Technical Report Paper abstract bibtex
Mobile health sensors and applications are at risk to information leakage due to the vulnerabilities present on mobile platforms and the risks of using wireless sensors. A possible vulnerability that has not been adequately researched in this area however is data leakage related specifically to how the sensor and the mobile device are designed interact with each other. Such vulnerabilities may exist because of how the health sensors are implemented through the operating system and how hardware is used in the devices. Through an analysis of a mobile health sensor we provide an idea of the current state of mobile health sensor security.