@inproceedings{ceta2020,
  author = {K. A. Roundy and P. Barmaimon Mendelberg and N. Dell and D. McCoy and D. Nissani and T. Ristenpart and A. Tamersoy},
  booktitle = {2020 IEEE Symposium on Security and Privacy (SP)},
  title = {The Many Kinds of Creepware Used for Interpersonal Attacks},
  year = {2020},
  volume = {},
  issn = {2375-1207},
  pages = {626-643},
  keywords = {creepware;stalkerware;surveillance;interpersonal-attacks;intimate-partner-violence;android;threats;spoofing;harassment;measurement-study},
  doi = {10.1109/SP40000.2020.00069},
  url = {http://damonmccoy.com/papers/Creepware_SP.pdf},
  publisher = {IEEE Computer Society},
  address = {Los Alamitos, CA, USA},
  month = {may},
}
@article{ceta2019_2,
  author = {Diana Freed and Sam Havron and Emily Tseng and Andrea Gallardo and Rahul Chatterjee and Thomas Ristenpart and Nicola Dell},
  title = {“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence},
  year = {2019},
  issue_date = {November 2019},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  volume = {3},
  number = {CSCW},
  url = {https://www.havron.dev/pubs/freed-cscw19.pdf},
  doi = {10.1145/3359304},
  journal = {Proc. ACM Hum.-Comput. Interact.},
  month = {November},
  articleno = {202},
  numpages = {24},
  keywords = {intimate partner violence, gender-based violence, security, privacy, empirical studies in hci},
}
@inproceedings{ceta2019,
  author = {Sam Havron and Diana Freed and Rahul Chatterjee and Damon McCoy and Nicola Dell and Thomas Ristenpart},
  title = {Clinical Computer Security for Victims of Intimate Partner Violence},
  booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019},
  pages = {105--122},
  publisher = {{USENIX} Association},
  year = {2019},
  url = {https://www.havron.dev/pubs/clinicalsec.pdf},
}
@article{ceta2017,
  author = {Diana Freed and Jackeline Palmer and Diana Minchala and Karen Levy and Thomas Ristenpart and Nicola Dell},
  year = {2017},
  month = {12},
  pages = {1-22},
  title = {Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders},
  volume = {1},
  journal = {Proceedings of the ACM on Human-Computer Interaction},
  doi = {10.1145/3134681},
  url = {http://nixdell.com/papers/a046-freed.pdf},
}
@inproceedings{spyware_8418618,
  author = {R. {Chatterjee} and P. {Doerfler} and H. {Orgad} and S. {Havron} and J. {Palmer} and D. {Freed} and K. {Levy} and N. {Dell} and D. {McCoy} and T. {Ristenpart}},
  booktitle = {2018 IEEE Symposium on Security and Privacy (SP)},
  title = {The Spyware Used in Intimate Partner Violence},
  year = {2018},
  volume = {},
  number = {},
  pages = {441-458},
  url = {http://nixdell.com/papers/spyware.pdf},
}
@inproceedings{stories_46080,
  author = {Tara Matthews and Kathleen O’Leary and Anna Turner and Manya Sleeper and Jill Palzkill Woelfer and Martin Shelton and Cori Manthorne and Elizabeth F. Churchill and Sunny Consolvo},
  title = {Stories from survivors: Privacy & security practices when coping with intimate partner abuse},
  year = {2017},
  URL = {https://mshelt.onl/p/matthews_et_al_2017.pdf},
  pages = {2189-2201},
  address = {New York, NY, USA},
}
@misc{citizenlab,
  author = {Christopher Parsons and Adam Molnar and Jakub Dalek and Jeffrey Knockel and Miles Kenyon and Bennett Haselton and Cynthia Khoo and Ron Deibert},
  title = {The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry},
  year = {2019},
  url = {https://citizenlab.ca/docs/stalkerware-holistic.pdf},
}
@misc{citizenlab_legal,
  author = {Cynthia Khoo and Kate Robertson and Ronald Deibert},
  title = {Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications},
  year = {2019},
  url = {https://citizenlab.ca/docs/stalkerware-legal.pdf},
}
@article{Levy2020PrivacyTI,
  author = {Karen Levy and Bruce Schneier},
  title = {Privacy threats in intimate relationships},
  journal = {ArXiv},
  year = {2020},
  volume = {abs/2006.03907},
  url = {https://www.schneier.com/academic/paperfiles/Privacy_Threats_in_Intimate_Relationships.pdf},
}
@inproceedings{stalkers-paradise,
