{"_id":"Qem9XKAy4NSkvJRrM","bibbaseid":"louie-informationleakageinmobilehealthsensorsandapplications","downloads":0,"creationDate":"2019-02-15T13:25:04.225Z","title":"Information Leakage in Mobile Health Sensors and Applications","author_short":["Louie, A."],"year":null,"bibtype":"techreport","biburl":null,"bibdata":{"title":"Information Leakage in Mobile Health Sensors and Applications","type":"techreport","id":"5b99cc0f-6953-3f87-8121-a77a18d449cb","created":"2018-12-17T17:33:08.810Z","file_attached":"true","profile_id":"9e0c8f3c-9cd7-3bea-bf08-594485e332bb","group_id":"c1e9e98b-e33c-3718-9343-9cc7f3e51d80","last_modified":"2019-02-24T17:29:13.292Z","read":false,"starred":false,"authored":false,"confirmed":false,"hidden":false,"citation_key":"Louie","private_publication":false,"abstract":"Mobile health sensors and applications are at risk to information leakage due to the vulnerabilities present on mobile platforms and the risks of using wireless sensors. A possible vulnerability that has not been adequately researched in this area however is data leakage related specifically to how the sensor and the mobile device are designed interact with each other. Such vulnerabilities may exist because of how the health sensors are implemented through the operating system and how hardware is used in the devices. Through an analysis of a mobile health sensor we provide an idea of the current state of mobile health sensor security.","bibtype":"techreport","author":"Louie, Anthony","bibtex":"@techreport{\n title = {Information Leakage in Mobile Health Sensors and Applications},\n type = {techreport},\n id = {5b99cc0f-6953-3f87-8121-a77a18d449cb},\n created = {2018-12-17T17:33:08.810Z},\n file_attached = {true},\n profile_id = {9e0c8f3c-9cd7-3bea-bf08-594485e332bb},\n group_id = {c1e9e98b-e33c-3718-9343-9cc7f3e51d80},\n last_modified = {2019-02-24T17:29:13.292Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {false},\n hidden = {false},\n citation_key = {Louie},\n private_publication = {false},\n abstract = {Mobile health sensors and applications are at risk to information leakage due to the vulnerabilities present on mobile platforms and the risks of using wireless sensors. A possible vulnerability that has not been adequately researched in this area however is data leakage related specifically to how the sensor and the mobile device are designed interact with each other. Such vulnerabilities may exist because of how the health sensors are implemented through the operating system and how hardware is used in the devices. Through an analysis of a mobile health sensor we provide an idea of the current state of mobile health sensor security.},\n bibtype = {techreport},\n author = {Louie, Anthony}\n}","author_short":["Louie, A."],"urls":{"Paper":"https://bibbase.org/service/mendeley/49cfa8f0-e6dc-35da-8499-7b217ce750a2/file/14bc8e74-bfe0-a6a1-72bb-ed924599a099/Information_Leakage_in_Mobile_Health_Sensors_and_Applications.pdf.pdf"},"bibbaseid":"louie-informationleakageinmobilehealthsensorsandapplications","role":"author","downloads":0},"search_terms":["information","leakage","mobile","health","sensors","applications","louie"],"keywords":[],"authorIDs":[]}