Skip to main content

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8544))

Abstract

The use of tracking settings in smartphones facilitates the provision of tailored services to users by allowing service providers access to unique identifiers stored on the smartphones. In this paper, we investigate the ‘tracking off’ settings on the Blackberry 10 and Windows Phone 8 platforms. To determine if they work as claimed, we set up a test bed suitable for both operating systems to capture traffic between the smartphone and external servers. We dynamically execute a set of similar Blackberry 10 and Windows Phone 8 applications, downloaded from their respective official markets. Our results indicate that even if users turn off tracking settings in their smartphones, some applications leak unique identifiers without their knowledge.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moonsamy, V., Alazab, M., Batten, L.: Towards an understanding of the impact of advertising on data leaks. International Journal of Security and Networks 7(3), 181–193 (2012)

    Article  Google Scholar 

  2. Han, J., Owusu, E., Nguyen, L., Perrig, A., Zhang, J.: ACComplice: Location inference using accelerometers on smartphones. In: Proceedings of the 4th International Conference on Communication Systems and Networks (COMSNETS 2012), Bangalore, India, pp. 1–9 (January 2012)

    Google Scholar 

  3. Mann, C., Starostin, A.: A framework for static detection of privacy leaks in android applications. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC 2012), pp. 1457–1462 (March 2012)

    Google Scholar 

  4. Micinski, K., Phelps, P., Foster, J.S.: An Empirical Study of Location Truncation on Android. In: Proceedings of the 2013 Mobile Security Technologies Conference (MoST 2013), San Francisco, CA, pp. 1–10 (May 2013)

    Google Scholar 

  5. Shekhar, S., Dietz, M., Wallach, D.: Adsplit: Separating smartphone advertising from applications. In: Proceedings of the 20th USENIX Security Symposium (USENIX Security 2012), Bellevue, USA, pp. 1–15 (August 2012)

    Google Scholar 

  6. Zhao, Z., Osono, F.: TrustDroid: Preventing the use of Smartphones for information leaking in corporate networks through the use of static analysis taint tracking. In: Proceedings of the 7th International Conference on Malicious and Unwanted Software (MALWARE 2012), Puerto Rico, USA, pp. 135–143 (October 2012)

    Google Scholar 

  7. Moonsamy, V., Batten, L., Shore, M.: Can Smartphone Users Turn Off Tracking Service Settings? In: Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, pp. 1–9 (December 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S., Rajarajan, M. (2014). An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. In: Susilo, W., Mu, Y. (eds) Information Security and Privacy. ACISP 2014. Lecture Notes in Computer Science, vol 8544. Springer, Cham. https://doi.org/10.1007/978-3-319-08344-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08344-5_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08343-8

  • Online ISBN: 978-3-319-08344-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics