{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T21:01:23Z","timestamp":1761339683384,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029819","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T12:34:59Z","timestamp":1490013299000},"page":"289-300","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception"],"prefix":"10.1145","author":[{"given":"Luka","family":"Malisa","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Kari","family":"Kostiainen","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Srdjan","family":"Capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Google safe browsing. http:\/\/googleonlinesecurity.blogspot.com\/2012\/06\/safe-browsing-protecting-web-users-for.html.  Google safe browsing. http:\/\/googleonlinesecurity.blogspot.com\/2012\/06\/safe-browsing-protecting-web-users-for.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Spoofguard. http:\/\/crypto.stanford.edu\/SpoofGuard\/.  Spoofguard. http:\/\/crypto.stanford.edu\/SpoofGuard\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2011.52"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_1_5_1","unstructured":"G. Bradski. Dr. Dobb's Journal of Software Tools 2000.  G. Bradski. Dr. Dobb's Journal of Software Tools 2000."},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security","volume":"15","author":"Chen K.","year":"2015"},{"volume-title":"USENIX Security Symposium","year":"2014","author":"Chen Q. A.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754394"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"volume-title":"Web 2.0 Security and Privacy Workshop (W2SP)","year":"2011","author":"Felt A. P.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Forbes. Alleged 'Nazi' Android FBI Ransomware Mastermind Arrested In Russia April 2015. http:\/\/goo.gl\/c91izV.  Forbes. Alleged 'Nazi' Android FBI Ransomware Mastermind Arrested In Russia April 2015. http:\/\/goo.gl\/c91izV."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_2_1_16_1","unstructured":"International Secure Systems Lab. Antiphish last access 2015. http:\/\/www.iseclab.org\/projects\/antiphish\/.  International Secure Systems Lab. Antiphish last access 2015. http:\/\/www.iseclab.org\/projects\/antiphish\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.23"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_19_1","unstructured":"MacRumors. Masque attack vulnerability allows malicious third-party iOS apps to masquerade as legitimate apps. http:\/\/www.macrumors.com\/2014\/11\/10\/masque-attack-ios-vulnerability\/.  MacRumors. Masque attack vulnerability allows malicious third-party iOS apps to masquerade as legitimate apps. http:\/\/www.macrumors.com\/2014\/11\/10\/masque-attack-ios-vulnerability\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"C. Marforio R. Jayaram Masti C. Soriente K. Kostiainen and S. Capkun. Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms. ArXiv e-prints Feb. 2015.  C. Marforio R. Jayaram Masti C. Soriente K. Kostiainen and S. Capkun. Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms. ArXiv e-prints Feb. 2015.","DOI":"10.1145\/2994459.2994462"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223683"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460905"},{"key":"e_1_3_2_1_24_1","unstructured":"W. Metzger. Laws of Seeing. The MIT Press 2009.  W. Metzger. Laws of Seeing. The MIT Press 2009."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"R. A. Rensink. Change detection. Annual review of psychology 53(1) 2002.  R. A. Rensink. Change detection. Annual review of psychology 53(1) 2002.","DOI":"10.1146\/annurev.psych.53.100901.135125"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550367"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2226046"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875652.1875659"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"D. J. Simons and R. A. Rensink. Change blindness: past present and future. TRENDS in Cognitive Sciences 9(1) 2005.  D. J. Simons and R. A. Rensink. Change blindness: past present and future. TRENDS in Cognitive Sciences 9(1) 2005.","DOI":"10.1016\/j.tics.2004.11.006"},{"key":"e_1_3_2_1_32_1","unstructured":"Spider Labs. Focus stealing vulnerability in android. http:\/\/blog.spiderlabs.com\/2011\/08\/twsl2011-008-focus-stealing-vulnerability-in-android.html.  Spider Labs. Focus stealing vulnerability in android. http:\/\/blog.spiderlabs.com\/2011\/08\/twsl2011-008-focus-stealing-vulnerability-in-android.html."},{"key":"e_1_3_2_1_33_1","unstructured":"Symantec. Will Your Next TV Manual Ask You to Run a Scan Instead of Adjusting the Antenna? April 2015. http:\/\/goo.gl\/xh58UN.  Symantec. Will Your Next TV Manual Ask You to Run a Scan Instead of Adjusting the Antenna? April 2015. http:\/\/goo.gl\/xh58UN."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_35_1","unstructured":"G. Xiang J. Hong C. P. Rose and L. Cranor. Cantina  G. Xiang J. Hong C. P. Rose and L. Cranor. Cantina"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"volume-title":"USENIX Workshop on Offensive Technologies (WOOT)","year":"2012","author":"Xu Z.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","unstructured":"J. Zhai and J. Su. The service you can't refuse: A secluded hijackrat. https:\/\/www.fireeye.com\/blog\/threat-research\/2014\/07\/the-service-you-cant-refuse-a-secluded-hijackrat.html.  J. Zhai and J. Su. The service you can't refuse: A secluded hijackrat. https:\/\/www.fireeye.com\/blog\/threat-research\/2014\/07\/the-service-you-cant-refuse-a-secluded-hijackrat.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2161999"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:15Z","timestamp":1750220595000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":40,"alternative-id":["10.1145\/3029806.3029819","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029819","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}