{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:37Z","timestamp":1750306177668,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UK EPSRC","award":["EP\/K032666\/1"],"award-info":[{"award-number":["EP\/K032666\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2989044","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1832-1834","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Martin","family":"Kr\u00e4mer","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"David","family":"Aspinall","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Maria","family":"Wolters","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mobile healthcare applications: system design review, critical issues and challenges. Australasian physical & engineering sciences in medicine, 38(1):23--38","author":"Baig M. M.","year":"2015","unstructured":"M. M. Baig , H. GholamHosseini , and M. J. Connolly . Mobile healthcare applications: system design review, critical issues and challenges. Australasian physical & engineering sciences in medicine, 38(1):23--38 , 2015 . M. M. Baig, H. GholamHosseini, and M. J. Connolly. Mobile healthcare applications: system design review, critical issues and challenges. Australasian physical & engineering sciences in medicine, 38(1):23--38, 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1586\/17434440.2015.1007125"},{"key":"e_1_3_2_1_3_1","volume-title":"AV Test","author":"Clausing D.-I. E.","year":"2015","unstructured":"D.-I. E. Clausing , M. Schiefer , U. L\u00f6sche , and D.-I. M. Morgenstern . Security Evaluation of nine Fitness Trackers. Technical report , AV Test , 2015 . D.-I. E. Clausing, M. Schiefer, U. L\u00f6sche, and D.-I. M. Morgenstern. Security Evaluation of nine Fitness Trackers. Technical report, AV Test, 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Hacking the Withings WS-30. https:\/\/poppopret.org\/2013\/06\/10\/summercon-2013-hacking-the-withings-ws-30\/","author":"Coppola M.","year":"2013","unstructured":"M. Coppola . Hacking the Withings WS-30. https:\/\/poppopret.org\/2013\/06\/10\/summercon-2013-hacking-the-withings-ws-30\/ , 2013 . M. Coppola. Hacking the Withings WS-30. https:\/\/poppopret.org\/2013\/06\/10\/summercon-2013-hacking-the-withings-ws-30\/, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"Security Analysis of Wearable Fitness Devices (Fitbit). Technical report","author":"Cyr B.","year":"2014","unstructured":"B. Cyr , W. Horn , D. Miao , and M. Specter . Security Analysis of Wearable Fitness Devices (Fitbit). Technical report , Massachusetts Institute of Technology , 2014 . B. Cyr, W. Horn, D. Miao, and M. Specter. Security Analysis of Wearable Fitness Devices (Fitbit). Technical report, Massachusetts Institute of Technology, 2014."},{"key":"e_1_3_2_1_6_1","unstructured":"European Comission. Commission Staff Working Document on the existing EU legal framework applicable to lifestyle and wellbeing apps. http:\/\/ec.europa.eu\/ digital-agenda\/en\/news\/commission-staff-... 2014.  European Comission. Commission Staff Working Document on the existing EU legal framework applicable to lifestyle and wellbeing apps. http:\/\/ec.europa.eu\/ digital-agenda\/en\/news\/commission-staff-... 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"Revisions of Medical Device Directives. https:\/\/ec.europa.eu\/growth\/sectors\/medical-devices\/regulatory-framework\/revision\/index_en.htm","author":"European Commission","year":"2015","unstructured":"European Commission . Revisions of Medical Device Directives. https:\/\/ec.europa.eu\/growth\/sectors\/medical-devices\/regulatory-framework\/revision\/index_en.htm , 2015 . European Commission. Revisions of Medical Device Directives. https:\/\/ec.europa.eu\/growth\/sectors\/medical-devices\/regulatory-framework\/revision\/index_en.htm, 2015."},{"key":"e_1_3_2_1_8_1","volume-title":"Fitbit without fitbit.com. https:\/\/github.com\/micolous\/helvetic\/blob\/master\/protocol.md","author":"Farrell M.","year":"2014","unstructured":"M. Farrell . Fitbit without fitbit.com. https:\/\/github.com\/micolous\/helvetic\/blob\/master\/protocol.md , 2014 . M. Farrell. Fitbit without fitbit.com. https:\/\/github.com\/micolous\/helvetic\/blob\/master\/protocol.md, 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"OECD guidelines governing the protection of privacy and transborder flows of personal data. Computer Networks","author":"Gassmann H.","year":"1976","unstructured":"H. Gassmann . OECD guidelines governing the protection of privacy and transborder flows of personal data. Computer Networks ( 1976 ), 5(2): 127--141, 1981. H. Gassmann. OECD guidelines governing the protection of privacy and transborder flows of personal data. Computer Networks (1976), 5(2):127--141, 1981."