{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:24:16Z","timestamp":1740101056932,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560665","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2445-2458","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Hidden in Plain Sight"],"prefix":"10.1145","author":[{"given":"Sajjad","family":"Pourali","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]},{"given":"Nayanamana","family":"Samarasinghe","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adb shell pm clear. 2020. Adbshell. https:\/\/adbshell.com\/commands\/adb-shellpm-clear. Adb shell pm clear. 2020. Adbshell. https:\/\/adbshell.com\/commands\/adb-shellpm-clear."},{"key":"e_1_3_2_1_2_1","unstructured":"Androguard. 2022. Androguard. https:\/\/github.com\/androguard\/androguard. Androguard. 2022. Androguard. https:\/\/github.com\/androguard\/androguard."},{"key":"e_1_3_2_1_3_1","unstructured":"Androidrank. 2022. Androidrank. https:\/\/www.androidrank.org\/. Androidrank. 2022. Androidrank. https:\/\/www.androidrank.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"AndroidViewClient. 2022. AndroidViewClient. https:\/\/github.com\/dtmilano\/ AndroidViewClient\/. AndroidViewClient. 2022. AndroidViewClient. https:\/\/github.com\/dtmilano\/ AndroidViewClient\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Apktool. 2021. Apktool. https:\/\/github.com\/scottyab\/rootbeer. Apktool. 2021. Apktool. https:\/\/github.com\/scottyab\/rootbeer."},{"key":"e_1_3_2_1_6_1","unstructured":"Appium. 2022. Appium. https:\/\/appium.io\/. Appium. 2022. Appium. https:\/\/appium.io\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Exposures exposed: A measurement and user study to assess mobile data privacy in context. arXiv preprint arXiv:2008.08973","author":"Bakopoulou Evita","year":"2020","unstructured":"Evita Bakopoulou , Anastasia Shuba , and Athina Markopoulou . 2020. Exposures exposed: A measurement and user study to assess mobile data privacy in context. arXiv preprint arXiv:2008.08973 ( 2020 ). Evita Bakopoulou, Anastasia Shuba, and Athina Markopoulou. 2020. Exposures exposed: A measurement and user study to assess mobile data privacy in context. arXiv preprint arXiv:2008.08973 (2020)."},{"key":"e_1_3_2_1_8_1","volume-title":"ACM Conference on Security & Privacy in Wireless and Mobile Networks (WISEC'18)","author":"Block Kenneth","year":"2018","unstructured":"Kenneth Block , Sashank Narain , and Guevara Noubir . 2018 . An autonomic and permissionless android covert channel . In ACM Conference on Security & Privacy in Wireless and Mobile Networks (WISEC'18) . Stockholm Sweden. Kenneth Block, Sashank Narain, and Guevara Noubir. 2018. An autonomic and permissionless android covert channel. In ACM Conference on Security & Privacy in Wireless and Mobile Networks (WISEC'18). Stockholm Sweden."},{"key":"e_1_3_2_1_9_1","unstructured":"Cloudflare. 2022. What is MTU (maximum transmission unit)? https:\/\/www. cloudflare.com\/learning\/network-layer\/what-is-mtu\/. Cloudflare. 2022. What is MTU (maximum transmission unit)? https:\/\/www. cloudflare.com\/learning\/network-layer\/what-is-mtu\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In Network and Distributed System Security Symposium (NDSS'17)","author":"Continella Andrea","year":"2017","unstructured":"Andrea Continella , Yanick Fratantonio , Martina Lindorfer , Alessandro Puccetti , Ali Zand , Christopher Kruegel , and Giovanni Vigna . 2017 . Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In Network and Distributed System Security Symposium (NDSS'17) . San Diego, CA, USA. Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, and Giovanni Vigna. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In Network and Distributed System Security Symposium (NDSS'17). San Diego, CA, USA."},{"key":"e_1_3_2_1_11_1","volume-title":"An Exploration of ARM System-Level Cache and GPU Side Channels. In IEEE Symposium on Security and Privacy (SP'21)","author":"Cronin Patrick","year":"2021","unstructured":"Patrick Cronin , Xing Gao , Haining Wang , and Chase Cotton . 