{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:56:05Z","timestamp":1773082565590,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0351"],"award-info":[{"award-number":["16KIS0351"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3144457.3144471","type":"proceedings-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T12:22:08Z","timestamp":1534854128000},"page":"262-271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["CloudAnalyzer"],"prefix":"10.1145","author":[{"given":"Martin","family":"Henze","sequence":"first","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]},{"given":"David","family":"Hellmanns","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]},{"given":"Erik","family":"M\u00fchmer","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]},{"given":"Jan Henrik","family":"Ziegeldorf","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]},{"given":"Arthur","family":"Drichel","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexa. 2016. Actionable Analytics for the Web. http:\/\/www.alexa.com\/. (2016).  Alexa. 2016. Actionable Analytics for the Web. http:\/\/www.alexa.com\/. (2016)."},{"key":"e_1_3_2_1_2_1","unstructured":"Android. 2017. UI\/Application Exerciser Monkey -- Android Studio. https:\/\/developer.android.com\/studio\/test\/monkey.html. (2017).  Android. 2017. UI\/Application Exerciser Monkey -- Android Studio. https:\/\/developer.android.com\/studio\/test\/monkey.html. (2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"App Annie Index\u2122: Market Q2","year":"2015","unstructured":"App Annie. 2015. App Annie Index\u2122: Market Q2 2015 . (2015). App Annie. 2015. App Annie Index\u2122: Market Q2 2015. (2015)."},{"key":"e_1_3_2_1_4_1","volume-title":"February 15, 2017.","year":"2017","unstructured":"AppBrain. 2017 . Ad networks -- Android library statistics. https:\/\/www.appbrain.com\/stats\/libraries\/ad , February 15, 2017. (2017). AppBrain. 2017. Ad networks -- Android library statistics. https:\/\/www.appbrain.com\/stats\/libraries\/ad, February 15, 2017. (2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"February 15, 2017.","year":"2017","unstructured":"AppBrain. 2017 . Android analytics libraries. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/analytics\/android-analytics-libraries , February 15, 2017. (2017). AppBrain. 2017. Android analytics libraries. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/analytics\/android-analytics-libraries, February 15, 2017. (2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"February 15, 2017.","year":"2017","unstructured":"AppBrain. 2017 . Android crash reporting libraries. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/crash-reporting\/android-crash-reporting-libraries , February 15, 2017. (2017). AppBrain. 2017. Android crash reporting libraries. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/crash-reporting\/android-crash-reporting-libraries, February 15, 2017. (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"February 15, 2017.","year":"2017","unstructured":"AppBrain. 2017 . Social SDKs -- Android library statistics. https:\/\/www.appbrain.com\/stats\/libraries\/social , February 15, 2017. (2017). AppBrain. 2017. Social SDKs -- Android library statistics. https:\/\/www.appbrain.com\/stats\/libraries\/social, February 15, 2017. (2017)."},{"key":"e_1_3_2_1_8_1","volume-title":"February 15, 2017.","year":"2017","unstructured":"AppBrain. 2017 . Video ads. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/video-ads\/video-ads , February 15, 2017. (2017). AppBrain. 2017. Video ads. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/video-ads\/video-ads, February 15, 2017. (2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"N. Asokan etal 2014. Mobile Platform Security. Synthesis Lectures on Information Security Privacy & Trust 4 3 (2014).   N. Asokan et al. 2014. Mobile Platform Security. Synthesis Lectures on Information Security Privacy & Trust 4 3 (2014).","DOI":"10.2200\/S00555ED1V01Y201312SPT009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566769"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398819"},{"key":"e_1_3_2_1_13_1","volume-title":"Brahmastra: Driving Apps to Test the Security of Third-Party Components. In USENIX Security","author":"Bhoraskar R.","year":"2014","unstructured":"R. Bhoraskar 2014 . Brahmastra: Driving Apps to Test the Security of Third-Party Components. In USENIX Security 2014. R. Bhoraskar et al. 2014. Brahmastra: Driving Apps to Test the Security of Third-Party Components. In USENIX Security 2014."},{"key":"e_1_3_2_1_14_1","unstructured":"T. Book etal 2013. Longitudinal Analysis of Android Ad Library Permissions. In MoST 2013.  T. Book et al. 2013. Longitudinal Analysis of Android Ad Library Permissions. In MoST 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"Cross-Device Tracking: Measurement and Disclosures. In PETS","author":"Brookman J.","year":"2017","unstructured":"J. Brookman 2017 . Cross-Device Tracking: Measurement and Disclosures. In PETS 2017. J. Brookman et al. 2017. Cross-Device Tracking: Measurement and Disclosures. In PETS 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"Cloud infrastructure market up 49%, intensifying global data center competition","year":"2017","unstructured":"Canasys. 