  author = {Diana Freed and Jackeline Palmer and Diana Minchala and Karen Levy and Thomas Ristenpart and Nicola Dell},
  year = {2018},
  month = {04},
  pages = {1-13},
  title = {A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology},
  doi = {10.1145/3173574.3174241},
  booktitle = {ACM Conference on Human Factors in Computing Systems},
  url = {https://rist.tech.cornell.edu/papers/stalkers-paradise-intimate.pdf},
}
@article{sensible_privacy,
  author = {Budi Arief and Kovila Coopamootoo and Martin Emms and Aad Moorsel},
  year = {2014},
  month = {11},
  pages = {201-204},
  title = {Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse},
  journal = {Proceedings of the ACM Conference on Computer and Communications Security},
  doi = {10.1145/2665943.2665965},
  url = {https://www.cs.kent.ac.uk/people/staff/ba284/Papers/WPES2014.pdf},
}
@article{dimond2011,
  author = {J. P. {Dimond} and C. {Fiesler} and A. S. {Bruckman}},
  journal = {Interacting with Computers},
  title = {Domestic violence and information communication technologies},
  year = {2011},
  volume = {23},
  number = {5},
  pages = {413-421},
  url = {https://sci-hub.tw/10.1016/j.intcom.2011.04.006},
}
@online{npr,
  author = {NPR},
  title = {Smartphones Are Used To Stalk, Control Domestic Abuse Victims},
  year = {2014},
  url = {https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims},
}
@misc{avtest,
  author = {AV Comparatives},
  title = {Stalkerware Test 2020},
  year = {2020},
  url = {https://www.av-comparatives.org/wp-content/uploads/2020/06/avc_stalkerware_2020.pdf},
}
@article{fraser2010,
  author = {Cynthia Fraser and Erica Olsen and Kaofeng Lee and Cindy Southworth and Sarah Tucker},
  year = {2010},
  month = {11},
  pages = {39 - 55},
  title = {The New Age of Stalking: Technological Implications for Stalking},
  volume = {61},
  journal = {Juvenile and Family Court Journal},
  doi = {10.1111/j.1755-6988.2010.01051.x},
  url = {https://sci-hub.tw/10.1111/j.1755-6988.2010.01051.x},
}
@article{southworth2007,
  author = {Cynthia Southworth and Jerry Finn and Shawndell Dawson and Cynthia Fraser and Sarah Tucker},
  year = {2007},
  month = {09},
  pages = {842-56},
  title = {Intimate Partner Violence, Technology, and Stalking},
  volume = {13},
  journal = {Violence against women},
  doi = {10.1177/1077801207302045},
}
@misc{smartsafe,
  author = {Delanie Woodlock},
  year = {2013},
  month = {01},
  pages = {},
  title = {Technology-facilitated stalking: findings and resources from the SmartSafe project},
  doi = {10.13140/2.1.4106.9764},
  url = {https://www.dvrcv.org.au/sites/default/files/SmartSafe_0.pdf},
}
@misc{bcsth,
  author = {British Columbia Society Transition Houses},
  title = {Assessing Technology in the Context of Violence Against Women & Children: Examining Benefits & Risks},
  year = {2013},
  url = {https://bcsth.ca/wp-content/uploads/2016/10/Assessing-Technology-in-the-Context-of-Violence-Against-Women-Children.-Examining-Benefits-Risks..pdf},
}
@online{stalkerware,
  author = {Vice Motherboard},
  title = {Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones},
  year = {2017},
  url = {https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x},
}
@article{woodlock2016,
  author = {Delanie Woodlock},
  year = {2016},
  month = {05},
  pages = {},
  title = {The Abuse of Technology in Domestic Violence and Stalking},
  volume = {23},
  journal = {Violence Against Women},
  doi = {10.1177/1077801216646277},
  url = {https://sci-hub.tw/10.1177/1077801216646277},
}
@article{melton2007,
  author = {Heather Melton},
  year = {2007},
  month = {10},
  pages = {347-363},
  title = {Stalking in the Context of Intimate Partner AbuseIn the Victims' Words},
  volume = {2},
  journal = {Feminist Criminology - FEM CRIMINOL},
  doi = {10.1177/1557085107306517},
  url = {https://sci-hub.tw/10.1177/1557085107306517},
}
@article{harkin2019,
  author = {Diarmaid Harkin and Adam Molnar and Erica Vowles},
  year = {2019},
  month = {01},
  pages = {174165901882056},
