{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T16:37:25Z","timestamp":1773938245602,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0345, 16KIS0656, 16KIS0377K"],"award-info":[{"award-number":["16KIS0345, 16KIS0656, 16KIS0377K"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134059","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2187-2200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":133,"title":["Keep me Updated"],"prefix":"10.1145","author":[{"given":"Erik","family":"Derr","sequence":"first","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Sven","family":"Bugiel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Sascha","family":"Fahl","sequence":"additional","affiliation":[{"name":"Leibniz University, Hannover, Hannover, Germany"}]},{"given":"Yasemin","family":"Acar","sequence":"additional","affiliation":[{"name":"Leibniz University, Hannover, Hannover, Germany"}]},{"given":"Michael","family":"Backes","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Apperian. 2014. The Impact of iOS 8 on App Wrapping. https:\/\/www.apperian. com\/mam-blog\/impact-ios-8-app-wrapping. (2014). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_2_1","unstructured":"Apple. 2016. Swift Package Manager Community Proposal. https:\/\/ github.com\/apple\/swift-package-manager\/blob\/master\/Documentation\/ PackageManagerCommunityProposal.md. (2016). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_3_1","unstructured":"Google ASI. 2016. Security Vulnerability in Vungle Android SDKs prior to 3.3.0. https:\/\/support.google.com\/faqs\/answer\/6313713. (2016). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9325-9"},{"key":"e_1_3_2_2_6_1","unstructured":"Android Developers Blog. 2017. Android Studio 3.0 Canary 1. https:\/\/androiddevelopers.googleblog.com\/2017\/05\/android-studio-3-0-canary1.html. (2017). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_7_1","unstructured":"Dropbox Blog. 2015. Security bug resolved in the Dropbox SDKs for Android. https:\/\/blogs.dropbox.com\/developers\/2015\/03\/security-bug-resolved-inthe-dropbox-sdks-for-android. (2015). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_8_1","volume-title":"Wallach","author":"Book Theodore","year":"2013","unstructured":"Theodore Book, Adam Pridgen, and Dan S. Wallach. 2013. Longitudinal Analysis of Android Ad Library Permissions. In MoST'13. IEEE."},{"key":"e_1_3_2_2_9_1","volume-title":"LibDetector: Version Identification of Libraries in Android Applications. (August","author":"Chi Zhihao Mike","year":"2016","unstructured":"Zhihao Mike Chi. 2016. LibDetector: Version Identification of Libraries in Android Applications. (August 2016)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985468"},{"key":"e_1_3_2_2_12_1","unstructured":"Android Developers. 2015. App Security Improvement Program. https:\/\/developer. android.com\/google\/play\/asi.html. (2015). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_13_1","unstructured":"Android Developers. 2016. Android 7 for Developers. https:\/\/developer.android. com\/about\/versions\/nougat\/android-7.0.html. (2016). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_14_1","volume-title":"App Security Improvements: Looking back at","author":"Developers Android","year":"2016","unstructured":"Android Developers. 2017. App Security Improvements: Looking back at 2016. https:\/\/android-developers.googleblog.com\/2017\/01\/app-securityimprovements-looking-back.html. (2017). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_15_1","unstructured":"Android Developers. 2017. Google Play Dashboard. https:\/\/developer.android. com\/about\/dashboards\/index.html. (2017). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.328"},{"key":"e_1_3_2_2_17_1","unstructured":"Hewlett Packard Enterprise. 2016. HPE Cyber Risk Report. https:\/\/techbeacon. com\/resources\/2016-cyber-risk-report-hpe-security. (2016). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_18_1","unstructured":"Google. Last visited: 02\/10\/2017. Chrome Extensions Autoupdating. https:\/\/ developer.chrome.com\/extensions\/autoupdate. (Last visited: 02\/10\/2017)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_2_20_1","unstructured":"GuardSquare. 2016. ProGuard Java Obfuscator. http:\/\/proguard.sourceforge.net. (2016)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985815"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23414"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491428"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597155"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597109"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.18"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.142"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.48"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"e_1_3_2_2_33_1","unstructured":"The Hacker News. 2014. Facebook SDK Vulnerability Puts Millions of Smartphone Users' Accounts at Risk. http:\/\/thehackernews.com\/2014\/07\/facebooksdk-vulnerability-puts.html. (2014). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_34_1","unstructured":"The Hacker News. 2015. Backdoor in Baidu Android SDK Puts 100 Million Devices at Risk. http:\/\/thehackernews.com\/2015\/11\/android-malware-backdoor.html. (2015). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_35_1","unstructured":"The Hacker News. 2015. Warning: 18 000 Android Apps Contains Code that Spy on Your Text Messages. http:\/\/thehackernews.com\/2015\/10\/android-apps-stealsms.html. (2015). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_36_1","unstructured":"Tom Preston-Werner. 2013. Semantic Versioning 2.0.0. http:\/\/semver.org\/. (2013). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 20th International Conference on Program Comprehension (ICPC '12)","author":"Mojica Ruiz Israel J","year":"2012","unstructured":"Israel J Mojica Ruiz, Meiyappan Nagappan, Bram Adams, and Ahmed E Hassan. 2012. Understanding reuse in the android market. In Proceedings of the 20th International Conference on Program Comprehension (ICPC '12). IEEE, 113--122."},{"key":"e_1_3_2_2_38_1","unstructured":"Sonatype. 2017. 2016 State of the Software Supply Chain. https:\/\/www.sonatype. com\/software-supply-chain. (2017). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_39_1","volume-title":"MoST'12","author":"Stevens Ryan","unstructured":"Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 2012. Investigating User Privacy in Android Ad Libraries. In MoST'12. IEEE."},{"key":"e_1_3_2_2_40_1","unstructured":"ThreatPost. 2016. Code reuse - A peril for secure software development. https:\/\/threatpost.com\/code-reuse-a-peril-for-secure-softwaredevelopment\/122476\/. (2016). Last visited: 08\/25\/2017."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"e_1_3_2_2_42_1","unstructured":"Jeff Williams and Arshan Dabirsiaghi. 2012. The unfortunate reality of insecure libraries. http:\/\/www.aspectsecurity.com\/research-presentations\/the-unfortunatereality-of-insecure-libraries. (2012). Last visited: 08\/25\/2017."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134059"}},"subtitle":["An Empirical Study of Third-Party Library Updatability on Android"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":42,"alternative-id":["10.1145\/3133956.3134059","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134059","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}