Blekinge Institute of Technology

Latest Content From Blekinge Institute of Technology

Whitepaper: Privacy-Invasive Software and Preventive Mechanisms

by Blekinge Institute of TechnologyJan 01, 2008

Computers are increasingly more integrated into people’s daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labeled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End User License Agreements (EULA). This lack of spyware definition result in that current countermeasures are bound to noticeable misclassification rates. In this paper, the

Whitepaper: Analysing Privacy-Invasive Software Using Computer Forensic Methods

by Blekinge Institute of TechnologyJan 01, 2008

User privacy is widely affected by the occurrence of Privacy-Invasive Software (PIS) on the Internet. They present a computer forensic investigation method for detecting and analyzing PIS. In an experiment they have used this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of

Whitepaper: Analysing Countermeasures Against Privacy-Invasive Software

by Blekinge Institute of TechnologyJan 01, 2008

Technology has revolutionized the way one collect, store and process information. With the help of information technology it is possible to accumulate huge data quantities for instant or later use. The fact that information (such as user interests) creates value to advertisers has given rise to a parasitic market, focusing on information theft. Software vendors take advantage of these achievements based on questionable commercial incentives when creating and distributing questionable software.