  title = {The commodification of mobile phone surveillance: An analysis of the consumer spyware industry},
  journal = {Crime, Media, Culture: An International Journal},
  doi = {10.1177/1741659018820562},
  url = {https://sci-hub.tw/10.1177/1741659018820562},
}
@inproceedings{sharealike2018,
  author = {Cheul Young Park and Cori Faklaris and Siyan Zhao and Alex Sciuto and Laura Dabbish and Jason Hong},
  title = {Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships},
  year = {2018},
  isbn = {9781931971454},
  publisher = {USENIX Association},
  address = {USA},
  booktitle = {Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security},
  pages = {83–102},
  numpages = {20},
  location = {Baltimore, MD, USA},
  series = {SOUPS ’18},
  url = {https://www.usenix.org/system/files/conference/soups2018/soups2018-park.pdf},
}
@misc{hubertine,
  author = {Centre Hubertine Auclert},
  title = {Rapport sur les cyber-violences conjugales},
  year = {2018},
  url = {https://m.centre-hubertine-auclert.fr/sites/default/files/fichiers/rapport-cyberviolences-conjugales-web.pdf},
  language = {french},
}
@inproceedings{levy2015,
  author = {Karen E.C. Levy},
  title = {Intimate Surveillance},
  booktitle = {Idaho Law Review 50},
  year = {2015},
  pages = {679-93},
  url = {https://www.uidaho.edu/-/media/UIdaho-Responsive/Files/law/law-review/articles/volume-51/51-3-levy-karen-ec.pdf},
}
@inproceedings{tseng2020,
  author = {Emily Tseng and Rosanna Bellini and Nora McDonald and Matan Danos and Rachel Greenstadt and Damon McCoy and Nicola Dell and Thomas Ristenpart},
  title = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums},
  booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
  year = {2020},
  isbn = {978-1-939133-17-5},
  pages = {1893--1909},
  url = {https://www.usenix.org/system/files/sec20-tseng.pdf},
  publisher = {{USENIX} Association},
  month = {August},
}
@article{leitao2019,
  author = {Roxanne Leitão},
  title = {Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums},
  journal = {Human–Computer Interaction},
  volume = {0},
  number = {0},
  pages = {1-40},
  year = {2019},
  publisher = {Taylor & Francis},
  doi = {10.1080/07370024.2019.1685883},
  URL = {https://scihub.to/10.1080/07370024.2019.1685883},
  eprint = {https://doi.org/10.1080/07370024.2019.1685883},
}
@article{yardley2020,
  author = {Elizabeth Yardley},
  title = {Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework},
  journal = {Violence Against Women},
  volume = {0},
  number = {0},
  pages = {1077801220947172},
  year = {2020},
  doi = {10.1177/1077801220947172},
  note = {PMID: 32757887},
  url = {https://sci-hub.st/10.1177/1077801220947172},
  eprint = {https://doi.org/10.1177/1077801220947172},
  abstract = {This article presents a new theoretical framework around technology-facilitated domestic abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are increasingly drawing upon networked technologies like smartphones, social media, and GPS trackers in monitoring, controlling, and abusing survivors. There is considerable academic literature developing in response to this. While this scholarship is valuable, this article argues that TFDA must be understood as a neoliberal manifestation of patriarchal legacies of misogyny and sexism. A failure to recognize this will serve to prioritize abusers’ freedom to do harm over rights of survivors to be protected from harm.},
}
@misc{white2019,
  author = {Nadine E White},
  title = {Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse},
  year = {2019},
  url = {https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=7982&context=dissertations},
}
@article{harris2018,
  author = {Bridget Harris and Delanie Woodlock},
  year = {2018},
  month = {11},
  pages = {},
  title = {Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies},
  volume = {59},
  journal = {British Journal of Criminology},
  doi = {10.1093/bjc/azy052},
  url = {https://academic.oup.com/bjc/article/59/3/530/5172990},
}
@article{douglas2019,
  author = {Heather Douglas and Bridget Harris and Molly Dragiewicz},
