{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:49:41Z","timestamp":1743104981720,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030372309"},{"type":"electronic","value":"9783030372316"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37231-6_3","type":"book-chapter","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T01:02:43Z","timestamp":1575939763000},"page":"47-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Application Transiency: Towards a Fair Trade of Personal Information for Application Services"],"prefix":"10.1007","author":[{"given":"Raquel","family":"Alvarez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jake","family":"Levenson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryan","family":"Sheatsley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,12,11]]},"reference":[{"key":"3_CR1","volume-title":"Android Security Internals","author":"N Elenkov","year":"2015","unstructured":"Elenkov, N.: Android Security Internals. No Starch Press, San Francisco (2015)"},{"key":"3_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974","volume-title":"Information Security Principles and Practice","author":"M Stamp","year":"2011","unstructured":"Stamp, M.: Information Security Principles and Practice. Wiley, Hoboken (2011)"},{"key":"3_CR3","doi-asserted-by":"publisher","DOI":"10.2200\/S00126ED1V01Y200808SPT001","volume-title":"Operating System Security","author":"T Jaeger","year":"2008","unstructured":"Jaeger, T.: Operating System Security. Morgan & Claypool Publishers, San Rafael (2008)"},{"key":"3_CR4","unstructured":"Nissenbaum, H.: Privacy as Contextual Integrity. Washington Law Review (2004)"},{"key":"3_CR5","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realt ime privacy monitoring on smartphones. In: OSDI (2010)"},{"key":"3_CR6","unstructured":"Pham, A., et al.: PrivateRide: a privacy-enhanced ride-hailing service. In: Proceedings of the 17th Privacy Enhancing Technologies Symposium (2018)"},{"key":"3_CR7","unstructured":"Petracca, G., et al.: AWare: preventing abuse of privacy-sensitive sensors via operation bindings. In: Proceedings of the 26th USENIX Security Symposium. USENIX Security (2017)"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"66","DOI":"10.2478\/popets-2019-0020","volume":"2019","author":"Sashank Narain","year":"2019","unstructured":"Narain, S., Noubir, G.: Mitigating location privacy attacks on mobile devices using dynamic app sandboxing. In: Procededings of the 19th Privacy Enhancing Technologies Symposium (PETS) (2019)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-21599-5_7","volume-title":"Trust and Trustworthy Computing","author":"Y Zhou","year":"2011","unstructured":"Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93\u2013107. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21599-5_7"},{"key":"3_CR10","unstructured":"Tsai, L., et al.: Turtle guard: helping Android users apply contextual privacy preferences. In: Proceedings of the 26th USENIX Security Symposium (2017)"},{"key":"3_CR11","unstructured":"Liu, B., et al.: Follow my recommendations: a personalized privacy assistant for mobile app permissions (2016)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetheral, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting Android to protect data from imperious applications. In: CCS (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Wijesekera, P., et al.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences. In: NDSS (2017)","DOI":"10.1109\/SP.2017.51"},{"key":"3_CR14","unstructured":"Votipka, D., Rabin, S.M., Micinski, K., Gilray, T., Mazurek, M.M., Foster, J.S.: User comfort with Android background resource accesses in different contexts. In: Proceedings of the 14th Symposium on Usable Privacy and Security (2018)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-39498-0_10","volume-title":"The Economics of Information Security and Privacy","author":"S Egelman","year":"2013","unstructured":"Egelman, S., Felt, A.P., Wagner, D.: Choice architecture and smartphone privacy: there\u2019s a price for that. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 211\u2013236. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39498-0_10"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: 2nd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS) (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"3_CR18","unstructured":"Bonn\u00e9, B., Peddinti, S.T., Bilogrevic, I., Taft, N.: Exploring decision making with Android\u2019s runtime permission dialogs using in-context surveys. In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"3_CR19","unstructured":"Pu, Y., Grossklags, J.: Valuating friends\u2019 privacy: does anonymity of sharing personal data matter? In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"3_CR20","unstructured":"Tsai, J., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study. In: 6th Workshop on the Economics of Information Security (2007)"},{"key":"3_CR21","unstructured":"Samat, S., Acquisti, A.: Format vs. content: the impact of risk and presentation on disclosure decisions. In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"3_CR22","unstructured":"Rao, A., Schaub, F., Sadeh, N., Acquisti, A., Kang, R.: Expecting the unexpected: understanding mismatched privacy expectations online. In: Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS) (2016)"},{"issue":"4","key":"3_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1515\/popets-2018-0029","volume":"2018","author":"Maggie Oates","year":"2018","unstructured":"Oates, M., et al.: Turtles, locks, and bathrooms: understanding mental models of privacy through illustration. In: Proceedings of the 18th Privacy Enhancing Technologies Symposium (PETS) (2018)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1515\/popets-2017-0041","volume":"2017","author":"Qatrunnada Ismail","year":"2017","unstructured":"Ismail, Q., Ahmed, T., Caine, K., Kapadia, A., Reiter, M.: To permit or not to permit, that is the usability question: crowdsourcing mobile apps\u2019 privacy permission settings. In: Proceedings of the 18th Privacy Enhancing Technologies Symposium (PETS) (2017)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"3_CR25","unstructured":"Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., Beznosov, K.: Android permissions remystified: a field study on contextual integrity. In: Proceedings of