{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:50Z","timestamp":1750309190431,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1505664 and CNS-1618684"],"award-info":[{"award-number":["CNS-1505664 and CNS-1618684"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421 and W911NF-15-1-0576"],"award-info":[{"award-number":["W911NF-13-1-0421 and W911NF-15-1-0576"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3212480.3212503","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T16:38:41Z","timestamp":1530203921000},"page":"248-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Android STAR"],"prefix":"10.1145","author":[{"given":"Lun-Pin","family":"Yuan","sequence":"first","affiliation":[{"name":"Penn State University"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Penn State University"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Penn State University"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. 08-1332 Ontario v. Quon. (2010). https:\/\/www.supremecourt.gov\/opinions\/09pdf\/08-1332.pdf  2010. 08-1332 Ontario v. Quon. (2010). https:\/\/www.supremecourt.gov\/opinions\/09pdf\/08-1332.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Dimitris Apostolopoulos Giannis Marinakis Christoforos Ntantogian and Christos Xenakis. 2013. Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices. Springer Berlin Heidelberg Berlin Heidelberg 178--185.  Dimitris Apostolopoulos Giannis Marinakis Christoforos Ntantogian and Christos Xenakis. 2013. Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices. Springer Berlin Heidelberg Berlin Heidelberg 178--185.","DOI":"10.1007\/978-3-642-37437-1_15"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. {n. d.}. Apple Developer Documentation: UIKit. ({n. d.}). https:\/\/developer.apple.com\/documentation\/uikit\/  Apple. {n. d.}. Apple Developer Documentation: UIKit. ({n. d.}). https:\/\/developer.apple.com\/documentation\/uikit\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. {n. d.}. View Programming Guide for iOS. ({n. d.}). https:\/\/developer.apple.com\/library\/content\/documentation\/WindowsViews\/Conceptual\/ViewPGJPhoneOS\/  Apple. {n. d.}. View Programming Guide for iOS. ({n. d.}). https:\/\/developer.apple.com\/library\/content\/documentation\/WindowsViews\/Conceptual\/ViewPGJPhoneOS\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Appthority. Q3 2017. Appthority Enterprise Mobile Security Pulse Report. (Q3 2017). http:\/\/info.appthority.com\/-q3-2017-pulse-report-download  Appthority. Q3 2017. Appthority Enterprise Mobile Security Pulse Report. (Q3 2017). http:\/\/info.appthority.com\/-q3-2017-pulse-report-download"},{"key":"e_1_3_2_1_6_1","unstructured":"Brosix. 2017. 7 Reasons to Use a Business Instant Messenger in Your Workplace. (2017). https:\/\/www.brosix.com\/blog\/7-reasons-use-business-instant-messenger\/  Brosix. 2017. 7 Reasons to Use a Business Instant Messenger in Your Workplace. (2017). https:\/\/www.brosix.com\/blog\/7-reasons-use-business-instant-messenger\/"},{"volume-title":"Digital Forensic Research Workshop.","year":"2006","author":"Bugcheck Chris","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653729"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.008"},{"key":"e_1_3_2_1_10_1","unstructured":"Sewell Chan. 2017. European Court Limits Employers' Right to Monitor Workers' Email. (2017). https:\/\/www.nytimes.com\/2017\/09\/05\/business\/european-court-employers-workers-email.html  Sewell Chan. 2017. European Court Limits Employers' Right to Monitor Workers' Email. (2017). https:\/\/www.nytimes.com\/2017\/09\/05\/business\/european-court-employers-workers-email.html"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCBPL.2015040105"},{"key":"e_1_3_2_1_12_1","unstructured":"Cisco. 2014. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. (2014). https:\/\/www.cisco.eom\/c\/en\/us\/solutions\/collateral\/enterprise-networks\/data-loss-prevention\/white_paper_c11-499060.html  Cisco. 2014. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. (2014). https:\/\/www.cisco.eom\/c\/en\/us\/solutions\/collateral\/enterprise-networks\/data-loss-prevention\/white_paper_c11-499060.html"},{"key":"e_1_3_2_1_13_1","unstructured":"Privacy Rights Clearinghouse. {n. d.}. Workplace privacy and employee monitoring. ({n. d.}). https:\/\/www.privacyrights.org\/consumer-guides\/workplace-privacy-and-employee-monitoring  Privacy Rights Clearinghouse. {n. d.}. Workplace privacy and employee monitoring. ({n. d.}). https:\/\/www.privacyrights.org\/consumer-guides\/workplace-privacy-and-employee-monitoring"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653730"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Alfreda Dudley and Davian Johnson. 2017. Examining the Legal Consequences of Improper Use of Social Media Sites in the Workplace. Springer International Publishing Cham 307--316.  