{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:31Z","timestamp":1750221091270,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-16-1-0127"],"award-info":[{"award-number":["W911NF-16-1-0127"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1657124"],"award-info":[{"award-number":["1657124"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274752","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"236-251","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Why Johnny Can't Make Money With His Contents"],"prefix":"10.1145","author":[{"given":"Sze Yiu","family":"Chau","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Bincheng","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Iowa"}]},{"given":"Jianxiong","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Omar","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"The University of Iowa"}]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010 (accessed Feb 07 2018). DRM License cacheable. https:\/\/social.msdn.microsoft.com\/Forums\/silverlight\/en-US\/b0220e8a-0660-49aa-8353-18d12ae285dd\/drm-license-cacheable.  2010 (accessed Feb 07 2018). DRM License cacheable. https:\/\/social.msdn.microsoft.com\/Forums\/silverlight\/en-US\/b0220e8a-0660-49aa-8353-18d12ae285dd\/drm-license-cacheable."},{"key":"e_1_3_2_1_2_1","unstructured":"2016 (accessed Feb 07 2018). DMCA security research exemption for consumer devices. https:\/\/www.ftc.gov\/news-events\/blogs\/techftc\/2016\/10\/dmca-security-research-exemption-consumer-devices.  2016 (accessed Feb 07 2018). DMCA security research exemption for consumer devices. https:\/\/www.ftc.gov\/news-events\/blogs\/techftc\/2016\/10\/dmca-security-research-exemption-consumer-devices."},{"key":"e_1_3_2_1_3_1","unstructured":"2017 (accessed Feb 07 2018). SuperSU - Android Apps on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=eu.chainfire.supersu.  2017 (accessed Feb 07 2018). SuperSU - Android Apps on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=eu.chainfire.supersu."},{"key":"e_1_3_2_1_4_1","unstructured":"Andrey Belenko and Dmitry Sklyarov. 2012. \"Secure Password Managers\" and \"Military-Grade Encryption\" on Smartphones: Oh Really? https:\/\/www.elcomsoft.com\/WP\/BH-EU-2012-WP.pdf.  Andrey Belenko and Dmitry Sklyarov. 2012. \"Secure Password Managers\" and \"Military-Grade Encryption\" on Smartphones: Oh Really? https:\/\/www.elcomsoft.com\/WP\/BH-EU-2012-WP.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"Android Developers. (accessed Feb 02 2018). Saving Files - Choose Internal or External Storage. https:\/\/developer.android.com\/training\/data-storage\/files.html# InternalVsExternalStorage.  Android Developers. (accessed Feb 02 2018). Saving Files - Choose Internal or External Storage. https:\/\/developer.android.com\/training\/data-storage\/files.html# InternalVsExternalStorage."},{"key":"e_1_3_2_1_6_1","unstructured":"Andy Boxall. 2015 (accessed Feb 06 2018). 80% of Android phone owners in China have rooted their device. http:\/\/www.businessofapps.com\/80-android-phone-owners-china-rooted-device\/.  Andy Boxall. 2015 (accessed Feb 06 2018). 80% of Android phone owners in China have rooted their device. http:\/\/www.businessofapps.com\/80-android-phone-owners-china-rooted-device\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Daniel J Bernstein. 2005 (accessed Sep 19 2018). Cache-timing attacks on AES. https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf  Daniel J Bernstein. 2005 (accessed Sep 19 2018). Cache-timing attacks on AES. https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 86--103","author":"Biryukov Alex","year":"2012","unstructured":"Alex Biryukov , Ga\u00ebtan Leurent , and Arnab Roy . 2012 . Cryptanalysis of the \"kindle\" cipher . In International Conference on Selected Areas in Cryptography. Springer, 86--103 . Alex Biryukov, Ga\u00ebtan Leurent, and Arnab Roy. 2012. Cryptanalysis of the \"kindle\" cipher. In International Conference on Selected Areas in Cryptography. Springer, 86--103."