{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:09Z","timestamp":1763507709504,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":20,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1028394","1228995"],"award-info":[{"award-number":["1028394","1228995"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2801694.2801707","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"25-27","source":"Crossref","is-referenced-by-count":7,"title":["AntMonitor"],"prefix":"10.1145","author":[{"given":"Anastasia","family":"Shuba","sequence":"first","affiliation":[]},{"given":"Anh","family":"Le","sequence":"additional","affiliation":[]},{"given":"Minas","family":"Gjoka","sequence":"additional","affiliation":[]},{"given":"Janus","family":"Varmarken","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Langhoff","sequence":"additional","affiliation":[]},{"given":"Athina","family":"Markopoulou","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2801694.2801707-1","unstructured":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update2014--2019. http:\/\/goo.gl\/Zu8f2r."},{"key":"key-10.1145\/2801694.2801707-2","doi-asserted-by":"crossref","unstructured":"W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 2014.","DOI":"10.1145\/2619091"},{"key":"key-10.1145\/2801694.2801707-3","doi-asserted-by":"crossref","unstructured":"Vaibhav Rastogi, Yan Chen, and William Enck. Apps playground: automatic security analysis of smartphone applications. In Proc. of the 3rd ACM conference on Data and applicationsecurity and privacy (CODASPY), 2013.","DOI":"10.1145\/2435349.2435379"},{"key":"key-10.1145\/2801694.2801707-4","unstructured":"Android Versions. developer.android.com\/about\/dashboards."},{"key":"key-10.1145\/2801694.2801707-5","doi-asserted-by":"crossref","unstructured":"Anh Le, Janus Varmarken, Simon Langhoff, Anastasia Shuba, Minas Gjoka, andAthina Markopoulou. AntMonitor: A System for Monitoring from Mobile Devices. In (to appear) Proc. of ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big Data, 2015.","DOI":"10.1145\/2787394.2787396"},{"key":"key-10.1145\/2801694.2801707-6","unstructured":"PCAPNG File Format. http:\/\/goo.gl\/y89d9U."},{"key":"key-10.1145\/2801694.2801707-7","doi-asserted-by":"crossref","unstructured":"Erin Kenneally and David Dittrich. The menlo report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102, 2012.","DOI":"10.2139\/ssrn.2445102"},{"key":"key-10.1145\/2801694.2801707-8","doi-asserted-by":"crossref","unstructured":"J. Sommers and P. Barford. Cell vs. WiFi: On the Performance of Metro Area Mobile Connections. In Proc. of IMC, 2012.","DOI":"10.1145\/2398776.2398808"},{"key":"key-10.1145\/2801694.2801707-9","doi-asserted-by":"crossref","unstructured":"Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman. Identifying Diverse Usage Behaviors of Smartphone Apps. In Proc. of IMC, 2011.","DOI":"10.1145\/2068816.2068847"},{"key":"key-10.1145\/2801694.2801707-10","unstructured":"PhoneLab, University at Buffalo. https:\/\/www.phone-lab.org\/."},{"key":"key-10.1145\/2801694.2801707-11","doi-asserted-by":"crossref","unstructured":"H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. A First Look at Traffic on Smartphones. In IMC, 2010.","DOI":"10.1145\/1879141.1879176"},{"key":"key-10.1145\/2801694.2801707-12","doi-asserted-by":"crossref","unstructured":"Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. Androidleaks: Automatically detecting potential privacy leaks inandroid applications on a large scale. In Proc. of the International Conf. on Trust and Trustworthy Computing, 2012.","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"key-10.1145\/2801694.2801707-13","doi-asserted-by":"crossref","unstructured":"A. Rao, A. M. Kakhki, A. Razaghpanah, A. Tang, S. Wang, J. Sherry, P. Gill,A. Krishnamurthy, A. Legout, A. Mislove, and D. Choffnes. Using the Middle to Meddle with Mobile. Technical report, Northeastern University, Dec. 2013.","DOI":"10.1145\/2413247.2413286"},{"key":"key-10.1145\/2801694.2801707-14","doi-asserted-by":"crossref","unstructured":"Anastasia Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, andAthina Markopoulou. Demo: AntMonitor - A System for Mobile Traffic Monitoring and Real-Time Prevention of Privacy Leaks. In (to appear) Proc. of the 21st International Conference on Mobile Computing and Networking, 2015.","DOI":"10.1145\/2789168.2789170"},{"key":"key-10.1145\/2801694.2801707-15","unstructured":"AntMonitor: Project Webpage and Demo. http:\/\/antmonitor.calit2.uci.edu\/."},{"key":"key-10.1145\/2801694.2801707-16","unstructured":"Private Internet Access Privacy Policy. http:\/\/goo.gl\/Yt8jNx."},{"key":"key-10.1145\/2801694.2801707-17","unstructured":"Multifast. http:\/\/multifast.sourceforge.net\/."},{"key":"key-10.1145\/2801694.2801707-18","doi-asserted-by":"crossref","unstructured":"Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In Proc. of INFOCOM, 2004.","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"key-10.1145\/2801694.2801707-19","unstructured":"Squid Proxy. Squid-in-the-middle SSL Bump."},{"key":"key-10.1145\/2801694.2801707-20","doi-asserted-by":"crossref","unstructured":"Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, and Jonathan Turner. Algorithms to accelerate multiple regular expressions matching fordeep packet inspection. ACM SIGCOMM Computer Communication Review, 36(4):339--350,2006.","DOI":"10.1145\/1151659.1159952"}],"event":{"number":"2015","sponsor":["SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"S3 '15","name":"the 2015 Workshop","start":{"date-parts":[[2015,9,11]]},"location":"Paris, France","end":{"date-parts":[[2015,9,11]]}},"container-title":["Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, &amp; for the Students - S3 '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801694.2801707","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2801707&amp;ftid=1616586&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2801694.2801707"}},"subtitle":["Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices"],"proceedings-subject":"Wireless of the Students, by the Students, & for the Students","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1145\/2801694.2801707","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}