  year = {2019},
  month = {04},
  pages = {551-570},
  title = {Technology-facilitated Domestic and Family Violence: Women’s Experiences},
  volume = {59},
  journal = {British Journal of Criminology},
  doi = {10.1093/bjc/azy068},
  url = {https://academic.oup.com/bjc/article-abstract/59/3/551/5281174},
}
@article{woodlock2020,
  author = {Delanie Woodlock and Mandy McKenzie and Deborah Western and Bridget Harris},
  title = {Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control},
  journal = {Australian Social Work},
  volume = {73},
  number = {3},
  pages = {368-380},
  year = {2020},
  publisher = {Routledge},
  doi = {10.1080/0312407X.2019.1607510},
  url = {https://www.tandfonline.com/doi/pdf/10.1080/0312407X.2019.1607510},
}
@incollection{harris2020,
  author = {Bridget Harris},
  pages = {317--336},
  title = {Technology and violence against women},
  publisher = {Emerald},
  address = {United Kingdom},
  booktitle = {The Emerald Handbook of Feminism, Criminology and Social Change},
  series = {Emerald Studies In Criminology, Feminism and Social Change},
  year = {2020},
  doi = {10.1108/978-1-78769-955-720201026},
  abstract = {As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of communication and contact between individuals and groups, transforming temporal, geographic and personal boundaries. There have undoubtedly been benefits associated with such shifts, but technologies have also exacerbated existing patterns of gendered violence and introduced new forms of intrusion, abuse and surveillance. In order to understand and combat harm and, protect and empower women, criminologists must investigate these practices. This chapter discusses how technology has transformed the enactment of violence against women.},
  url = {https://eprints.qut.edu.au/202652/},
}
@inproceedings{Hand2009TheUO,
  author = {T. Hand and D. Chung and M. Peters},
  title = {The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation},
  year = {2009},
  url = {https://pdfs.semanticscholar.org/c4ce/8b1b3bd958da4320ee65ec5bc4f271862a86.pdf},
}
@misc{ybarra2017,
  author = {Michelle Ybarra and Myeshia Price-Feeney and Amanda Lenhart and Kathryn Zickuhr},
  title = {Intimate Partner Digital Abuse},
  year = {2017},
  url = {https://datasociety.net/pubs/oh/Intimate_Partner_Digital_Abuse_2017.pdf},
}
@article{burke2011,
  author = {Sloane Burke and Michele Wallen and Karen Vail-Smith and David Knox},
  year = {2011},
  month = {05},
  pages = {1162-1167},
  title = {Using technology to control intimate partners: An exploratory study of college undergraduates},
  volume = {27},
  journal = {Computers in Human Behavior},
  doi = {10.1016/j.chb.2010.12.010},
  url = {https://sci-hub.tw/10.1016/j.chb.2010.12.010},
}
@inproceedings{parkin2019,
  author = {Simon Parkin and Trupti Patel and Isabel Lopez-Neira and Leonie Tanczer},
  year = {2019},
  month = {09},
  pages = {1-15},
  title = {Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse},
  doi = {10.1145/3368860.3368861},
  url = {https://discovery.ucl.ac.uk/id/eprint/10083266/7/NSPW_2019-author_version.pdf},
}
@inproceedings{leitao2019_2,
  author = {Roxanne Leitão},
  year = {2019},
  month = {06},
  pages = {527-539},
  title = {Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse},
  isbn = {978-1-4503-5850-7},
  doi = {10.1145/3322276.3322366},
  url = {https://sci-hub.tw/10.1145/3322276.3322366},
}
@article{lopezneira2019,
  author = {Isabel Lopez-Neira and Trupti Patel and Simon Parkin and George Danezis and Leonie Tanczer},
  year = {2019},
  month = {03},
  pages = {},
  title = {‘Internet of Things’: How Abuse is Getting Smarter},
  volume = {63},
  journal = {SSRN Electronic Journal},
  doi = {10.2139/ssrn.3350615},
  url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3350615},
}
@inproceedings{tanczer2018,
  author = {Leonie Tanczer and Isabel Neira and Simon Edward Parkin and Trupti N Patel and George Danezis},
  title = {Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse},
  year = {2018},