2017. Cloud infrastructure market up 49%, intensifying global data center competition . Press release 2017 \/1630. (2017). Canasys. 2017. Cloud infrastructure market up 49%, intensifying global data center competition. Press release 2017\/1630. (2017)."},{"key":"e_1_3_2_1_17_1","unstructured":"A. Cavoukian. 2011. Privacy by Design -- The 7 Foundational Principles. Information and Privacy Commissioner of Ontario. (2011).  A. Cavoukian. 2011. Privacy by Design -- The 7 Foundational Principles. Information and Privacy Commissioner of Ontario. (2011)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565593"},{"key":"e_1_3_2_1_19_1","volume-title":"February 17, 2017.","year":"2017","unstructured":"Datanyze. 2017 . CDN market share in the Alexa top 1M. https:\/\/www.datanyze.com\/market-share\/cdn\/Alexa%20top%201M , February 17, 2017. (2017). Datanyze. 2017. CDN market share in the Alexa top 1M. https:\/\/www.datanyze.com\/market-share\/cdn\/Alexa%20top%201M, February 17, 2017. (2017)."},{"key":"e_1_3_2_1_20_1","article-title":"Cloud Computing: Centralization and Data Sovereignty","volume":"3","author":"De Filippi P.","year":"2012","unstructured":"P. De Filippi and S. McCarthy . 2012 . Cloud Computing: Centralization and Data Sovereignty . Europ. J. Law Technol. 3 , 2 (2012). P. De Filippi and S. McCarthy. 2012. Cloud Computing: Centralization and Data Sovereignty. Europ. J. Law Technol. 3, 2 (2012).","journal-title":"Europ. J. Law Technol."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246. (2008).  T. Dierks and E. Rescorla. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246. (2008).","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"D. Dittrich and E. Kenneally. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Technical Report. U.S. Department of Homeland Security.  D. Dittrich and E. Kenneally. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Technical Report. U.S. Department of Homeland Security.","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake 3rd. 2011. Transport Layer Security (TLS) Extensions: Extension Definitions. IETF RFC 6066. (2011).  D. Eastlake 3rd. 2011. Transport Layer Security (TLS) Extensions: Extension Definitions. IETF RFC 6066. (2011).","DOI":"10.17487\/rfc6066"},{"key":"e_1_3_2_1_25_1","volume-title":"Android Security Internals: An In-depth Guide to Android's Security Architecture","author":"Elenkov N.","unstructured":"N. Elenkov . 2014. Android Security Internals: An In-depth Guide to Android's Security Architecture ( 1 st ed.). No Starch Press. N. Elenkov. 2014. Android Security Internals: An In-depth Guide to Android's Security Architecture (1st ed.). No Starch Press.","edition":"1"},{"key":"e_1_3_2_1_26_1","volume-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck 2010 . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX OSDI 2010. W. Enck et al. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In USENIX OSDI 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2015.06.009"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766506"},{"key":"e_1_3_2_1_29_1","volume-title":"December 15, 2016.","author":"Finkle J.","year":"2016","unstructured":"J. Finkle and A. G. Tharakan . 2016. Yahoo says one billion accounts exposed in newly discovered security breach. Reuters, http:\/\/www.reuters.com\/article\/us-yahoo-cyber-idUSKBN1432WZ , December 15, 2016. ( 2016 ). J. Finkle and A. G. Tharakan. 2016. Yahoo says one billion accounts exposed in newly discovered security breach. Reuters, http:\/\/www.reuters.com\/article\/us-yahoo-cyber-idUSKBN1432WZ, December 15, 2016. (2016)."},{"key":"e_1_3_2_1_30_1","volume-title":"Dec. 24, 2013.","author":"Gellman B.","year":"2013","unstructured":"B. Gellman . 2013 . Edward Snowden, after months of NSA revelations, says his mission's accomplished. The Washington Post (2013) . Dec. 24, 2013. B. Gellman. 2013. Edward Snowden, after months of NSA revelations, says his mission's accomplished. The Washington Post (2013). Dec. 24, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"e_1_3_2_1_33_1","unstructured":"Google. 2016. Top Free in Android Apps -- Android Apps on Google Play. https:\/\/play.google.com\/store\/apps\/collection\/topselling_free. (2016).  Google. 2016. Top Free in Android Apps -- Android Apps on Google Play. https:\/\/play.google.com\/store\/apps\/collection\/topselling_free. (2016)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504740"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.016"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"M. Henze etal 2016. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. In IEEE IC2E Workshop CLaw 2016.  M. Henze et al. 2016. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. In IEEE IC2E Workshop CLaw 2016.","DOI":"10.1109\/IC2EW.2016.24"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144511"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"M. Henze etal 2016. Towards Transparent Information on Individual Cloud Service Usage. In IEEE CloudCom 2016.  