Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. Yeke, D., Ibrahim, M., Tuncay, G. S., Farrukh, H., Imran, A., Bianchi, A., & Celik, Z. B. In IEEE Symposium on Security and Privacy (IEEE S&P), pages 1-18, 2024.
Paper bibtex 8 downloads @InProceedings{Berkay2024WearOSOakland,
title={{Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables}},
author = {Doguhan Yeke and Muhammad Ibrahim and Guliz Seray Tuncay and Habiba Farrukh and Abdullah Imran and Antonio Bianchi and Z. Berkay Celik},
booktitle={IEEE Symposium on Security and Privacy (IEEE S\&P)},
year={2024},
pages = {1-18},
url = {https://beerkay.github.io/papers/Berkay2024WearOSOakland.pdf}
}
Downloads: 8
{"_id":"Z6i7vuzk2maDT7nKq","bibbaseid":"yeke-ibrahim-tuncay-farrukh-imran-bianchi-celik-wearsmydataunderstandingthecrossdeviceruntimepermissionmodelinwearables-2024","author_short":["Yeke, D.","Ibrahim, M.","Tuncay, G. S.","Farrukh, H.","Imran, A.","Bianchi, A.","Celik, Z. B."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables","author":[{"firstnames":["Doguhan"],"propositions":[],"lastnames":["Yeke"],"suffixes":[]},{"firstnames":["Muhammad"],"propositions":[],"lastnames":["Ibrahim"],"suffixes":[]},{"firstnames":["Guliz","Seray"],"propositions":[],"lastnames":["Tuncay"],"suffixes":[]},{"firstnames":["Habiba"],"propositions":[],"lastnames":["Farrukh"],"suffixes":[]},{"firstnames":["Abdullah"],"propositions":[],"lastnames":["Imran"],"suffixes":[]},{"firstnames":["Antonio"],"propositions":[],"lastnames":["Bianchi"],"suffixes":[]},{"firstnames":["Z.","Berkay"],"propositions":[],"lastnames":["Celik"],"suffixes":[]}],"booktitle":"IEEE Symposium on Security and Privacy (IEEE S&P)","year":"2024","pages":"1-18","url":"https://beerkay.github.io/papers/Berkay2024WearOSOakland.pdf","bibtex":"@InProceedings{Berkay2024WearOSOakland,\n title={{Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables}},\n author = {Doguhan Yeke and Muhammad Ibrahim and Guliz Seray Tuncay and Habiba Farrukh and Abdullah Imran and Antonio Bianchi and Z. Berkay Celik},\n booktitle={IEEE Symposium on Security and Privacy (IEEE S\\&P)},\n year={2024},\n pages = {1-18},\n url = {https://beerkay.github.io/papers/Berkay2024WearOSOakland.pdf}\n}\n\n\n","author_short":["Yeke, D.","Ibrahim, M.","Tuncay, G. S.","Farrukh, H.","Imran, A.","Bianchi, A.","Celik, Z. B."],"key":"Berkay2024WearOSOakland","id":"Berkay2024WearOSOakland","bibbaseid":"yeke-ibrahim-tuncay-farrukh-imran-bianchi-celik-wearsmydataunderstandingthecrossdeviceruntimepermissionmodelinwearables-2024","role":"author","urls":{"Paper":"https://beerkay.github.io/papers/Berkay2024WearOSOakland.pdf"},"metadata":{"authorlinks":{}},"downloads":8},"bibtype":"inproceedings","biburl":"https://beerkay.github.io/papers/myPublications.bib","dataSources":["Z6kChNLF2NcgPrzyg","bc73Eqox2pPuwmAyT"],"keywords":[],"search_terms":["wear","data","understanding","cross","device","runtime","permission","model","wearables","yeke","ibrahim","tuncay","farrukh","imran","bianchi","celik"],"title":"Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables","year":2024,"downloads":12}