What is it about?

What happend after your data is collected? Less is known to public about potential privacy risks here. This paper investigate the security of the cross-users personal data delivery and shed light on its caused insufficiently-studied but critical privacy risk. Comes after the large-scale severity assessment and the unveil of root causes of such privacy risks.

Featured Image

Why is it important?

Reveal the privacy risks happened after collection and make users & developers aware of such privacy leakage surface !

Perspectives

This is a interesting, meaningful and solid work which was commented by reviewers as : 1."An important and real problem is studied" 2."A new type of privacy leakage (likely to be common) is found" 3."Real case studies and conducted with informative lessons learned from them" 4."From a technical, methodological and evaluation perspective, the paper is very solid" I am delighted to be able to present our study and these takeaways will be achieved once you read our paper.

li shuai
Fudan University

Read the Original

This page is a summary of: Collect Responsibly But Deliver Arbitrarily?, November 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3548606.3559371.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page