{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:45Z","timestamp":1772164065783,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T00:00:00Z","timestamp":1402876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-1162447, CNS-1018355, CNS-0905246, CCF-1162021"],"award-info":[{"award-number":["CNS-1162447, CNS-1018355, CNS-0905246, CCF-1162021"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1162447, CNS-1018355, CNS-0905246, CCF-1162021"],"award-info":[{"award-number":["CNS-1162447, CNS-1018355, CNS-0905246, CCF-1162021"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,16]]},"DOI":"10.1145\/2591971.2592003","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T08:50:25Z","timestamp":1402390225000},"page":"221-233","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":183,"title":["A measurement study of google play"],"prefix":"10.1145","author":[{"given":"Nicolas","family":"Viennot","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Edward","family":"Garcia","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"May","author":"Services Amazon Web","year":"2010","unstructured":"Amazon Web Services . IAM Best Practices , May 2010 . http:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/IAMBestPractices.html. Amazon Web Services. IAM Best Practices, May 2010. http:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/IAMBestPractices.html."},{"key":"e_1_3_2_1_2_1","volume-title":"AWS Security Token Service","author":"Services Amazon Web","year":"2011","unstructured":"Amazon Web Services . Creating Temporary Security Credentials for Mobile Apps Using Identity Providers . AWS Security Token Service , June 2011 . http:\/\/docs. aws.amazon.com\/STS\/latest\/UsingSTS\/CreatingWIF.html. Amazon Web Services. Creating Temporary Security Credentials for Mobile Apps Using Identity Providers. AWS Security Token Service, June 2011. http:\/\/docs. aws.amazon.com\/STS\/latest\/UsingSTS\/CreatingWIF.html."},{"key":"e_1_3_2_1_3_1","volume-title":"AWS Identity and Access Management","author":"Services Amazon Web","year":"2013","unstructured":"Amazon Web Services . Authenticating Users of AWS Mobile Applications with a Token Vending Machine . AWS Identity and Access Management , July 2013 . http:\/\/aws.amazon.com\/articles\/4611615499399490. Amazon Web Services. Authenticating Users of AWS Mobile Applications with a Token Vending Machine. AWS Identity and Access Management, July 2013. http:\/\/aws.amazon.com\/articles\/4611615499399490."},{"key":"e_1_3_2_1_4_1","volume-title":"AWS SDK for Android","author":"Services Amazon Web","year":"2013","unstructured":"Amazon Web Services . Getting Started with the AWS SDK for Android . AWS SDK for Android , Sept. 2013 . http:\/\/docs.aws.amazon.com\/mobile\/sdkforandroid\/gsg\/Welcome.html. Amazon Web Services. Getting Started with the AWS SDK for Android. AWS SDK for Android, Sept. 2013. http:\/\/docs.aws.amazon.com\/mobile\/sdkforandroid\/gsg\/Welcome.html."},{"key":"e_1_3_2_1_5_1","unstructured":"AndroLib. http:\/\/www.androlib.com.  AndroLib. http:\/\/www.androlib.com."},{"key":"e_1_3_2_1_6_1","unstructured":"AppBrain. http:\/\/www.appbrain.com.  AppBrain. http:\/\/www.appbrain.com."},{"key":"e_1_3_2_1_7_1","volume-title":"Mar.","author":"Bala R.","year":"2014","unstructured":"R. Bala . Amazon Is Downloading Apps From Google Play and Inspecting Them. Y Combinator Hacker News , Mar. 2014 . https:\/\/news.ycombinator.com\/item?id=7491272. R. Bala. Amazon Is Downloading Apps From Google Play and Inspecting Them. Y Combinator Hacker News, Mar. 2014. https:\/\/news.ycombinator.com\/item?id=7491272."},{"key":"e_1_3_2_1_8_1","unstructured":"Capistrano. http:\/\/capistranorb.com.  Capistrano. http:\/\/capistranorb.com."},{"key":"e_1_3_2_1_9_1","unstructured":"Chef. http:\/\/www.getchef.com.  Chef. http:\/\/www.getchef.com."},{"key":"e_1_3_2_1_10_1","volume-title":"Says Dev. The Register","author":"Chirgwin R.","year":"2014","unstructured":"R. Chirgwin . Amazon Is Decompiling Our Apps in Security Gaff Hunt , Says Dev. The Register , Mar. 2014 . http:\/\/www.theregister.co.uk\/2014\/03\/31\/dev_lashes_out_at_amazon_for_decompiling_his_app. R. Chirgwin. Amazon Is Decompiling Our Apps in Security Gaff Hunt, Says Dev. The Register, Mar. 2014. http:\/\/www.theregister.co.uk\/2014\/03\/31\/dev_lashes_out_at_amazon_for_decompiling_his_app."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_14_1","unstructured":"Death by Captcha. http:\/\/www.deathbycaptcha.com.  Death by Captcha. http:\/\/www.deathbycaptcha.com."},{"key":"e_1_3_2_1_15_1","unstructured":"A. Desnos. Androguard. https:\/\/code.google.com\/p\/androguard.  A. Desnos. Androguard. https:\/\/code.google.com\/p\/androguard."},{"key":"e_1_3_2_1_16_1","unstructured":"dex2jar. http:\/\/code.google.com\/p\/dex2jar.  dex2jar. http:\/\/code.google.com\/p\/dex2jar."