{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:55Z","timestamp":1730209915052,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/comsnets.2017.7945362","type":"proceedings-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T16:44:12Z","timestamp":1497285852000},"page":"87-94","source":"Crossref","is-referenced-by-count":3,"title":["Spying on Android users through targeted ads"],"prefix":"10.1109","author":[{"given":"Eeva","family":"Terkki","sequence":"first","affiliation":[]},{"given":"Ashwin","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Protecting against unintentional regressions to cleartext traffic in your Android apps","author":"klyubin","year":"2016","journal-title":"Google Security Blog"},{"key":"ref30","article-title":"What's New in Security?","author":"ballard","year":"2016","journal-title":"Apple WWDC16 Session 706"},{"journal-title":"InMobi &#x2014; Mobile Discovery Commerce &#x2014; Monetization &#x2014; Advertising","year":"0","key":"ref10"},{"journal-title":"Mobile advertising and app monetization platform","year":"0","key":"ref11"},{"key":"ref12","article-title":"Longitudinal Analysis of Android Ad Library Permissions","volume":"abs 1303 857","author":"book","year":"2013","journal-title":"CoRR"},{"key":"ref13","article-title":"An Empirical Study of Mobile Ad Targeting","volume":"abs 1502 6577","author":"book","year":"2015","journal-title":"CoRR"},{"journal-title":"Genymotion&#x2013;Fast And Easy Android Emulation","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_1"},{"journal-title":"Targeting &#x2014; AdMob for Android &#x2014; Google Developers","year":"0","key":"ref16"},{"journal-title":"Android Integration&#x2013;Yahoo Developer Network","year":"0","key":"ref17"},{"journal-title":"Inmobi support","year":"0","key":"ref18"},{"journal-title":"Getting Started&#x2013;Millennial Media Developers Integration Guide","year":"0","key":"ref19"},{"journal-title":"mitmproxy","year":"0","key":"ref28"},{"key":"ref4","article-title":"Investigating user privacy in android ad libraries","author":"stevens","year":"2012","journal-title":"Mobile Security Technologies Workshop (MoST)"},{"key":"ref27","article-title":"Meddle: Enabling Transparency and Control for Mobile Internet Traffic","author":"rao","year":"2015","journal-title":"SC Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565593"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"journal-title":"AppBrain","year":"0","key":"ref29"},{"key":"ref5","article-title":"PiOS: Detecting Privacy Leaks in iOS Applications","author":"egele","year":"2011","journal-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium ser NDSS '11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"journal-title":"Advertising ID&#x2013;Developer Console Help","year":"0","key":"ref7"},{"journal-title":"Flurry&#x2013;Yahoo Developer Network","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"journal-title":"Google AdMob&#x2013;Mobile App Monetization Analysis & Mediation","year":"0","key":"ref1"},{"key":"ref20","article-title":"Privad: Practical Privacy in Online Advertising","author":"guha","year":"2011","journal-title":"Proceedings of USENIX NSDI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"journal-title":"Reach Your Target Audience with Flurry Personas","year":"0","key":"ref21"},{"key":"ref24","article-title":"AdSplit: Separating Smart-phone Advertising from Applications","author":"shekhar","year":"2012","journal-title":"USENIX Security Symposium (USENIX Security)"},{"journal-title":"Inmobi Android SDK Required Permissions","year":"0","key":"ref23"},{"journal-title":"Haystack In situ mobile traffic analysis in user space","year":"2015","author":"razaghpanah","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849290"}],"event":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2017,1,4]]},"location":"Bengaluru, India","end":{"date-parts":[[2017,1,8]]}},"container-title":["2017 9th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938017\/7945334\/07945362.pdf?arnumber=7945362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:21:22Z","timestamp":1499818882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7945362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2017.7945362","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}