{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:21:01Z","timestamp":1743157261833,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031542039"},{"type":"electronic","value":"9783031542046"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54204-6_13","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:02:53Z","timestamp":1709233373000},"page":"232-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Try On, Spied On?: Privacy Analysis of\u00a0Virtual Try-On Websites and\u00a0Android Apps"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8583-0618","authenticated-orcid":false,"given":"Abdelrahman","family":"Ragab","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9630-5858","authenticated-orcid":false,"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"key":"13_CR1","unstructured":"Cantwell, K.: Zlib: a command-line utility for quickly compressing or decompressing zlib data. https:\/\/github.com\/kevin-cantwell\/zlib"},{"key":"13_CR2","unstructured":"Cdimascio: py-readability-metrics. https:\/\/github.com\/cdimascio\/py-readability-metrics\/tree\/master#flesch-kincaid-grade-level"},{"key":"13_CR3","unstructured":"Davis, J.: How 5G will change retail (2021). https:\/\/www.insiderintelligence.com\/content\/how-5g-will-change-retail"},{"key":"13_CR4","unstructured":"EasyList: Easylist. https:\/\/easylist.to\/"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016. ACM, New York, NY, USA, (2016)","DOI":"10.1145\/2976749.2978313"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1080\/15252019.2018.1521317","volume":"19","author":"Y Feng","year":"2019","unstructured":"Feng, Y., Xie, Q.: Privacy concerns, perceived intrusiveness, and privacy controls: an analysis of virtual try-on apps. J. Interact. Advertising 19(1), 43\u201357 (2019)","journal-title":"J. Interact. Advertising"},{"key":"13_CR7","unstructured":"Frida: Frida. https:\/\/github.com\/frida\/frida"},{"key":"13_CR8","unstructured":"Householder, A., Wassermann, G., Manion, A., King, C.: CERT\u00ae guide to coordinated vulnerability disclosure (2020). https:\/\/resources.sei.cmu.edu\/asset_files\/specialreport\/2017_003_001_503340.pdf"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1080\/17543266.2022.2125589","volume":"16","author":"A Ivanov","year":"2023","unstructured":"Ivanov, A., Mou, Y., Tawira, L.: Avatar personalisation vs. privacy in a virtual try-on app for apparel shopping. Int. J. Fashion Des. Technol. Educ. 16(1), 100\u2013109 (2023)","journal-title":"Int. J. Fashion Des. Technol. Educ."},{"key":"13_CR10","unstructured":"Kaspersky: What is facial recognition - definition and explanation. https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-facial-recognition"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: 2018 IEEE Symposium on Security and Privacy. IEEE (2018)","DOI":"10.1109\/SP.2018.00051"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Liebers, J., Horn, P., Burschik, C., Gruenefeld, U., Schneegass, S.: Using gaze behavior and head orientation for implicit identification in virtual reality. In: Proceedings of the 27th ACM Symposium on Virtual Reality Software and Technology, New York, NY, USA (2021)","DOI":"10.1145\/3489849.3489880"},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"17404","DOI":"10.1038\/s41598-020-74486-y","volume":"10","author":"MR Miller","year":"2020","unstructured":"Miller, M.R., Herrera, F., Jun, H., Landay, J.A., Bailenson, J.N.: Personal identifiability of user tracking data during observation of 360-degree VR video. Sci. Rep. 10(1), 17404 (2020)","journal-title":"Sci. Rep."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., Ross, A.: Soft biometric privacy: retaining biometric utility of face images while perturbing gender. In: 2017 IEEE IJCB, Denver, CO, USA (2017)","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"13_CR15","unstructured":"OnlineJPGTools: Convert base64 to jpeg. https:\/\/onlinejpgtools.com\/convert-base64-to-jpg"},{"key":"13_CR16","unstructured":"OnlinePNGTools: Convert base64 to png. https:\/\/onlinepngtools.com\/convert-base64-to-png"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Pagey, R., Mannan, M., Youssef, A.: All your shops are belong to us: security weaknesses in e-commerce platforms. In: Proceedings of the ACM Web Conference 2023, WWW 2023. ACM, New York, NY, USA (2023)","DOI":"10.1145\/3543507.3583319"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Pfeuffer, K., Geiger, M.J., Prange, S., Mecke, L., Buschek, D., Alt, F.: Behavioural biometrics in VR: identifying people from body motion and relations in virtual reality. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, New York, NY, USA (2019)","DOI":"10.1145\/3290605.3300340"},{"issue":"4","key":"13_CR19","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/2580723.2580730","volume":"57","author":"F Roesner","year":"2014","unstructured":"Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88\u201396 (2014)","journal-title":"Commun. ACM"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"N. Samarasinghe, P. Kapoor, M. Mannan, and A. Youssef. No salvation from trackers: privacy analysis of religious websites and mobile apps. In: Garcia-Alfaro, J., Navarro-Arribas, G., Dragoni, N. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM CBT 2022 2022. Lecture Notes in Computer Science, vol. 13619. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-25734-6_10","DOI":"10.1007\/978-3-031-25734-6_10"},{"key":"13_CR21","unstructured":"Skylot: Jadx. https:\/\/github.com\/skylot\/jadx"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"100854","DOI":"10.1016\/j.elerap.2019.100854","volume":"35","author":"AR Smink","year":"2019","unstructured":"Smink, A.R., Frowijn, S., van Reijmersdal, E.A., van Noort, G., Neijens, P.C.: Try online before you buy: how does shopping with augmented reality affect brand responses and personal data disclosure. Electron. Commer. Res. Appl. 35, 100854 (2019)","journal-title":"Electron. Commer. Res. Appl."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Stephenson, S., Pal, B., Fan, S., Fernandes, E., Zhao, Y., Chatterjee, R.: SoK: authentication in augmented and virtual reality. In: 2022 IEEE Symposium on Security and Privacy. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"13_CR24","unstructured":"Technavio: Augmented reality and virtual reality market by technology, application, and geography - forecast and analysis 2023\u20132027 (2022). https:\/\/www.insiderintelligence.com\/content\/how-5g-will-change-retail"},{"key":"13_CR25","unstructured":"Trimananda, R., Le, H., Cui, H., Ho, J.T., Shuba, A., Markopoul, A.: OVRseen: auditing network traffic and privacy policies in Oculus VR. In: 31st USENIX (2022)"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1108\/IntR-12-2017-0540","volume":"29","author":"T Zhang","year":"2019","unstructured":"Zhang, T., Wang, W.Y.C., Cao, L., Wang, Y.: The role of virtual try-on technology in online purchase decision from consumers\u2019 aspect. Internet Res. 29, 529\u2013551 (2019)","journal-title":"Internet Res."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54204-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:05:16Z","timestamp":1709233516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54204-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031542039","9783031542046"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54204-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}