2021 . An Exploration of ARM System-Level Cache and GPU Side Channels. In IEEE Symposium on Security and Privacy (SP'21) . Association for Computing Machinery, Online. https:\/\/doi.org\/10.1145\/3485832.3485902 10.1145\/3485832.3485902 Patrick Cronin, Xing Gao, Haining Wang, and Chase Cotton. 2021. An Exploration of ARM System-Level Cache and GPU Side Channels. In IEEE Symposium on Security and Privacy (SP'21). Association for Computing Machinery, Online. https:\/\/doi.org\/10.1145\/3485832.3485902"},{"key":"e_1_3_2_1_12_1","unstructured":"Dpkt. 2021. Dpkt. https:\/\/github.com\/kbandla\/dpkt. Dpkt. 2021. Dpkt. https:\/\/github.com\/kbandla\/dpkt."},{"key":"e_1_3_2_1_13_1","unstructured":"Federal Trade Commission (FTC). 2016. Mobile Advertising Network InMobi Settles FTC Charges It Tracked Hundreds of Millions of Consumers' Locations Without Permission. https:\/\/www.ftc.gov\/news-events\/press-releases\/2016\/06\/ mobile-advertising-network-inmobi-settles-ftc-charges-it-tracked. Federal Trade Commission (FTC). 2016. Mobile Advertising Network InMobi Settles FTC Charges It Tracked Hundreds of Millions of Consumers' Locations Without Permission. https:\/\/www.ftc.gov\/news-events\/press-releases\/2016\/06\/ mobile-advertising-network-inmobi-settles-ftc-charges-it-tracked."},{"key":"e_1_3_2_1_14_1","unstructured":"Frida. 2022. Frida. https:\/\/frida.re\/. Frida. 2022. Frida. https:\/\/frida.re\/."},{"key":"e_1_3_2_1_15_1","first-page":"2635","article-title":"Shielding android application against reverse engineering","volume":"2","author":"Ghosh Sudipta","year":"2013","unstructured":"Sudipta Ghosh , SR Tandan , and Kamlesh Lahre . 2013 . Shielding android application against reverse engineering . International Journal of Engineering Research & Technology 2 , 6 (2013), 2635 -- 2643 . Sudipta Ghosh, SR Tandan, and Kamlesh Lahre. 2013. Shielding android application against reverse engineering. International Journal of Engineering Research & Technology 2, 6 (2013), 2635--2643.","journal-title":"International Journal of Engineering Research & Technology"},{"key":"e_1_3_2_1_16_1","unstructured":"Githubusercontent.com. 2022. List of the base rules that block ads in mobile apps. https:\/\/raw.githubusercontent.com\/AdguardTeam\/AdguardFilters\/master\/ MobileFilter\/sections\/specific_app.txt. Githubusercontent.com. 2022. List of the base rules that block ads in mobile apps. https:\/\/raw.githubusercontent.com\/AdguardTeam\/AdguardFilters\/master\/ MobileFilter\/sections\/specific_app.txt."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2020. Android Debug Bridge (adb). https:\/\/developer.android.com\/ studio\/command-line\/adb. Google. 2020. Android Debug Bridge (adb). https:\/\/developer.android.com\/ studio\/command-line\/adb."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2021. Logcat command-line tool. https:\/\/us.norton.com\/internetsecuritymobile-android-vs-ios-which-is-more-secure.html. Google. 2021. Logcat command-line tool. https:\/\/us.norton.com\/internetsecuritymobile-android-vs-ios-which-is-more-secure.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2022. Call package manager (pm). https:\/\/developer.android.com\/studio\/ command-line\/adb#pm. Google. 2022. Call package manager (pm). https:\/\/developer.android.com\/studio\/ command-line\/adb#pm."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2022. Cmd in Android native framework (cmd). https:\/\/android.googlesource.com\/platform\/frameworks\/native\/\/ 593991bfd9747692c09ebd980ddc50dc29d86d5d\/cmds\/cmd\/cmd.cpp. Google. 2022. Cmd in Android native framework (cmd). https:\/\/android.googlesource.com\/platform\/frameworks\/native\/\/ 593991bfd9747692c09ebd980ddc50dc29d86d5d\/cmds\/cmd\/cmd.cpp."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2022. dumpsys. https:\/\/developer.android.com\/studio\/command-line\/ dumpsys. Google. 2022. dumpsys. https:\/\/developer.android.com\/studio\/command-line\/ dumpsys."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2022. Google Admob. https:\/\/developers.google.com\/admob. Google. 2022. Google Admob. https:\/\/developers.google.com\/admob."