Privacy Leakage in Mobile Computing: Tools, Methods, and
Characteristics
Muhammad Haris, The Hong Kong University of Science and Technology
Hamed Haddadi, Queen Mary University of London and Qatar Computing
Research Institute
Pan Hui, The Hong Kong University of Science and Technology
(mhmughees, panhui)@cse.ust.hk, and hamed@eecs.qmul.ac.uk
Abstract—The number of smartphones, tablets, sensors, and
connected wearable devices are rapidly increasing. Today, in many
parts of the globe, the penetration of mobile computers has
overtaken the number of traditional personal computers. This trend
and the always-on nature of these devices have resulted in
increasing concerns over the intrusive nature of these devices and
the privacy risks that they impose on users or those associated with
them. In this paper, we survey the current state of the art on
mobile computing research, focusing on privacy risks and data
leakage effects. We then discuss a number of methods,
recommendations, and ongoing research in limiting the privacy
leakages and associated risks by mobile computing.
http://arxiv.org/pdf/1410.4978v1.pdf