Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Wijesekera, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13415  [pdf, other

    cs.CR cs.CY cs.HC cs.SE

    Empirical Analysis of Sri Lankan Mobile Health Ecosystem: A Precursor to an Effective Stakeholder Engagement

    Authors: Kenneth Thilakarathna, Sachintha Pitigala, Jayantha Fernando, Primal Wijesekera

    Abstract: Sri Lanka recently passed its first privacy legislation covering a wide range of sectors, including health. As a precursor for effective stakeholder engagement in the health domain to understand the most effective way to implement legislation in healthcare, we have analyzed 41 popular mobile apps and web portals. We found that 78% of the tested systems have third-party domains receiving sensitive… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2304.00944  [pdf, other

    cs.CR cs.CY

    Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)

    Authors: Nikita Samarin, Shayna Kothari, Zaina Siyed, Oscar Bjorkman, Reena Yuan, Primal Wijesekera, Noura Alomar, Jordan Fischer, Chris Hoofnagle, Serge Egelman

    Abstract: The California Consumer Privacy Act (CCPA) provides California residents with a range of enhanced privacy protections and rights. Our research investigated the extent to which Android app developers comply with the provisions of the CCPA that require them to provide consumers with accurate privacy notices and respond to "verifiable consumer requests" (VCRs) by disclosing personal information that… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Appears in Issue 3 of 23rd Privacy Enhancing Technologies Symposium (PETS 23)

  3. arXiv:2009.05966  [pdf

    cs.NI cs.SI

    COMONet: Community Mobile Network

    Authors: Primal Wijesekera, Chamath I. Keppitiyagama

    Abstract: The density of mobile phones has increased rapidly in recent years. One drawback of the current mobile telephone technology is that it forces all the calls to go through cellular base stations even if the caller and the callee are within the radio range of each other. Hybrid cellular networks and Unlicensed Mobile Access (UMA) have been proposed as solutions that enable mobile phone users to bypas… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

  4. arXiv:1910.12244  [pdf, other

    cs.CR cs.CY

    Investigating MMM Ponzi scheme on Bitcoin

    Authors: Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah

    Abstract: Cybercriminals exploit cryptocurrencies to carry out illicit activities. In this paper, we focus on Ponzi schemes that operate on Bitcoin and perform an in-depth analysis of MMM, one of the oldest and most popular Ponzi schemes. Based on 423K transactions involving 16K addresses, we show that: (1) Starting Sep 2014, the scheme goes through three phases over three years. At its peak, MMM circulated… ▽ More

    Submitted 1 December, 2019; v1 submitted 27 October, 2019; originally announced October 2019.

  5. arXiv:1703.02090  [pdf, ps, other

    cs.CR

    The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

    Authors: Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, Konstantin Beznosov

    Abstract: Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a l… ▽ More

    Submitted 6 March, 2017; originally announced March 2017.

    Comments: 17 pages, 4 figures

  6. arXiv:1504.03747  [pdf, other

    cs.CR

    Android Permissions Remystified: A Field Study on Contextual Integrity

    Authors: Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, Konstantin Beznosov

    Abstract: Due to the amount of data that smartphone applications can potentially access, platforms enforce permission systems that allow users to regulate how applications access protected resources. If users are asked to make security decisions too frequently and in benign situations, they may become habituated and approve all future requests without regard for the consequences. If they are asked to make t… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.