‘Big Brother’ society. In addition, video surveill...

متن کامل

Privacy by Design: Does It Matter for Social Networks?

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how to prote...

متن کامل

Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing

Smartphone users visit application marketplaces (or app stores) to search and install applications. However, these app stores are not free from privacy-invasive apps, which collect personal information without sufficient disclosure or people’s consent. To nudge people away from privacy-invasive apps, we created a visual representation of the mobile app’s privacy rating. Inspired by “Framing Eff...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010