Made in America Festival 1.0.8 app on the Play Store. https://play.google.com/store/apps/details?id=com.lisnr.festival.madeinamericaandroid, 2015.
 Bluetooth Low Energy API Level 18. https://developer.android.com/guide/topics/connectivity/bluetooth-le.html, 2016.
 Google Cast 1.16.7 app on the Play Store. https://play.google.com/store/apps/details?id=com.google.android.apps.chromecast.app, 2016.
 Google Nearby Messages API. https://developers.google.com/nearby/messages/android/get-beacon-messages, 2016.
 Google Proximity Beacon API. https://developers.google.com/beacons/proximity/guides, 2016.
 History GK 5.0 app on the Play Store. https://play.google.com/store/apps/details?id=com.gktalk.history, 2016.
 Indianapolis Colts Mobile 3.1.1 app on the Play Store. https://play.google.com/store/apps/details?id=com.yinzcam.nfl.colts, 2016.
 Intrasonics-Artificial Echo Modulation. http://www.intrasonics.com/, 2016.
 McDo Philippines app on the Play Store. https://play.google.com/store/apps/details?id=ph.mobext.mcdelivery, 2016.
 Signal360’s Use Cases. http://www.signal360.com/#results, 2016.
 3GPP. 3rd generation partnership project, technical specification of international mobile station equipment identities (imei).Google Scholar
 A. Andreadis and G. Giambene. The global system for mobile communications. Protocols for High-Efficiency Wireless Networks, pages 17–44, 2002.Google Scholar
 anfractuosity. Ultrasound Networking. 00003.Google Scholar
 Audible magic. https://www.audiblemagic.com/advertising/, 2016.
 C. Calabrese. Comments for November 2015 Workshop on Cross-Device Tracking.Google Scholar
 C. Castelluccia, M.-A. Kaafar, and M.-D. Tran. Betrayed by your ads! In Privacy Enhancing Technologies Symposium, pages 1–17. Springer, 2012.Google Scholar
 T. Chen, I. Ullah, M. A. Kaafar, and R. Boreli. Information leakage through mobile analytics services. In Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, page 15. ACM, 2014.Google Scholar
 Copsonic. http://www.copsonic.com/products.html#webtostoretracker, 2016.
 L. Deshotels. Inaudible sound as a covert channel in mobile devices. In Proc. 8th USENIX Conf. Offensive Technologies, page 16.Google Scholar
 A. Detector. Silverpush android apps. https://public.addonsdetector.com/silverpush-android-apps/, November 2015.
 R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004.Google Scholar
 Forbes. Silverpush quits creeping world out, ceases tracking tv habits via inaudible ’beacons’. http://www.forbes.com/sites/thomasbrewster/2016/03/21/silverpush-tv-mobile-ad-tracking-killed/, March 2016.
 Ftc public discussion on cross-device tracking. https://www.ftc.gov/news-events/audio-video/video/cross-device-tracking-part-1, November 2015.
 D. Goodin. Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC.Google Scholar
 D. Goodin. Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps. 00004.Google Scholar
 Google. Chromecast guest mode - guest mode faqs. https://support.google.com/chromecast/answer/6109297?hl=en, August 2016.
 M. Hanspach and M. Goetz. On Covert Acoustical Mesh Networks in Air. 8(11):758–767.Google Scholar
 Honda Electronics. Ultrasonic Aquatic Communication System.Google Scholar
 M. Kamal. minimodem - general-purpose software audio FSK modem.Google Scholar
 Lisnr. http://lisnr.com/platform, 2016.
 Real-time bidding and malvertising: A case study. https://blog.malwarebytes.org/cybercrime/2015/04/real-time-bidding-and-malvertising-a-case-study/, April 2015.
 M. Marlinspike. New tricks for defeating ssl in practice.Google Scholar
 W. Meng, X. Xing, A. Sheth, U. Weinsberg, and W. Lee. Your online interests: Pwned! a pollution attack against targeted advertising. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 129–140. ACM, 2014.Google Scholar
 L. Olejnik, C. Castelluccia, et al. Selling off privacy at auction. 2014.Google Scholar
 G. Petracca, Y. Sun, T. Jaeger, and A. Atamli. AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. In Annual Computer Security Applications Conference. ACM Press.Google Scholar
 E. Ramirez. Transcript - Part 1. In FTC Cross-Device Tracking Workshop.Google Scholar
 E. Ramirez. Transcript - Part 2. In FTC Cross-Device Tracking Workshop.Google Scholar
 C. Roeding and A. Emigh. Method and system for location-triggered rewards, July 16 2013. US Patent 8,489,112.Google Scholar
 Shopkick. https://www.shopkick.com/, June 2016.
 Signal360. http://www.signal360.com/#solution, 2016.
 A. Silverman. Colts to begin using lisnr technology to reach fans’ mobile devices at games, events. http://www.sportsbusinessdaily.com/Daily/Issues/2016/07/19/Franchises/Colts.aspx, July 2016.
 Silverpush. https://www.silverpush.co/#!/audio, 2015.
 A. K. Sood and R. J. Enbody. Targeted cyberattacks: a superset of advanced persistent threats. IEEE security & privacy, (1):54–61, 2013.Google Scholar
 Sophos. Users weighed down by multiple gadgets and mobile devices, new sophos survey reveals. https://www.sophos.com/en-us/press-office/press-releases/2013/03/mobile-security-survey.aspx, March 2013.
 X. Su and T. M. Khoshgoftaar. A survey of collaborative filtering techniques. Advances in artificial intelligence, 2009:4, 2009.Google Scholar
 V. Subramanian, S. Uluagac, H. Cam, and R. Beyah. Examining the characteristics and implications of sensor side channels. In Communications (ICC), 2013 IEEE International Conference on, pages 2205–2210. IEEE.Google Scholar
 Tchirp. http://www.tchirp.com/#theTech, 2016.
 P. Winter, R. Köwer, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, and E. Weippl. Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Springer, 2014.Google Scholar
 X. Xing, W. Meng, D. Doozan, A. C. Snoeren, N. Feamster, and W. Lee. Take this personally: Pollution attacks on personalized services. In Proceedings of the 22nd USENIX Security Symposium, 2013.Google Scholar
 J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen. How much can behavioral targeting help online advertising? In Proceedings of the 18th international conference on World wide web, pages 261–270. ACM, 2009.Google Scholar
 Y. Yuan, F. Wang, J. Li, and R. Qin. A survey on real time bidding advertising. In Service Operations and Logistics, and Informatics (SOLI), 2014 IEEE International Conference on, pages 418–423. IEEE, 2014.Google Scholar
 W. Zhang, L. Chen, and J. Wang. Implicit look-alike modelling in display ads: Transfer collaborative filtering to ctr estimation. arXiv preprint arXiv:1601.02377, 2016.Google Scholar
About the article
Published Online: 2017-04-04
Published in Print: 2017-04-01
Citation Information: Proceedings on Privacy Enhancing Technologies, Volume 2017, Issue 2, Pages 95–112, ISSN (Online) 2299-0984, DOI: https://doi.org/10.1515/popets-2017-0018.
© 2017 Vasilios Mavroudis et al., published by De Gruyter Open. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. BY-NC-ND 3.0