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2022. Google Play Protect. https:\/\/developers.google.com\/android\/playprotect. Google. 2022. Google Play Protect. https:\/\/developers.google.com\/android\/playprotect."},{"key":"e_1_3_2_1_24_1","unstructured":"Google. 2022. monkeyrunner. https:\/\/developer.android.com\/studio\/test\/ monkeyrunner. Google. 2022. monkeyrunner. https:\/\/developer.android.com\/studio\/test\/ monkeyrunner."},{"key":"e_1_3_2_1_25_1","unstructured":"Google. 2022. View class - Android Developers. https:\/\/developer.android.com\/ reference\/android\/view\/View. Google. 2022. View class - Android Developers. https:\/\/developer.android.com\/ reference\/android\/view\/View."},{"key":"e_1_3_2_1_26_1","unstructured":"Google. 2022. Work with data more securely. https:\/\/developer.android.com\/ topic\/security\/data. Google. 2022. Work with data more securely. https:\/\/developer.android.com\/ topic\/security\/data."},{"volume-title":"Google's Wi-Fi Database May Know Your Router's Physical Location. News article (Apr. 25","year":"2011","key":"e_1_3_2_1_27_1","unstructured":"Huffpost.com. 2011. Google's Wi-Fi Database May Know Your Router's Physical Location. News article (Apr. 25 , 2011 ). https:\/\/www.huffpost.com\/entry\/androidmap-reveals-router-location_n_853214. Huffpost.com. 2011. Google's Wi-Fi Database May Know Your Router's Physical Location. News article (Apr. 25, 2011). https:\/\/www.huffpost.com\/entry\/androidmap-reveals-router-location_n_853214."},{"key":"e_1_3_2_1_28_1","first-page":"40","article-title":"An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks","volume":"7","author":"Lim Kyeonghwan","year":"2016","unstructured":"Kyeonghwan Lim , Younsik Jeong , Seong-je Cho, Minkyu Park , and Sangchul Han . 2016 . An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 , 3 (2016), 40 -- 52 . Kyeonghwan Lim, Younsik Jeong, Seong-je Cho, Minkyu Park, and Sangchul Han. 2016. An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7, 3 (2016), 40--52.","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_29_1","unstructured":"Linux.die.net. 2022. tcpdump. https:\/\/linux.die.net\/man\/8\/tcpdump. Linux.die.net. 2022. tcpdump. https:\/\/linux.die.net\/man\/8\/tcpdump."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_31_1","unstructured":"Medium.com. 2016. Rotate Android device screen using adb commands (not emulator). https:\/\/medium.com\/@navalkishoreb\/rotate-android-device-screenusing-adb-commands-not-emulator-94ab1a749b87. Medium.com. 2016. Rotate Android device screen using adb commands (not emulator). https:\/\/medium.com\/@navalkishoreb\/rotate-android-device-screenusing-adb-commands-not-emulator-94ab1a749b87."},{"key":"e_1_3_2_1_32_1","unstructured":"Mitmproxy. 2022. mitmproxy. https:\/\/mitmproxy.org\/. Mitmproxy. 2022. mitmproxy. https:\/\/mitmproxy.org\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0031"},{"key":"e_1_3_2_1_34_1","volume-title":"Exploring SyscallBased Semantics Reconstruction of Android Applications. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'19)","author":"Nisi Dario","year":"2019","unstructured":"Dario Nisi , Antonio Bianchi , and Yanick Fratantonio . 2019 . Exploring SyscallBased Semantics Reconstruction of Android Applications. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'19) . Beijing, China. Dario Nisi, Antonio Bianchi, and Yanick Fratantonio. 2019. Exploring SyscallBased Semantics Reconstruction of Android Applications. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID'19). Beijing, China."},{"key":"e_1_3_2_1_35_1","unstructured":"Oracle. 2020. Object (Java platform SE 7. https:\/\/docs.oracle.com\/javase\/7\/docs\/ api\/java\/lang\/Object.html#hashCode(). Oracle. 2020. Object (Java platform SE 7. https:\/\/docs.oracle.com\/javase\/7\/docs\/ api\/java\/lang\/Object.html#hashCode()."},{"key":"e_1_3_2_1_36_1","unstructured":"Oracle. 2022. Class Cipher. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/javax\/ crypto\/Cipher.html. Oracle. 2022. Class Cipher. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/javax\/ crypto\/Cipher.html."