{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:07:06Z","timestamp":1763579226390,"version":"3.45.0"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2024YFB3108901"],"award-info":[{"award-number":["2024YFB3108901"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372022","62002006","U2241213","U21B2021","62472015","62202027","61932014","62172025","61932011","61972019","61772538","32071775","91646203"],"award-info":[{"award-number":["62372022","62002006","U2241213","U21B2021","62472015","62202027","61932014","62172025","61932011","61972019","61772538","32071775","91646203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Defense Industrial Technology Development Program","award":["JCKY2021211B017"],"award-info":[{"award-number":["JCKY2021211B017"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2042022KF0021"],"award-info":[{"award-number":["2042022KF0021"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation","award":["L251040"],"award-info":[{"award-number":["L251040"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3607232","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:43:39Z","timestamp":1757353419000},"page":"10231-10245","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Security of One-Tap Authentication Services via Dynamic Application Identification"],"prefix":"10.1109","volume":"20","author":[{"given":"Di","family":"Liu","sequence":"first","affiliation":[{"name":"School of Criminal Investigation, People&#x2019;s Public Security University of China, Beijing, China"}]},{"given":"Dawei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Yuxiao","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Ying","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Ruinan","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2965-3518","authenticated-orcid":false,"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Song","family":"Bian","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Bras Basah, Singapore"}]},{"given":"Yizhong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Zhenyu","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"volume-title":"Mobile Authentication Remastered","year":"2024","key":"ref1"},{"volume-title":"Open Platform for Tianyi Digital Life Accounts","year":"2024","key":"ref2"},{"volume-title":"Access Password-Free Authentication for Xiaomi Miui9","year":"2024","key":"ref3"},{"volume-title":"Mobile Connect: Mobile High-Security Authentication","year":"2025","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3304840"},{"volume-title":"Mobile Connect","year":"2024","key":"ref6"},{"volume-title":"One-Tap Login Capability","year":"2020","author":"Mobile","key":"ref7"},{"volume-title":"Open Platform for Tianyi Accounts","year":"2024","author":"Telecom","key":"ref8"},{"volume-title":"Passwords Are a Thing of the Past","year":"2025","key":"ref9"},{"volume-title":"Turkcell\u2019s Fast Login Solution Brings Global Success","year":"2018","key":"ref10"},{"volume-title":"T-Authentication By Sk Telecom","year":"2017","author":"Conference","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00059"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-4430-9_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-09486-x"},{"volume-title":"National Computer Network Emergency Response Technical Team\/coordination Center of China","year":"2024","key":"ref15"},{"volume-title":"List of Mobile Network Operators","year":"2024","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24210"},{"key":"ref18","first-page":"1579","article-title":"FOAP: Fine-grained open-world Android app fingerprinting","volume-title":"Proc. USENIX Secur. Symp.","author":"Li"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"ref21","first-page":"3511","article-title":"Eavesdropping mobile app activity via radio-frequency energy harvesting","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Ni"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103481"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/978-3-642-39235-1_9","article-title":"SMS-based one-time passwords: Attacks and defense: (Short paper)","volume-title":"Detection Intrusions Malware, Vulnerability Assessment","author":"Mulliner","year":"2013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997246"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24212"},{"key":"ref26","first-page":"61","article-title":"An empirical study of wireless carrier authentication for SIM swaps","volume-title":"Proc. Symp. Usable Priv. Secur.","author":"Lee"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2956035"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.134"},{"volume-title":"Trojan: Android\/Crusewind","year":"2024","key":"ref30"},{"volume-title":"Keep Calm and Send Telegrams!","year":"2016","key":"ref31"},{"volume-title":"Watch As Hackers Hijack Whatsapp Accounts Via Critical Telecoms Flaws","year":"2016","author":"Brewster","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179322"},{"volume-title":"Accessible Digital Payments for Everyone","year":"2024","key":"ref37"},{"volume-title":"China Mobile\u2019s Open Platform for Internet Capabilities","year":"2024","author":"Mobile","key":"ref38"},{"volume-title":"FastLogin SDK","year":"2021","key":"ref39"},{"volume-title":"FastLogin-Android SDK","year":"2020","key":"ref40"},{"volume-title":"3GPP System Architecture Evolution (SAE); Security Architecture","year":"2022","key":"ref41"},{"volume-title":"Technical Specification Group Services and System Aspects; Security Architecture and Procedures for 5G System","year":"2022","key":"ref42"},{"key":"ref43","first-page":"3595","article-title":"Privacy-preserving and standard-compatible AKA protocol for 5G","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Wang"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134615"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.7"},{"volume-title":"Sign Your App","year":"2024","author":"Developers","key":"ref46"},{"volume-title":"Overview of the Play Integrity API","year":"2025","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/app10093211"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2834830"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243796"},{"volume-title":"Rand_bytes","year":"2024","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24093"},{"volume-title":"Gldrawarrays","year":"2024","key":"ref55"},{"volume-title":"Glclientwaitsync","year":"2024","key":"ref56"},{"volume-title":"Thinkpad X13 Gen 4 (13 Intel)","year":"2024","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053031"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0261291"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-008-0120-3"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2013.12.010"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24298"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698978"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11153551.pdf?arnumber=11153551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:44:41Z","timestamp":1763577881000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11153551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3607232","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}