{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:10:13Z","timestamp":1766733013555},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/infocom.2015.7218526","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T21:33:36Z","timestamp":1440452016000},"source":"Crossref","is-referenced-by-count":49,"title":["Automatic generation of mobile app signatures from traffic observations"],"prefix":"10.1109","author":[{"given":"Qiang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Stanislav","family":"Miskovic","sequence":"additional","affiliation":[]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Baldi","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Nucci","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Andrews","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"APK Downloader","year":"0"},{"key":"ref31","article-title":"MobiPerf","year":"0"},{"key":"ref30","article-title":"LiveLab: Measuring Wireless Networks and Smartphone Users in the Field","author":"shepard","year":"2011","journal-title":"Workshop on Hot Topics in Measurement & Modeling of Computer Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348563"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000026"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref13","article-title":"Netsense","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068847"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"ref16","article-title":"App Engagement: The Matrix Reloaded","year":"0"},{"key":"ref17","article-title":"Uniform Resource Identifier (URI): Generic Syntax","author":"berners-lee","year":"2005","journal-title":"Internet Engineering Task Force"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36516-4_7","article-title":"Understanding mobile app usage patterns using in-app advertisements","author":"tongaonkar","year":"2013","journal-title":"Passive and Active Measurement"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860034"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2010.5640939"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879176"},{"key":"ref6","article-title":"Automatic Network Protocol Analysis","author":"wondracek","year":"2008","journal-title":"Proc ISOC NDSS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070575"},{"key":"ref5","article-title":"Discoverer: Automatic Protocol Reverse Engineering from Network Traces","author":"cui","year":"2007","journal-title":"Proc Usenix Security"},{"key":"ref8","article-title":"Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation","author":"brumley","year":"2007","journal-title":"Proc Usenix Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177096"},{"key":"ref2","article-title":"Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis","author":"caballero","year":"2007","journal-title":"Proc ACM CCS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"ref1","article-title":"Mobile Apps Put the Web in Their Rear-view Mirror","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644926"},{"key":"ref22","article-title":"PowerTutor","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref24","article-title":"APP Profiles","year":"0"},{"key":"ref23","article-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones","author":"enck","year":"2010","journal-title":"Proc USENIX OSDI"},{"key":"ref26","article-title":"Privacy Leakage vs. Protection Measures: the Growing Disconnect","author":"krishnamurthy","year":"2011","journal-title":"IEEE Web 2 0 Security and Privacy Workshop"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-12334-4_17","article-title":"A First Look at Mobile Hand-Held Device Traffic","author":"maier","year":"2010","journal-title":"Proceedings of Passive and Active Measurement Conference (PAM)"}],"event":{"name":"IEEE INFOCOM 2015 - IEEE Conference on Computer Communications","location":"Kowloon, Hong Kong","start":{"date-parts":[[2015,4,26]]},"end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 IEEE Conference on Computer Communications (INFOCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172813\/7218353\/07218526.pdf?arnumber=7218526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:12:49Z","timestamp":1498241569000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7218526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/infocom.2015.7218526","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}