},{"key":"e_1_3_2_1_37_1","volume-title":"AndroTIME: Identifying Timing Side Channels in the Android API. In ACM Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'20)","author":"Palfinger Gerald","year":"2020","unstructured":"Gerald Palfinger , Bernd Pr\u00fcnster , and Dominik Julian Ziegler . 2020 . AndroTIME: Identifying Timing Side Channels in the Android API. In ACM Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'20) . Guangzhou, China. Gerald Palfinger, Bernd Pr\u00fcnster, and Dominik Julian Ziegler. 2020. AndroTIME: Identifying Timing Side Channels in the Android API. In ACM Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'20). Guangzhou, China."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194733.3194742"},{"key":"e_1_3_2_1_39_1","volume-title":"HideMyApp: Hiding the Presence of Sensitive Apps on Android. In USENIX Security Symposium (USENIX Security'19)","author":"Pham Anh","year":"2019","unstructured":"Anh Pham , Italo Dacosta , Eleonora Losiouk , John Stephan , K\u00e9vin Huguenin , and Jean-Pierre Hubaux . 2019 . HideMyApp: Hiding the Presence of Sensitive Apps on Android. In USENIX Security Symposium (USENIX Security'19) . Santa Clara, CA, USA. Anh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, K\u00e9vin Huguenin, and Jean-Pierre Hubaux. 2019. HideMyApp: Hiding the Presence of Sensitive Apps on Android. In USENIX Security Symposium (USENIX Security'19). Santa Clara, CA, USA."},{"key":"e_1_3_2_1_40_1","volume-title":"d.]. Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. Extended report (Oct. 1","author":"Pourali Sajjad","year":"2022","unstructured":"Sajjad Pourali , Nayanamana Samarasinghe , and Mohammad Mannan . [n. d.]. Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. Extended report (Oct. 1 , 2022 ). https:\/\/users.encs.concordia.ca\/~mmannan\/publications\/ ThirdEye-CCS 2022.pdf. Sajjad Pourali, Nayanamana Samarasinghe, and Mohammad Mannan. [n. d.]. Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. Extended report (Oct. 1, 2022). https:\/\/users.encs.concordia.ca\/~mmannan\/publications\/ ThirdEye-CCS2022.pdf."},{"key":"e_1_3_2_1_41_1","unstructured":"Pypi.org. 2022. googletrans 3.0.0. https:\/\/pypi.org\/project\/googletrans\/. Pypi.org. 2022. googletrans 3.0.0. https:\/\/pypi.org\/project\/googletrans\/."},{"key":"e_1_3_2_1_42_1","unstructured":"Python-magic. 2021. python-magic. https:\/\/github.com\/ahupp\/python-magic. Python-magic. 2021. python-magic. https:\/\/github.com\/ahupp\/python-magic."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium (USENIX Security'19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon , \u00c1lvaro Feal , Primal Wijesekera , Amit Elazari Bar On , Narseo VallinaRodriguez , and Serge Egelman . 2019 . 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system . In USENIX Security Symposium (USENIX Security'19) . Santa Clara, CA, USA. Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo VallinaRodriguez, and Serge Egelman. 2019. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system. In USENIX Security Symposium (USENIX Security'19). Santa Clara, CA, USA."},{"key":"e_1_3_2_1_44_1","unstructured":"Red Hat. 2022. Chapter 24. Creating a dummy interface. https:\/\/ access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/ 8\/html\/configuring_and_managing_networking\/creating-a-dummyinterface_configuring-and-managing-networking. Red Hat. 2022. Chapter 24. Creating a dummy interface. https:\/\/ access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/ 8\/html\/configuring_and_managing_networking\/creating-a-dummyinterface_configuring-and-managing-networking."},{"key":"e_1_3_2_1_45_1","unstructured":"RIP Tutorial. 2022. Turn on\/off Wifi. https:\/\/riptutorial.com\/android\/example\/ 5113\/turn-on-off-wifi. RIP Tutorial. 2022. Turn on\/off Wifi. https:\/\/riptutorial.com\/android\/example\/ 5113\/turn-on-off-wifi."},{"key":"e_1_3_2_1_46_1","unstructured":"Rootbeer. 2021. Rootbeer. https:\/\/github.com\/scottyab\/rootbeer. Rootbeer. 2021. Rootbeer. https:\/\/github.com\/scottyab\/rootbeer."},{"key":"e_1_3_2_1_47_1","unstructured":"RootCloak. 2016. RootCloak. https:\/\/github.com\/devadvance\/rootcloak. RootCloak. 2016. RootCloak. https:\/\/github.com\/devadvance\/rootcloak."