{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:48:48Z","timestamp":1757540928125},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/isncc.2017.8072022","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:19:48Z","timestamp":1508944788000},"source":"Crossref","is-referenced-by-count":4,"title":["A look into the information your smartphone leaks"],"prefix":"10.1109","author":[{"given":"Timothy A.","family":"Chadza","sequence":"first","affiliation":[]},{"given":"Francisco J.","family":"Aparicio-Navarro","sequence":"additional","affiliation":[]},{"given":"Konstantinos G.","family":"Kyriakopoulos","sequence":"additional","affiliation":[]},{"given":"Jonathon A.","family":"Chambers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"cortesi","year":"0","journal-title":"Mitmproxy Project"},{"key":"ref11","author":"malinen","year":"0","journal-title":"Hostapd IEEE 802 11 AP IEEE 802 1X\/WPA\/WPA2\/EAP\/ RADIOUS Authenticator"},{"key":"ref12","year":"0","journal-title":"Airbase-ng description"},{"key":"ref13","author":"kennedy","year":"0","journal-title":"A database of open-source HTTP proxies"},{"key":"ref14","first-page":"1","article-title":"Network stream debugging with Mallory","author":"allen","year":"2010","journal-title":"Intrepidus Group technical report"},{"key":"ref15","author":"chadza","year":"2016","journal-title":"How much private information is your phone leaking?"},{"key":"ref16","author":"hipp","year":"0","journal-title":"DB browser for SQLite"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref3","first-page":"30","article-title":"Mobilitics: Analyzing privacy leaks in smartphones","author":"achara","year":"2013","journal-title":"ERCIM News"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.72"},{"key":"ref8","first-page":"1","article-title":"MobileAppScrutinator: A simple yet efficient dynamic analysis approach for detecting privacy leaks across mobile OSs","author":"achara","year":"2016","journal-title":"Proc of the 32nd Annual Computer Security Applications Conference (ACSAC)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.123"},{"key":"ref2","first-page":"177","article-title":"PiOS: Detecting privacy leaks in iOS applications","author":"egele","year":"2011","journal-title":"Proc of the Network and Distributed System Security Symposium (NDSS)"},{"key":"ref1","author":"dogtiev","year":"0","journal-title":"Top 10 most popular iOS apps of all time"},{"key":"ref9","author":"bitbucket","year":"0","journal-title":"Mallory Wiki home page"}],"event":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Marrakech, Morocco","start":{"date-parts":[[2017,5,16]]},"end":{"date-parts":[[2017,5,18]]}},"container-title":["2017 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8054594\/8071973\/08072022.pdf?arnumber=8072022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T16:04:59Z","timestamp":1512057899000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8072022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isncc.2017.8072022","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}