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396756.2396759"},{"key":"e_1_3_2_1_18_1","unstructured":"Elasticsearch. http:\/\/www.elasticsearch.org.  Elasticsearch. http:\/\/www.elasticsearch.org."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_20_1","unstructured":"Facebook. Login Security. https:\/\/developers.facebook.com\/docs\/facebook-login\/security.  Facebook. Login Security. https:\/\/developers.facebook.com\/docs\/facebook-login\/security."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_23_1","unstructured":"E. Girault. Google Play Unofficial Python API. https:\/\/github.com\/egirault\/googleplay-api.  E. Girault. Google Play Unofficial Python API. https:\/\/github.com\/egirault\/googleplay-api."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_25_1","unstructured":"B. Gruver. smali\/baksmali assembler\/disassembler. https:\/\/code.google.com\/p\/smali.  B. Gruver. smali\/baksmali assembler\/disassembler. https:\/\/code.google.com\/p\/smali."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_27_1","volume-title":"Apr.","author":"Kotadia M.","year":"2014","unstructured":"M. Kotadia . AWS Admits Scanning Android App in Secret Key Hunt. iTnews , Apr. 2014 . http:\/\/www.itnews.com.au\/News\/381432, aws-admits-scanning-android-app-in-secret-key-hunt. aspx. M. Kotadia. AWS Admits Scanning Android App in Secret Key Hunt. iTnews, Apr. 2014. http:\/\/www.itnews.com.au\/News\/381432, aws-admits-scanning-android-app-in-secret-key-hunt. aspx."},{"key":"e_1_3_2_1_28_1","unstructured":"MixRank. http:\/\/www.mixrank.com.  MixRank. http:\/\/www.mixrank.com."},{"key":"e_1_3_2_1_29_1","unstructured":"R. Mogull. My $500 Cloud Security Screwup-UPDATED. Securosis Blog Jan. 2014. https:\/\/securosis.com\/blog\/my-500-cloud-security-screwup.  R. Mogull. My $500 Cloud Security Screwup-UPDATED. Securosis Blog Jan. 2014. https:\/\/securosis.com\/blog\/my-500-cloud-security-screwup."},{"key":"e_1_3_2_1_30_1","unstructured":"M. Perham. Sidekiq. http:\/\/sidekiq.org.  M. Perham. Sidekiq. http:\/\/sidekiq.org."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_32_1","unstructured":"S. Sanflippo. Redis. http:\/\/redis.io.  S. Sanflippo. Redis. http:\/\/redis.io."},{"key":"e_1_3_2_1_33_1","unstructured":"A. Thiel. Android-market-api. https:\/\/code.google.com\/p\/android-market-api.  A. Thiel. Android-market-api. https:\/\/code.google.com\/p\/android-market-api."},{"key":"e_1_3_2_1_34_1","unstructured":"C. Tumbleson. Android-apktool. http:\/\/code.google.com\/p\/android-apktool.  C. Tumbleson. Android-apktool. http:\/\/code.google.com\/p\/android-apktool."},{"key":"e_1_3_2_1_35_1","unstructured":"Twitter. Implementing the Twitter OAuth flow in Android. https:\/\/dev.twitter.com\/docs\/implementing-twitter-oauth-flow-android.  Twitter. Implementing the Twitter OAuth flow in Android. https:\/\/dev.twitter.com\/docs\/implementing-twitter-oauth-flow-android."},{"key":"e_1_3_2_1_36_1","unstructured":"N. Viennot. Java Library for JD-Core. https:\/\/github.com\/nviennot\/jd-core-java.  N. Viennot. Java Library for JD-Core. https:\/\/github.com\/nviennot\/jd-core-java."},{"key":"e_1_3_2_1_37_1","unstructured":"N. Viennot. PlayDrone sources. https:\/\/github.com\/nviennot\/google-play-crawler.  N. Viennot. PlayDrone sources. https:\/\/github.com\/nviennot\/google-play-crawler."},{"key":"e_1_3_2_1_38_1","volume-title":"Mashable","author":"Warren C.","year":"2013","unstructured":"C. Warren . Google Play Hits 1 Million Apps . Mashable , July 2013 . http:\/\/mashable.com\/2013\/07\/24\/google-play-1-million. C. Warren. Google Play Hits 1 Million Apps. Mashable, July 2013. http:\/\/mashable.com\/2013\/07\/24\/google-play-1-million."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384634"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_43_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012)","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012) , Feb. 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012), Feb. 2012."}],"event":{"name":"SIGMETRICS '14: ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems","location":"Austin Texas USA","acronym":"SIGMETRICS '14","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["The 2014 ACM international conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591971.2592003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591971.2592003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:55:58Z","timestamp":1750215358000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591971.2592003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,16]]},"references-count":43,"alternative-id":["10.1145\/2591971.2592003","10.1145\/2591971"],"URL":"https:\/\/doi.org\/10.1145\/2591971.2592003","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2637364.2592003","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,6,16]]},"assertion":[{"value":"2014-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}