{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:41Z","timestamp":1763468201984,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,23]],"date-time":"2014-07-23T00:00:00Z","timestamp":1406073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,23]]},"DOI":"10.1145\/2627393.2627399","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"231-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Short paper"],"prefix":"10.1145","author":[{"given":"Jagdish Prasad","family":"Achara","sequence":"first","affiliation":[{"name":"Inria, Grenoble, France"}]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"University of Lyon, Lyon, France"}]},{"given":"Vincent","family":"Roca","sequence":"additional","affiliation":[{"name":"Inria, Grenoble, France"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia-Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2014,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"J. P. Achara M. Cunche V. Roca and A. Francillon. WifiLeaks: Underestimated Privacy Implications of the ACCESS WIFI STATE Android Permission. INRIA Research Report N\u00b08539 http:\/\/hal.inria.fr\/hal-00994926\/en May 2014.  J. P. Achara M. Cunche V. Roca and A. Francillon. WifiLeaks: Underestimated Privacy Implications of the ACCESS WIFI STATE Android Permission. INRIA Research Report N\u00b08539 http:\/\/hal.inria.fr\/hal-00994926\/en May 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"Blum J. R.","year":"2013","unstructured":"J. R. Blum , D. G. Greencorn , and J. R. Cooperstock . Smartphone sensor reliability for augmented reality applications . In Mobile and Ubiquitous Systems: Computing, Networking, and Services . Springer , 2013 . J. R. Blum, D. G. Greencorn, and J. R. Cooperstock. Smartphone sensor reliability for augmented reality applications. In Mobile and Ubiquitous Systems: Computing, Networking, and Services. Springer, 2013."},{"key":"e_1_3_2_1_3_1","volume-title":"Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857","author":"Book T.","year":"2013","unstructured":"T. Book , A. Pridgen , and D. S. Wallach . Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857 , 2013 . T. Book, A. Pridgen, and D. S. Wallach. Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/234173.234209"},{"key":"e_1_3_2_1_5_1","volume-title":"Pervasive and Mobile Computing","author":"Cunche M.","year":"2013","unstructured":"M. Cunche , M.-A. Kaafar , and R. Boreli . Linking wireless devices using information contained in wifiprobe requests . Pervasive and Mobile Computing , 2013 . M. Cunche, M.-A. Kaafar, and R. Boreli. Linking wireless devices using information contained in wifiprobe requests. Pervasive and Mobile Computing, 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"Snoopy: Distributed tracking and profiling framework. In 44Con","author":"Daniel C.","year":"2012","unstructured":"C. Daniel and W. Glenn . Snoopy: Distributed tracking and profiling framework. In 44Con 2012 , 2012. C. Daniel and W. Glenn. Snoopy: Distributed tracking and profiling framework. In 44Con 2012, 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX HotOS workshop","author":"Greenstein B.","year":"2007","unstructured":"B. Greenstein , R. Gummadi , J. Pang , M. Y. Chen , T. Kohno , S. Seshan , and D. Wetherall . Can Ferris Bueller still have his day off? protecting privacy in the wireless era . In USENIX HotOS workshop , 2007 . B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno, S. Seshan, and D. Wetherall. Can Ferris Bueller still have his day off? protecting privacy in the wireless era. In USENIX HotOS workshop, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_8"},{"key":"e_1_3_2_1_10_1","unstructured":"Y. T. Le Nguyen S. Cho W. Kwak S. Parab Y. Kim P. Tague and J. Zhang. Unlocin: Unauthorized location inference on smartphones without being caught.  Y. T. Le Nguyen S. Cho W. Kwak S. Parab Y. Kim P. Tague and J. Zhang. Unlocin: Unauthorized location inference on smartphones without being caught."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514293"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"}],"event":{"name":"WiSec'14: 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Oxford United Kingdom","acronym":"WiSec'14"},"container-title":["Proceedings of the 2014 ACM conference on Security and privacy in wireless &amp; mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2627393.2627399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2627393.2627399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:35Z","timestamp":1750230095000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2627393.2627399"}},"subtitle":["WifiLeaks: underestimated privacy implications of the access_wifi_state android permission"],"short-title":[],"issued":{"date-parts":[[2014,7,23]]},"references-count":13,"alternative-id":["10.1145\/2627393.2627399","10.1145\/2627393"],"URL":"https:\/\/doi.org\/10.1145\/2627393.2627399","relation":{},"subject":[],"published":{"date-parts":[[2014,7,23]]},"assertion":[{"value":"2014-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}