the 24th USENIX Security Symposium (2015)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions dymistified. In: CCS (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., et al.: The spyware used in intimate partner violence. In: IEEE Symposium on Security and Privacy (2018)","DOI":"10.1109\/SP.2018.00061"},{"key":"3_CR28","unstructured":"Bowers, J., Reaves, B., Sherman, I.N., Traynor, P., Butler, K.: Regulators, mount up! analysis of privacy policies for mobile money services. In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"issue":"1","key":"3_CR29","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1515\/popets-2018-0005","volume":"2018","author":"Anupam Das","year":"2018","unstructured":"Das, A., Borisov, N., Chou, E.: Every move you make: exploring practical issues in smartphone motion sensor fingerprinting and countermeasures. In: Proceedings of the 18th Privacy Enhancing Technologies Symposium (PETS) (2018)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"3","key":"3_CR30","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1515\/popets-2018-0021","volume":"2018","author":"Irwin Reyes","year":"2018","unstructured":"Reyes, I., et al.: Won\u2019t somebody think of the children? examining COPPA compliance at scale. In: Proceedings of the 18th Privacy Enhancing Technologies Symposium (2018)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"1","key":"3_CR31","doi-asserted-by":"publisher","first-page":"227","DOI":"10.2478\/popets-2019-0013","volume":"2019","author":"Giridhari Venkatadri","year":"2019","unstructured":"Venkatadri, G., Lucherini, E., Sapiezynski, P., Mislove, A.: Investigating sources of PII used in Facebook\u2019s targeted advertising. In: Proceedings of the 19th Privacy Enhancing Technologies Symposium (2019)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Foppe, L., Martin, J., Mayberry, T., Rye, E.C., Brown, L.: Exploiting TLS client authentication for widespread user tracking (2018)","DOI":"10.1515\/popets-2018-0031"},{"issue":"4","key":"3_CR33","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1515\/popets-2018-0033","volume":"2018","author":"Muhammad Ahmad Bashir","year":"2018","unstructured":"Bashir, M.A., Wilson, C.: Diffusion of user tracking data in the online advertising ecosystem. In: Proceedings of the 18th Privacy Enhancing Technologies Symposium (2018)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"4","key":"3_CR34","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1515\/popets-2018-0036","volume":"2018","author":"Pavel Lifshits","year":"2018","unstructured":"Lifshits, P., et al.: Power to peep-all: inference attacks by malicious batteries on mobile devices. In: Proceedings of the 18th Privacy Enhancing Technologies Symposium (2018)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"1","key":"3_CR35","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1515\/popets-2017-0008","volume":"2017","author":"Mojtaba Eskandari","year":"2017","unstructured":"Eskandari, M., Ahmad, M., Oliveira, A.S., Crispo, B.: Analyzing remote server locations for personal data transfers in mobile apps. In: Proceedings of the 17th Privacy Enhancing Technologies Symposium (2017)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"2","key":"3_CR36","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1515\/popets-2017-0020","volume":"2017","author":"Justin Brookman","year":"2017","unstructured":"Brookman, J., Rouge, P., Alva, A., Yeung, C.: Cross-device tracking: measurement and disclosures. In: Proceedings of the 17th Privacy Enhancing Technologies Symposium (2017)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"3_CR37","unstructured":"Zhou, X., et al.: Identity, location. inferring your secrets from Android public resources. In: CCS, Disease and More (2013)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Park, H., Eun, J., Lee, J.: Why do smartphone users hesitate to delete unused apps? In: MobileHCI (2018)","DOI":"10.1145\/3236112.3236137"},{"key":"3_CR39","unstructured":"Senate: Testimony of Mark Zuckerberg. \nhttps:\/\/www.judiciary.senate.gov\/imo\/media\/doc\/04-10-18%20Zuckerberg%20Testimony.pdf\n\n. Accessed Feb 2019"},{"key":"3_CR40","unstructured":"https:\/\/ipdata.co\/\n\n . Accessed Feb 2019"},{"key":"3_CR41","unstructured":"Statista: Distribution of free and paid Android apps (2019). \nhttps:\/\/www.statista.com\/statistics\/266211\/distribution-of-free-and-paid-android-apps\/"},{"key":"3_CR42","unstructured":"Statista: Number of Available Applications in the Google Play Store (2019). \nhttps:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/"},{"key":"3_CR43","unstructured":"Statista: Number of Paying Spotify Subscribers. \nhttps:\/\/www.statista.com\/statistics\/244995\/number-of-paying-spotify-subscribers\/"},{"key":"3_CR44","unstructured":"Google (2019). \nhttps:\/\/developer.android.com\/"},{"key":"3_CR45","unstructured":"Google (2019). \nhttps:\/\/developer.android.com\/guide\/components\/fundamentals"},{"key":"3_CR46","unstructured":"Google (2019). \nhttps:\/\/source.android.com\/"},{"key":"3_CR47","unstructured":"Google: Codelabs (2019). \nhttps:\/\/codelabs.developers.google.com\/"},{"key":"3_CR48","unstructured":"Google: Android Open Source Code (2019). \nhttps:\/\/source.android.com\/"},{"key":"3_CR49","unstructured":"Google: Activity Recognition API (2019). \nhttps:\/\/developers.google.com\/location-context\/activity-recognition\/"},{"key":"3_CR50","unstructured":"IPData.co (2019). \nhttps:\/\/ipdata.co\/"},{"key":"3_CR51","unstructured":"Google: Google Answers. \nhttps:\/\/support.google.com\/android\/answer\/9079646?hl=en\n\n. Accessed Feb 2019"},{"key":"3_CR52","unstructured":"Google: The Recents UI (2019). \nhttps:\/\/developer.android.com\/guide\/components\/activities\/recents"},{"key":"3_CR53","unstructured":"Google: Work Manager API (2019). \nhttps:\/\/developer.android.com\/reference\/androidx\/work\/WorkManager"},{"key":"3_CR54","unstructured":"Google: Android 9.0 Behavior Changes (2019). \nhttps:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37231-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T18:04:10Z","timestamp":1577124250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37231-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372309","9783030372316"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37231-6_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}