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy in the digital world: medical and health data outside of HIPAA protections. Current psychiatry reports, 16(11):494, nov","author":"Glenn T.","year":"2014","unstructured":"T. Glenn and S. Monteith . Privacy in the digital world: medical and health data outside of HIPAA protections. Current psychiatry reports, 16(11):494, nov 2014 . T. Glenn and S. Monteith. Privacy in the digital world: medical and health data outside of HIPAA protections. Current psychiatry reports, 16(11):494, nov 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851685"},{"key":"e_1_3_2_1_12_1","volume-title":"Privacy and mHealth: How Mobile Health 'Apps' Fit into a Privacy Framework Not Limited to HIPAA. Syracuse Law Review, 64, may","author":"Helm A. M.","year":"2014","unstructured":"A. M. Helm and D. Georgatos . Privacy and mHealth: How Mobile Health 'Apps' Fit into a Privacy Framework Not Limited to HIPAA. Syracuse Law Review, 64, may 2014 . A. M. Helm and D. Georgatos. Privacy and mHealth: How Mobile Health 'Apps' Fit into a Privacy Framework Not Limited to HIPAA. Syracuse Law Review, 64, may 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"Open Effect Report","author":"Hilts A.","year":"2016","unstructured":"A. Hilts , C. Parsons , and J. Knockel . Every Step You Fake. Technical report , Open Effect Report , 2016 . A. Hilts, C. Parsons, and J. Knockel. Every Step You Fake. Technical report, Open Effect Report, 2016."},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on","author":"Knorr K.","year":"2015","unstructured":"K. Knorr and D. Aspinall . Security testing for Android mHealth apps. In Software Testing , Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on , pages 1 -- 8 . IEEE, 2015 . K. Knorr and D. Aspinall. Security testing for Android mHealth apps. In Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, pages 1--8. IEEE, 2015."},{"key":"e_1_3_2_1_15_1","first-page":"571","volume-title":"On the privacy, security and safety of blood pressure and diabetes apps","author":"Knorr K.","year":"2015","unstructured":"K. Knorr , D. Aspinall , and M. Wolters . On the privacy, security and safety of blood pressure and diabetes apps , volume 455 , pages 571 -- 584 . Springer International Publishing , Cham , 2015 . K. Knorr, D. Aspinall, and M. Wolters. On the privacy, security and safety of blood pressure and diabetes apps, volume 455, pages 571--584. Springer International Publishing, Cham, 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"A Privacy And Security Study. Master thesis","author":"Kr\u00e4mer M.","year":"2016","unstructured":"M. Kr\u00e4mer . Health Monitors Under The Magnifying Glass : A Privacy And Security Study. Master thesis , University of Edinburgh , 2016 . M. Kr\u00e4mer. Health Monitors Under The Magnifying Glass: A Privacy And Security Study. Master thesis, University of Edinburgh, 2016."},{"key":"e_1_3_2_1_17_1","first-page":"41","volume-title":"Transforming Healthcare with the Internet of Things","author":"Mense A.","year":"2016","unstructured":"A. Mense , S. Steger , M. Sulek , and D. Jukic . Analyzing Privacy Risks of mHealth Applications . In Volume 221 : Transforming Healthcare with the Internet of Things , pages 41 -- 45 . IOS Press , 2016 . A. Mense, S. Steger, M. Sulek, and D. Jukic. Analyzing Privacy Risks of mHealth Applications. In Volume 221: Transforming Healthcare with the Internet of Things, pages 41--45. IOS Press, 2016."},{"key":"e_1_3_2_1_18_1","volume-title":"Extracting your WPA PSK from bathroom scales. https:\/\/www.pentestpartners.com\/blog\/extracting-your-wpa-psk-from-bathroom-scales\/","author":"Munro K.","year":"2015","unstructured":"K. Munro . Extracting your WPA PSK from bathroom scales. https:\/\/www.pentestpartners.com\/blog\/extracting-your-wpa-psk-from-bathroom-scales\/ , 2015 . K. Munro. Extracting your WPA PSK from bathroom scales. https:\/\/www.pentestpartners.com\/blog\/extracting-your-wpa-psk-from-bathroom-scales\/, 2015."},{"key":"e_1_3_2_1_19_1","unstructured":"P. Olson. Fitbit Data Now Being Used In The Courtroom. http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/16\/fitbit-data-court-room-personal-injury-claim\/#71a82d4209f8 2014.  P. Olson. Fitbit Data Now Being Used In The Courtroom. http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/16\/fitbit-data-court-room-personal-injury-claim\/#71a82d4209f8 2014."},{"key":"e_1_3_2_1_20_1","first-page":"33","article-title":"Attacks on Fitness Trackers Revisited","volume":"03313","author":"Rieck J.","year":"2016","unstructured":"J. Rieck . Attacks on Fitness Trackers Revisited : A Case-Study of Unfit Firmware Security. CoRR, 1604 . 03313 : 33 -- 44 , 2016 . J. Rieck. Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security. CoRR, 1604.03313:33--44, 2016.","journal-title":"A Case-Study of Unfit Firmware Security. CoRR, 1604"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2989044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989044"}},"subtitle":["Weighing in eHealth Security"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":20,"alternative-id":["10.1145\/2976749.2989044","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2989044","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}