  url = {https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf},
}
@article{mcfarlane2002,
  author = {Judith McFarlane and Jacquelyn Campbell and Kathy Jacquelyn},
  year = {2002},
  month = {04},
  pages = {51 - 68},
  title = {Intimate partner stalking and femicide: urgent implications for women's safety},
  volume = {20},
  journal = {Behavioral Sciences & the Law},
  doi = {10.1002/bsl.477},
  url = {https://sci-hub.st/10.1002/bsl.477},
}
@inproceedings{bellini2020,
  author = {Rosanna Bellini and Emily Tseng},
  title = {“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums},
  year = {2020},
  url = {http://damonmccoy.com/papers/IPS_CSCW.pdf},
}
@article{fox2015,
  author = {Jesse Fox and Robert Tokunaga},
  year = {2015},
  month = {09},
  pages = {491-498},
  title = {Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites},
  volume = {18},
  journal = {Cyberpsychology, Behavior, and Social Networking},
  doi = {10.1089/cyber.2015.0123},
  url = {https://www.researchgate.net/profile/Jesse_Fox3/publication/281113727_Romantic_Partner_Monitoring_After_Breakups_Attachment_Dependence_Distress_and_Post-Dissolution_Online_Surveillance_via_Social_Networking_Sites/links/580e760108ae51b863966f8f/Romantic-Partner-Monitoring-After-Breakups-Attachment-Dependence-Distress-and-Post-Dissolution-Online-Surveillance-via-Social-Networking-Sites.pdf},
}
@article{alalosi2018,
  author = {Hadeel al-alosi},
  year = {2018},
  month = {11},
  pages = {},
  title = {Cyber-Violence: Digital Abuse in the Context of Domestic Violence},
  url = {https://www.researchgate.net/profile/Hadeel_Al-Alosi/publication/328813010_Cyber-Violence_Digital_Abuse_in_the_Context_of_Domestic_Violence/links/5be4c477299bf1124fc41c6a/Cyber-Violence-Digital-Abuse-in-the-Context-of-Domestic-Violence.pdf},
}
@article{uganda2018,
  author = {Wougnet and APC and Sida},
  year = {2018},
  title = {Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda},
  url = {https://www.apc.org/sites/default/files/Research_Report_on_Tech_Related_VAW_2018.pdf},
}
@article{tseng2021,
  author = {Diana Freed and Emily Tseng and Thomas Ristenpart and Nicola Dell and Kristen Engle},
  year = {2021},
  month = {01},
  pages = {},
  title = {A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19},
  url = {https://emtseng.me/assets/Tseng-2021-CHI_Digital-Safety-Dilemma_cam-ready.pdf},
}
@inproceedings{randall2020,
  author = {Audrey Randall and Enze Liu and Gautam Akiwate and Ramakrishna Padmanabhan and Geoffrey M. Voelker and Stefan Savage and Aaron Schulman},
  title = {Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers},
  year = {2020},
  isbn = {9781450381383},
  publisher = {Association for Computing Machinery},
  address = {New York, NY, USA},
  doi = {10.1145/3419394.3423640},
  abstract = {This paper presents and evaluates Trufflehunter, a DNS cache snooping tool for estimating the prevalence of rare and sensitive Internet applications. Unlike previous efforts that have focused on small, misconfigured open DNS resolvers, Trufflehunter models the complex behavior of large multi-layer distributed caching infrastructures (e.g., such as Google Public DNS). In particular, using controlled experiments, we have inferred the caching strategies of the four most popular public DNS resolvers (Google Public DNS, Cloudflare Quad1, OpenDNS and Quad9). The large footprint of such resolvers presents an opportunity to observe rare domain usage, while preserving the privacy of the users accessing them. Using a controlled testbed, we evaluate how accurately Trufflehunter can estimate domain name usage across the U.S. Applying this technique in the wild, we provide a lower-bound estimate of the popularity of several rare and sensitive applications (most notably smartphone stalkerware) which are otherwise challenging to survey.},
  booktitle = {Proceedings of the ACM Internet Measurement Conference},
  pages = {50–64},
  numpages = {15},
  location = {Virtual Event, USA},
  series = {IMC '20},
  url = {https://dl.acm.org/doi/pdf/10.1145/3419394.3423640},
}