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235349"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2004.1399154"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1996.535015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"e_1_3_2_1_13_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies.","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies. Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_14_1","unstructured":"Chainfire. 2012 (accessed Feb 07 2018). {CENTRAL} CF-Auto-Root. https:\/\/forum.xda-developers.com\/showthread.php?t=1980683.  Chainfire. 2012 (accessed Feb 07 2018). {CENTRAL} CF-Auto-Root. https:\/\/forum.xda-developers.com\/showthread.php?t=1980683."},{"key":"e_1_3_2_1_15_1","unstructured":"Collin Mulliner and John Kozyrakis. 2017 (accessed Feb 06 2018). Inside Android's SafetyNet Attestation. https:\/\/www.blackhat.com\/docs\/eu-17\/materials\/eu-17-Mulliner-Inside-Androids-SafetyNet-Attestation.pdf.  Collin Mulliner and John Kozyrakis. 2017 (accessed Feb 06 2018). Inside Android's SafetyNet Attestation. https:\/\/www.blackhat.com\/docs\/eu-17\/materials\/eu-17-Mulliner-Inside-Androids-SafetyNet-Attestation.pdf."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM Workshop on Digital Rights Management. Springer, 192--200","author":"Crosby Scott","year":"2001","unstructured":"Scott Crosby , Ian Goldberg , Robert Johnson , Dawn Song , and David Wagner . 2001 . A cryptanalysis of the high-bandwidth digital content protection system . In ACM Workshop on Digital Rights Management. Springer, 192--200 . Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song, and David Wagner. 2001. A cryptanalysis of the high-bandwidth digital content protection system. In ACM Workshop on Digital Rights Management. Springer, 192--200."},{"key":"e_1_3_2_1_17_1","unstructured":"David Ruddock. 2014 (accessed Feb 06 2018). {Weekend Poll} Is Your Primary Android Device Rooted? http:\/\/www.androidpolice.com\/2014\/11\/23\/weekend-poll-is-your-primary-android-device-rooted-2\/.  David Ruddock. 2014 (accessed Feb 06 2018). {Weekend Poll} Is Your Primary Android Device Rooted? http:\/\/www.androidpolice.com\/2014\/11\/23\/weekend-poll-is-your-primary-android-device-rooted-2\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23374"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523675"},{"key":"e_1_3_2_1_20_1","unstructured":"doridori. 2017 (accessed Feb 06 2018). Android-Security-Reference\/TEE.md. https:\/\/github.com\/doridori\/Android-Security-Reference\/blob\/master\/hardware\/TEE.md.  doridori. 2017 (accessed Feb 06 2018). Android-Security-Reference\/TEE.md. https:\/\/github.com\/doridori\/Android-Security-Reference\/blob\/master\/hardware\/TEE.md."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"key":"e_1_3_2_1_22_1","volume-title":"MAZ Systems - New York","author":"Editors of Inc. 2017.","year":"2017","unstructured":"Editors of Inc. 2017. MAZ Systems - New York , NY. ( 2017 ). https:\/\/www.inc.com\/profile\/maz-systems Editors of Inc. 2017. MAZ Systems - New York, NY. (2017). https:\/\/www.inc.com\/profile\/maz-systems"},{"key":"e_1_3_2_1_23_1","volume-title":"Reverse Engineering Conference.","author":"Falcon F","year":"2012","unstructured":"F Falcon and N Riva . 2012 . Dynamic binary instrumentation frameworks: I know you're there spying on me . In Reverse Engineering Conference. F Falcon and N Riva. 2012. Dynamic binary instrumentation frameworks: I know you're there spying on me. In Reverse Engineering Conference."},{"key":"e_1_3_2_1_24_1","volume-title":"Rasmussen","author":"Gasti Paolo","year":"2012","unstructured":"Paolo Gasti and Kasper B . Rasmussen . 2012 . On the Security of Password Manager Database Formats. In Computer Security -- ESORICS 2012. Springer , 770--787. Paolo Gasti and Kasper B. Rasmussen. 2012. On the Security of Password Manager Database Formats. In Computer Security -- ESORICS 2012. Springer, 770--787."