},{"key":"e_1_3_2_1_48_1","unstructured":"Rootcloakplus. 2014. Rootcloakplus. https:\/\/github.com\/devadvance\/ rootcloakplus. Rootcloakplus. 2014. Rootcloakplus. https:\/\/github.com\/devadvance\/ rootcloakplus."},{"key":"e_1_3_2_1_49_1","volume-title":"IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation. BlackHat USA (July 31 -","author":"Rye Erik","year":"2021","unstructured":"Erik Rye and Rob Beverly . 2021. IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation. BlackHat USA (July 31 - Aug. 5, 2021 ). https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/#ipvseeyouexploiting-leaked-identifiers-in-ipv-for-street-level-geolocation-22889. Erik Rye and Rob Beverly. 2021. IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation. BlackHat USA (July 31 - Aug. 5, 2021). https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/#ipvseeyouexploiting-leaked-identifiers-in-ipv-for-street-level-geolocation-22889."},{"key":"e_1_3_2_1_50_1","unstructured":"Shadowsocks. 2022. shadowsocks. https:\/\/shadowsocks.org\/en\/index.html. Shadowsocks. 2022. shadowsocks. https:\/\/shadowsocks.org\/en\/index.html."},{"key":"e_1_3_2_1_51_1","unstructured":"Similarweb. 2022. similarweb. https:\/\/www.similarweb.com\/. Similarweb. 2022. similarweb. https:\/\/www.similarweb.com\/."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212506"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808126"},{"key":"e_1_3_2_1_54_1","unstructured":"Symantec. 2022. WebPulse Site Review Request - dt.beyla.site. https:\/\/sitereview. bluecoat.com\/#\/lookup-result\/dt.beyla.site. Symantec. 2022. WebPulse Site Review Request - dt.beyla.site. https:\/\/sitereview. bluecoat.com\/#\/lookup-result\/dt.beyla.site."},{"key":"e_1_3_2_1_55_1","unstructured":"Symbolics Cambridge Research Center. 1984. RFC0894: Standard for the transmission of IP datagrams over Ethernet networks. https:\/\/dl.acm.org\/doi\/pdf\/ 10.17487\/RFC0894. Symbolics Cambridge Research Center. 1984. RFC0894: Standard for the transmission of IP datagrams over Ethernet networks. https:\/\/dl.acm.org\/doi\/pdf\/ 10.17487\/RFC0894."},{"key":"e_1_3_2_1_56_1","unstructured":"Theiphonewik. 2015. xCon. https:\/\/www.theiphonewiki.com\/wiki\/XCon. Theiphonewik. 2015. xCon. https:\/\/www.theiphonewiki.com\/wiki\/XCon."},{"key":"e_1_3_2_1_57_1","unstructured":"Tldp.org. 1996. The dummy interface. https:\/\/tldp.org\/LDP\/nag\/node72.html. Tldp.org. 1996. The dummy interface. https:\/\/tldp.org\/LDP\/nag\/node72.html."},{"key":"e_1_3_2_1_58_1","unstructured":"UlionTse. 2021. translators. https:\/\/pypi.org\/project\/translators\/. UlionTse. 2021. translators. https:\/\/pypi.org\/project\/translators\/."},{"key":"e_1_3_2_1_59_1","unstructured":"Unity. 2022. Unity AdUnits. https:\/\/docs.unity.com\/monetization-dashboard\/ AdUnits.html. Unity. 2022. Unity AdUnits. https:\/\/docs.unity.com\/monetization-dashboard\/ AdUnits.html."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321408.3326665"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274726"},{"key":"e_1_3_2_1_62_1","unstructured":"Wikipedia. 2022. Decimal degrees. https:\/\/en.wikipedia.org\/wiki\/Decimal_ degrees. Wikipedia. 2022. Decimal degrees. https:\/\/en.wikipedia.org\/wiki\/Decimal_ degrees."},{"volume-title":"CIT\/IUCC\/DASC\/PICOM'15.","author":"Xu Junfeng","key":"e_1_3_2_1_63_1","unstructured":"Junfeng Xu , Li Zhang , Yunchuan Sun , Dong Lin , and Ye Mao . 2015. Toward a secure android software protection system . In CIT\/IUCC\/DASC\/PICOM'15. Liverpool, UK . Junfeng Xu, Li Zhang, Yunchuan Sun, Dong Lin, and Ye Mao. 2015. Toward a secure android software protection system. In CIT\/IUCC\/DASC\/PICOM'15. Liverpool, UK."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T12:20:38Z","timestamp":1699359638000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560665"}},"subtitle":["Exploring Encrypted Channels in Android Apps"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":65,"alternative-id":["10.1145\/3548606.3560665","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560665","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}