Alfreda Dudley and Davian Johnson. 2017. Examining the Legal Consequences of Improper Use of Social Media Sites in the Workplace. Springer International Publishing Cham 307--316.","DOI":"10.1007\/978-3-319-58559-8_25"},{"volume-title":"EMPLOYEE MONITORING AND WORKPLACE PRIVACY LAW. In National Symposium on Technology in Labor and Employment Law.","year":"2016","author":"Ella V. John","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Society for Human Resource Management. {n. d.}. Workplace Monitoring Laws. ({n. d.}). https:\/\/www.shrm.org\/ResourcesAndTools\/hr-topics\/employee-relations\/Documents\/Statesurveillanceandmonitoringlaws.pdf  Society for Human Resource Management. {n. d.}. Workplace Monitoring Laws. ({n. d.}). https:\/\/www.shrm.org\/ResourcesAndTools\/hr-topics\/employee-relations\/Documents\/Statesurveillanceandmonitoringlaws.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"Volatility Foundation. {n. d.}. Volatility Framework. ({n. d.}). http:\/\/www.volatilityfoundation.org\/  Volatility Foundation. {n. d.}. Volatility Framework. ({n. d.}). http:\/\/www.volatilityfoundation.org\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Jack Gillman. 2017. Best Cell Phone Spy Software Reviews 2017. (2017). http:\/\/www.bestphonespy.com\/  Jack Gillman. 2017. Best Cell Phone Spy Software Reviews 2017. (2017). http:\/\/www.bestphonespy.com\/"},{"volume-title":"2013 35th International Conference on Software Engineering (ICSE). 72--81","author":"Gomez L.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.002"},{"volume-title":"Performance Analysis of Systems and Software (ISPASS), 2015 IEEE International Symposium on. 215--224","author":"Halpern M.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2014.8"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Andrew Hoog. 2011. Android forensics: investigation analysis and mobile security for Google Android. Elsevier.   Andrew Hoog. 2011. Android forensics: investigation analysis and mobile security for Google Android. Elsevier.","DOI":"10.1016\/B978-1-59749-651-3.10006-8"},{"key":"e_1_3_2_1_25_1","first-page":"25","article-title":"Exploring Workplace Bullying Through a Social Work Ethics-Informed Lens","volume":"13","author":"Horton Karla B.","year":"2016","journal-title":"Journal of Social Work Values and Ethics"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.26710\/jbsee.v2i2.32"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.10.001"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406402"},{"key":"e_1_3_2_1_29_1","unstructured":"Zoe Kleinman. 2017. ECHR court reverses ruling on sacking over private messages. (2017). http:\/\/www.bbc.com\/news\/technology-41160853  Zoe Kleinman. 2017. ECHR court reverses ruling on sacking over private messages. (2017). http:\/\/www.bbc.com\/news\/technology-41160853"},{"volume-title":"TIE: Principled reverse engineering of types in binary programs. NDSS","year":"2011","author":"Lee JongHyup","key":"e_1_3_2_1_30_1"},{"volume-title":"Android Forensics: Simplifying Cell Phone Examinations.","year":"2010","author":"Lessard Jeff","key":"e_1_3_2_1_31_1"},{"volume-title":"Dimsum: Discovering semantic data of interest from un-mappable with confidence. In in: Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS'12.","year":"2012","author":"Lin Zhiqiang","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"Zhiqiang Lin Junghwan Rhee Xiangyu Zhang Dongyan Xu and Xuxian Jiang. 2011. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.. In NDSS.  Zhiqiang Lin Junghwan Rhee Xiangyu Zhang Dongyan Xu and Xuxian Jiang. 2011. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.. In NDSS."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2788959.2788964"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/IS3C.2014.293"},{"key":"e_1_3_2_1_36_1","unstructured":"Aditya Mahajan MS Dahiya and HP Sanghvi. 2013. Forensic analysis of instant messenger applications on android devices. arXiv preprint arXiv:1304.4915 (2013).  Aditya Mahajan MS Dahiya and HP Sanghvi. 2013. Forensic analysis of instant messenger applications on android devices. arXiv preprint arXiv:1304.4915 (2013)."},{"key":"e_1_3_2_1_37_1","unstructured":"Tirus Muya Maina. 2013. Instant messaging an effective way of communication in workplace. CoRR abs\/1310.8489 (2013). arXiv:1310.8489 http:\/\/arxiv.org\/abs\/1310.8489  Tirus Muya Maina. 2013. Instant messaging an effective way of communication in workplace. CoRR abs\/1310.8489 (2013). arXiv:1310.8489 http:\/\/arxiv.org\/abs\/1310.8489"},{"key":"e_1_3_2_1_38_1","unstructured":"Microsoft. {n. d.}. Control Class (System.Windows.Forms). ({n. d.}). https:\/\/msdn.microsoft.com\/en-us\/library\/system.windows.forms.control(v=vs.71).aspx  Microsoft. {n. d.}. Control Class (System.Windows.Forms). ({n. d.