{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:20Z","timestamp":1755838700915,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS Grant-in-Aid for Scientific Research B","award":["16H02832."],"award-info":[{"award-number":["16H02832."]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196554","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"147-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Don't throw me away"],"prefix":"10.1145","author":[{"given":"Elkana","family":"Pariwono","sequence":"first","affiliation":[{"name":"Waseda University, Tokyo, Japan"}]},{"given":"Daiki","family":"Chiba","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Tokyo, Japan"}]},{"given":"Mitsuaki","family":"Akiyama","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Tokyo, Japan"}]},{"given":"Tatsuya","family":"Mori","sequence":"additional","affiliation":[{"name":"Waseda University, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. UserAgentString. http:\/\/useragentstring.com\/pages\/api.php. (2011).  2011. UserAgentString. http:\/\/useragentstring.com\/pages\/api.php. (2011)."},{"key":"e_1_3_2_1_2_1","unstructured":"2012. Google Play Unofficial API. https:\/\/github.com\/egirault\/googleplay-api. (2012).  2012. Google Play Unofficial API. https:\/\/github.com\/egirault\/googleplay-api. (2012)."},{"key":"e_1_3_2_1_3_1","unstructured":"2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https:\/\/www.caida.org\/publications\/papers\/2012\/ menlo_report_actual_formatted\/. (2012).  2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https:\/\/www.caida.org\/publications\/papers\/2012\/ menlo_report_actual_formatted\/. (2012)."},{"key":"e_1_3_2_1_4_1","unstructured":"2016. Androguard. https:\/\/github.com\/androguard\/androguard. (2016).  2016. Androguard. https:\/\/github.com\/androguard\/androguard. (2016)."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Android Cloud to Device Messaging (C2DM). https:\/\/developers.google. com\/cloud-messaging\/c2dm. (2016).  2016. Android Cloud to Device Messaging (C2DM). https:\/\/developers.google. com\/cloud-messaging\/c2dm. (2016)."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. Android Permissions. https:\/\/developer.android.com\/guide\/topics\/ permissions\/requesting.html. (2017).  2017. Android Permissions. https:\/\/developer.android.com\/guide\/topics\/ permissions\/requesting.html. (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. AWS EC2 IP Address Range. http:\/\/docs.aws.amazon.com\/general\/latest\/ gr\/aws-ip-ranges.html. (2017).  2017. AWS EC2 IP Address Range. http:\/\/docs.aws.amazon.com\/general\/latest\/ gr\/aws-ip-ranges.html. (2017)."},{"key":"e_1_3_2_1_8_1","unstructured":"2017. Facebook Android SDK. https:\/\/developers.facebook.com\/docs\/android\/ getting-started. (2017).  2017. Facebook Android SDK. https:\/\/developers.facebook.com\/docs\/android\/ getting-started. (2017)."},{"key":"e_1_3_2_1_9_1","unstructured":"2017. Farsight Passive DNS. https:\/\/www.farsightsecurity.com\/solutions\/dnsdb\/. (2017).  2017. Farsight Passive DNS. https:\/\/www.farsightsecurity.com\/solutions\/dnsdb\/. (2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"2017. FuzzyMatching. https:\/\/pypi.python.org\/pypi\/fuzzywuzzy. (2017).  2017. FuzzyMatching. https:\/\/pypi.python.org\/pypi\/fuzzywuzzy. (2017)."},{"key":"e_1_3_2_1_11_1","unstructured":"2017. Godaddy API. https:\/\/developer.godaddy.com\/doc. (2017).  2017. Godaddy API. https:\/\/developer.godaddy.com\/doc. (2017)."},{"key":"e_1_3_2_1_12_1","unstructured":"2017. Google Play ASI Program. https:\/\/developer.android.com\/google\/play\/asi. html. (2017).  2017. Google Play ASI Program. https:\/\/developer.android.com\/google\/play\/asi. html. (2017)."},{"key":"e_1_3_2_1_13_1","unstructured":"2017. Microsoft Azure IP Address Range. https:\/\/www.microsoft.com\/en-us\/ download\/details.aspx?id=41653. (2017).  2017. Microsoft Azure IP Address Range. https:\/\/www.microsoft.com\/en-us\/ download\/details.aspx?id=41653. (2017)."},{"key":"e_1_3_2_1_14_1","unstructured":"2017. MIT App Inventor. http:\/\/appinventor.mit.edu\/explore\/. (2017).  2017. MIT App Inventor. http:\/\/appinventor.mit.edu\/explore\/. (2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"2017. Public Suffix List Python. https:\/\/pypi.python.org\/pypi\/publicsuffix\/. (2017).  2017. Public Suffix List Python. https:\/\/pypi.python.org\/pypi\/publicsuffix\/. (2017)."},{"key":"e_1_3_2_1_16_1","unstructured":"2017. SocialAuth. https:\/\/github.com\/3pillarlabs\/socialauth. (2017).  2017. SocialAuth. https:\/\/github.com\/3pillarlabs\/socialauth. (2017)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium. 207--222","author":"Alrwais Sumayah A.","year":"2014","unstructured":"Sumayah A. Alrwais , Kan Yuan , Eihal Alowaisheq , Zhou Li , and XiaoFeng Wang . 2014 . Understanding the Dark Side of Domain Parking . In Proceedings of the 23rd USENIX Security Symposium. 207--222 . Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, and XiaoFeng Wang. 2014. Understanding the Dark Side of Domain Parking. In Proceedings of the 23rd USENIX Security Symposium. 207--222."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.40"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134009"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"S. Cheshire and M. Krochmal. 2013. Special-Use Domain Names. RFC 6761 (Proposed Standard). (Feb. 2013).  S. Cheshire and M. Krochmal. 2013. Special-Use Domain Names. RFC 6761 (Proposed Standard). (Feb. 2013).","DOI":"10.17487\/rfc6761"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134059"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978317"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504753"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. 865--880","author":"Lauinger Tobias","year":"2017","unstructured":"Tobias Lauinger , Abdelberi Chaabane , Ahmet Salih Buyukkayhan , Kaan Onarlioglu , and William Robertson . 2017 . Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers . In Proceedings of the 26th USENIX Security Symposium. 865--880 . Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, and William Robertson. 2017. Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. In Proceedings of the 26th USENIX Security Symposium. 865--880."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987463"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.47"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978387"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Mobile Security Technologies Workshop (MoST).","author":"Mutchler Patrick","year":"2015","unstructured":"Patrick Mutchler , Adam Doup\u00e9 , John Mitchell , Christopher Kruegel , and Giovanni Vigna . 2015 . A Large-Scale Study of Mobile Web App Security . In Proceedings of the Mobile Security Technologies Workshop (MoST). Patrick Mutchler, Adam Doup\u00e9, John Mitchell, Christopher Kruegel, and Giovanni Vigna. 2015. A Large-Scale Study of Mobile Web App Security. In Proceedings of the Mobile Security Technologies Workshop (MoST)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17172-2_13"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857712"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.20"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23053"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991105"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196554"}},"subtitle":["Threats Caused by the Abandoned Internet Resources Used by Android Apps"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":39,"alternative-id":["10.1145\/3196494.3196554","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196554","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}