M. Henze et al. 2016. Towards Transparent Information on Individual Cloud Service Usage. In IEEE CloudCom 2016.","DOI":"10.1109\/CloudCom.2016.0064"},{"key":"e_1_3_2_1_39_1","volume-title":"Assessing the Prevalence of Cloud Computing in the Email Landscape. In IEEE\/IFIP TMA","author":"Henze M.","year":"2017","unstructured":"M. Henze 2017 . Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape. In IEEE\/IFIP TMA 2017. M. Henze et al. 2017. Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape. In IEEE\/IFIP TMA 2017."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078845"},{"key":"e_1_3_2_1_41_1","unstructured":"A. Langley and W.-T. Chang. 2016. QUIC Crypto. Google Revision 20161206. (2016).  A. Langley and W.-T. Chang. 2016. QUIC Crypto. Google Revision 20161206. (2016)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787394.2787396"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517868"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1987. Domain names -- concepts and facilities. IETF RFC 1034. (1987).  P. Mockapetris. 1987. Domain names -- concepts and facilities. IETF RFC 1034. (1987).","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818036"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"J. Pennekamp etal 2017. A Survey on the Evolution of Privacy Enforcement on Smartphones and the Road Ahead. Pervasive and Mobile Computing (2017).  J. Pennekamp et al. 2017. A Survey on the Evolution of Privacy Enforcement on Smartphones and the Road Ahead. Pervasive and Mobile Computing (2017).","DOI":"10.1016\/j.pmcj.2017.09.005"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971171"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"J. Postel. 1981. Internet Protocol. IETF RFC 791. (1981).  J. Postel. 1981. Internet Protocol. IETF RFC 791. (1981).","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_1_50_1","volume-title":"Haystack: In Situ Mobile Traffic Analysis in User Space. arXiv preprint arXiv:1510.01419","author":"Razaghpanah A.","year":"2015","unstructured":"A. Razaghpanah 2015 . Haystack: In Situ Mobile Traffic Analysis in User Space. arXiv preprint arXiv:1510.01419 (2015). A. Razaghpanah et al. 2015. Haystack: In Situ Mobile Traffic Analysis in User Space. arXiv preprint arXiv:1510.01419 (2015)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_1_52_1","volume-title":"Detecting and Defending Against Third-Party Tracking on the Web. In USENIX NSDI","author":"Roesner F.","year":"2012","unstructured":"F. Roesner 2012 . Detecting and Defending Against Third-Party Tracking on the Web. In USENIX NSDI 2012. F. Roesner et al. 2012. Detecting and Defending Against Third-Party Tracking on the Web. In USENIX NSDI 2012."},{"key":"e_1_3_2_1_53_1","unstructured":"Sandvine. 2016. 2016 Global Internet Phenomena -- Latin America & North America. (2016).  Sandvine. 2016. 2016 Global Internet Phenomena -- Latin America & North America. (2016)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_15"},{"key":"e_1_3_2_1_55_1","unstructured":"S. Shekhar etal 2012. AdSplit: Separating Smartphone Advertising from Applications. In USENIX Security 2012.   S. Shekhar et al. 2012. AdSplit: Separating Smartphone Advertising from Applications. In USENIX Security 2012."},{"key":"e_1_3_2_1_56_1","unstructured":"Skyhigh. 2016. Cloud Adoption & Risk Report Q4 2016. (2016).  Skyhigh. 2016. Cloud Adoption & Risk Report Q4 2016. (2016)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808120"},{"key":"e_1_3_2_1_58_1","volume-title":"PETS","author":"Spensky C.","year":"2016","unstructured":"C. Spensky 2016 . SoK: Privacy on Mobile Devices -- It's Complicated . In PETS 2016. C. Spensky et al. 2016. SoK: Privacy on Mobile Devices -- It's Complicated. In PETS 2016."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.31"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398812"},{"key":"e_1_3_2_1_63_1","volume-title":"Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. In DAT Workshop","author":"N.","year":"2016","unstructured":"N. Vallina-Rodriguez et al. 2016 . Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. In DAT Workshop 2016 . N. Vallina-Rodriguez et al. 2016. Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. In DAT Workshop 2016."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348563"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068847"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29883-2_15"}],"event":{"name":"MobiQuitous 2017: Computing, Networking and Services","location":"Melbourne VIC Australia","acronym":"MobiQuitous 2017","sponsor":["EAI The European Alliance for Innovation","SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3144457.3144471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:22Z","timestamp":1750212802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144471"}},"subtitle":["Uncovering the Cloud Usage of Mobile Apps"],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":67,"alternative-id":["10.1145\/3144457.3144471","10.1145\/3144457"],"URL":"https:\/\/doi.org\/10.1145\/3144457.3144471","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}