}). https:\/\/msdn.microsoft.com\/en-us\/library\/system.windows.forms.control(v=vs.71).aspx"},{"volume-title":"USENIX Annual Technical Conference, FREENIX Track. 23--32","year":"2005","author":"Movall Paul","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","unstructured":"NETMARKETSHARE. 2017. Mobile\/Tablet Operating System Market Share. (2017). https:\/\/www.netmarketshare.com\/operating-system-market-share.aspx\\?qprid=8&qpcustomd=1  NETMARKETSHARE. 2017. Mobile\/Tablet Operating System Market Share. (2017). https:\/\/www.netmarketshare.com\/operating-system-market-share.aspx\\?qprid=8&qpcustomd=1"},{"key":"e_1_3_2_1_41_1","unstructured":"Departmental Ethics Office. {n. d.}. Use of Government Information Property and Time. ({n. d.}). https:\/\/www.doi.gov\/ethics\/use-of-government-property  Departmental Ethics Office. {n. d.}. Use of Government Information Property and Time. ({n. d.}). https:\/\/www.doi.gov\/ethics\/use-of-government-property"},{"key":"e_1_3_2_1_42_1","unstructured":"Jos\u00c3\u013e Pereira. 2010. droidVncServer. (2010). https:\/\/github.com\/oNaiPs\/droidVncServer  Jos\u00c3\u013e Pereira. 2010. droidVncServer. (2010). https:\/\/github.com\/oNaiPs\/droidVncServer"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884854"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813650"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813720"},{"volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","year":"2014","author":"Saltaformaggio Brendan","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","unstructured":"Brendan D Saltaformaggio. 2012. Forensic carving of wireless network information from the android linux kernel. University of New Orleans (2012).  Brendan D Saltaformaggio. 2012. Forensic carving of wireless network information from the android linux kernel. University of New Orleans (2012)."},{"volume-title":"Howard: A Dynamic Excavator for Reverse Engineering Data Structures.. In NDSS. Citeseer.","year":"2011","author":"Slowinska Asia","key":"e_1_3_2_1_48_1"},{"volume-title":"Collaborative Technologies and Systems (CTS), 2010 International Symposium on. 26--35","author":"Taylor C.","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","unstructured":"TeamCounterPath. 2016. The Benefits of Instant Messaging in the Workplace. (2016). https:\/\/blog.counterpath.com\/the-benefits-of-instant-messaging-in-the-workplace\/  TeamCounterPath. 2016. The Benefits of Instant Messaging in the Workplace. (2016). https:\/\/blog.counterpath.com\/the-benefits-of-instant-messaging-in-the-workplace\/"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.010"},{"key":"e_1_3_2_1_52_1","unstructured":"TryMobileSpy. 2017. TOP Mobile Spy Apps 2017. (2017). https:\/\/trymobilespy.com\/  TryMobileSpy. 2017. TOP Mobile Spy Apps 2017. (2017). https:\/\/trymobilespy.com\/"},{"key":"e_1_3_2_1_53_1","unstructured":"Angel Gonzalez Villan and Josep Jorba. 2013. Remote Control of Mobile Devices in Android Platform. CoRR abs\/1310.5850 (2013). http:\/\/arxiv.org\/abs\/1310.5850  Angel Gonzalez Villan and Josep Jorba. 2013. Remote Control of Mobile Devices in Android Platform. CoRR abs\/1310.5850 (2013). http:\/\/arxiv.org\/abs\/1310.5850"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.055"},{"volume-title":"USENIX Security Symposium.","year":"2011","author":"Walls Robert J","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.009"},{"key":"e_1_3_2_1_57_1","unstructured":"Elena Yurkina. 2017. Surveillance in the workplace: States' positive obligations in the case-law of the European Court of Human Rights. (2017). http:\/\/www.dpceonline.it\/index.php\/dpceonline\/article\/view\/457  Elena Yurkina. 2017. Surveillance in the workplace: States' positive obligations in the case-law of the European Court of Human Rights. (2017). http:\/\/www.dpceonline.it\/index.php\/dpceonline\/article\/view\/457"},{"key":"e_1_3_2_1_58_1","unstructured":"Christoph Zauner. 2010. Implementation and benchmarking of perceptual image hash functions. na.  Christoph Zauner. 2010. Implementation and benchmarking of perceptual image hash functions. na."}],"event":{"name":"WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Stockholm Sweden","acronym":"WiSec '18"},"container-title":["Proceedings of the 11th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212480.3212503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3212480.3212503","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3212480.3212503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:16Z","timestamp":1750287256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212480.3212503"}},"subtitle":["An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance"],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":58,"alternative-id":["10.1145\/3212480.3212503","10.1145\/3212480"],"URL":"https:\/\/doi.org\/10.1145\/3212480.3212503","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}