{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:01:36Z","timestamp":1756382496416,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,6]]},"DOI":"10.1145\/3131672.3131683","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["CamForensics"],"prefix":"10.1145","author":[{"given":"Animesh","family":"Srivastava","sequence":"first","affiliation":[{"name":"Duke University"}]},{"given":"Puneet","family":"Jain","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Labs"}]},{"given":"Soteris","family":"Demetriou","sequence":"additional","affiliation":[{"name":"UIUC"}]},{"given":"Landon P.","family":"Cox","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Kyu-Han","family":"Kim","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Labs"}]}],"member":"320","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Soteris Demetriou Whitney Merrill Wei Yang Aston Zhang and Carl A Gunter. 2016. Free for all! assessing user data exposure to advertising libraries on android. In NDSS.  Soteris Demetriou Whitney Merrill Wei Yang Aston Zhang and Carl A Gunter. 2016. Free for all! assessing user data exposure to advertising libraries on android. In NDSS.","DOI":"10.14722\/ndss.2016.23082"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420975"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_10_1","volume-title":"Scandroid: Automated security certification of android.","author":"Fuchs Adam P","year":"2009","unstructured":"Adam P Fuchs , Avik Chaudhuri , and Jeffrey S Foster . 2009 . Scandroid: Automated security certification of android. (2009). Adam P Fuchs, Avik Chaudhuri, and Jeffrey S Foster. 2009. Scandroid: Automated security certification of android. (2009)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/techflow.me\/2014\/03\/05\/my-project-google-play-store-in-numbers\/. (2016). {Online","author":"Numbers Google Play","year":"2016","unstructured":"Google Play Store in Numbers . 2016. https:\/\/techflow.me\/2014\/03\/05\/my-project-google-play-store-in-numbers\/. (2016). {Online ; accessed 3- Dec- 2016 }. Google Play Store in Numbers. 2016. https:\/\/techflow.me\/2014\/03\/05\/my-project-google-play-store-in-numbers\/. (2016). {Online; accessed 3-Dec-2016}."},{"key":"e_1_3_2_1_13_1","unstructured":"Suman Jana David Molnar Alexander Moshchuk Alan Dunn Benjamin Livshits Helen J. Wang and Eyal Ofek. 2013. Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In USENIX Security.   Suman Jana David Molnar Alexander Moshchuk Alan Dunn Benjamin Livshits Helen J. Wang and Eyal Ofek. 2013. Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In USENIX Security."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.31"},{"key":"e_1_3_2_1_15_1","volume-title":"Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882","author":"Kim Yoon","year":"2014","unstructured":"Yoon Kim . 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 ( 2014 ). Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 (2014)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0031-0"},{"key":"e_1_3_2_1_17_1","volume-title":"DroidBox: Android application sandbox. https:\/\/github.com\/pjlantz\/droidbox. (2016). {Online","author":"Lantz P","year":"2016","unstructured":"P Lantz , A Desnos , and K Yang . 2016. DroidBox: Android application sandbox. https:\/\/github.com\/pjlantz\/droidbox. (2016). {Online ; accessed 4- Dec- 2016 }. P Lantz, A Desnos, and K Yang. 2016. DroidBox: Android application sandbox. https:\/\/github.com\/pjlantz\/droidbox. (2016). {Online; accessed 4-Dec-2016}."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_21_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_1_22_1","volume-title":"Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 1--6.","author":"Narayanan Annamalai","year":"2014","unstructured":"Annamalai Narayanan , Lihui Chen , and Chee Keong Chan . 2014 . AdDetect: Automated detection of Android ad libraries using semantic analysis. In Intelligent Sensors , Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 1--6. Annamalai Narayanan, Lihui Chen, and Chee Keong Chan. 2014. AdDetect: Automated detection of Android ad libraries using semantic analysis. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_23_1","volume-title":"Whyper: Towards automating risk assessment of mobile applications. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 527--542.","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . Whyper: Towards automating risk assessment of mobile applications. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 527--542. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. Whyper: Towards automating risk assessment of mobile applications. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 527--542."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906405"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866331"},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp. (2016). {Online","author":"Market Share Smartphone OS","year":"2016","unstructured":"2016 Q2 Smartphone OS Market Share . 2016. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp. (2016). {Online ; accessed 3- Dec- 2016 }. 2016 Q2 Smartphone OS Market Share. 2016. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp. (2016). {Online; accessed 3-Dec-2016}."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/ibotpeaches.github.io\/Apktool\/. (2016). {Online","author":"A","year":"2016","unstructured":"A tool for reverse engineering Android apk files. 2016. https:\/\/ibotpeaches.github.io\/Apktool\/. (2016). {Online ; accessed 3- Dec- 2016 }. A tool for reverse engineering Android apk files. 2016. https:\/\/ibotpeaches.github.io\/Apktool\/. (2016). {Online; accessed 3-Dec-2016}."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"e_1_3_2_1_32_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Wijesekera Primal","year":"2015","unstructured":"Primal Wijesekera , Arjun Baokar , Ashkan Hosseini , Serge Egelman , David Wagner , and Konstantin Beznosov . 2015 . Android permissions remystified: A field study on contextual integrity . In 24th USENIX Security Symposium (USENIX Security 15) . 499--514. Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android permissions remystified: A field study on contextual integrity. In 24th USENIX Security Symposium (USENIX Security 15). 499--514."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"key":"e_1_3_2_1_34_1","first-page":"50","article-title":"Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets","volume":"25","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . 2012 . Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets .. In NDSS , Vol. 25. 50 -- 52 . Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.. In NDSS, Vol. 25. 50--52.","journal-title":"NDSS"}],"event":{"name":"SenSys '17: The 15th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Delft Netherlands","acronym":"SenSys '17"},"container-title":["Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131672.3131683","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3131672.3131683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:57Z","timestamp":1750212837000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131672.3131683"}},"subtitle":["Understanding Visual Privacy Leaks in the Wild"],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":34,"alternative-id":["10.1145\/3131672.3131683","10.1145\/3131672"],"URL":"https:\/\/doi.org\/10.1145\/3131672.3131683","relation":{},"subject":[],"published":{"date-parts":[[2017,11,6]]},"assertion":[{"value":"2017-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}