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1544138.1544139"},{"key":"e_1_3_2_1_27_1","volume-title":"17th USENIX Security Symposium. 45--60","author":"Halderman J Alex","year":"2008","unstructured":"J Alex Halderman , Seth D Schoen , Nadia Heninger , William Clarkson , William Paul , Joseph A Calandrino , Ariel J Feldman , Jacob Appelbaum , and Edward W Felten . 2008 . Lest we remember: cold boot attacks on encryption keys . In 17th USENIX Security Symposium. 45--60 . J Alex Halderman, Seth D Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A Calandrino, Ariel J Feldman, Jacob Appelbaum, and Edward W Felten. 2008. Lest we remember: cold boot attacks on encryption keys. In 17th USENIX Security Symposium. 45--60."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134035"},{"key":"e_1_3_2_1_29_1","volume-title":"25th USENIX Security Symposium. 757--772","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz , Sajjad Arshad , Collin Mulliner , William Robertson , and Engin Kirda . 2016 . UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware . In 25th USENIX Security Symposium. 757--772 . Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. In 25th USENIX Security Symposium. 757--772."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"e_1_3_2_1_32_1","unstructured":"Xiaoning Li and Kang Li. 2014. Defeating the transparency features of dynamic binary instrumentation. BlackHat US. (2014).  Xiaoning Li and Kang Li. 2014. Defeating the transparency features of dynamic binary instrumentation. BlackHat US. (2014)."},{"key":"e_1_3_2_1_33_1","volume-title":"Download Magisk Manager Latest Version 5.5.5 For Android","author":"Manager Magisk","year":"2018","unstructured":"Magisk Manager . 2018 (accessed Feb 06, 2018). Download Magisk Manager Latest Version 5.5.5 For Android 2018 . https:\/\/magiskmanager.com\/#Magisk_Root_Universal_Systemless_Interface. Magisk Manager. 2018 (accessed Feb 06, 2018). Download Magisk Manager Latest Version 5.5.5 For Android 2018. https:\/\/magiskmanager.com\/#Magisk_Root_Universal_Systemless_Interface."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/github.com\/devadvance\/rootcloak","author":"Matt Joseph Jingran Wang","year":"2016","unstructured":"Jingran Wang Matt Joseph and contributors. 2016. RootCloak. ( 2016 ). https:\/\/github.com\/devadvance\/rootcloak Jingran Wang Matt Joseph and contributors. 2016. RootCloak. (2016). https:\/\/github.com\/devadvance\/rootcloak"},{"key":"e_1_3_2_1_35_1","unstructured":"mediaarcadmin. 2010 (accessed Jan 29 2018). ios_stack\/Sources\/Classes\/DRM\/drmenvelope.h. https:\/\/github.com\/mediaarcadmin\/ios_stack\/blob\/master\/Sources\/Classes\/DRM\/drmenvelope.h.  mediaarcadmin. 2010 (accessed Jan 29 2018). ios_stack\/Sources\/Classes\/DRM\/drmenvelope.h. https:\/\/github.com\/mediaarcadmin\/ios_stack\/blob\/master\/Sources\/Classes\/DRM\/drmenvelope.h."},{"key":"e_1_3_2_1_36_1","unstructured":"Microsoft Corporation. 2015 (accessed Feb 07 2018). Microsoft PlayReady Content Protection Technology. https:\/\/www.microsoft.com\/playready\/documents\/.  Microsoft Corporation. 2015 (accessed Feb 07 2018). Microsoft PlayReady Content Protection Technology. https:\/\/www.microsoft.com\/playready\/documents\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Microsoft Corporation. 2017 (accessed Feb 07 2018). PlayReady Header Specification. https:\/\/www.microsoft.com\/playready\/documents\/.  Microsoft Corporation. 2017 (accessed Feb 07 2018). PlayReady Header Specification. https:\/\/www.microsoft.com\/playready\/documents\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.42"},{"key":"e_1_3_2_1_39_1","unstructured":"MITRE Corporation. 2018 (accessed Feb 05 2018). CVE-2018--5686. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-5686.  MITRE Corporation. 2018 (accessed Feb 05 2018). CVE-2018--5686. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-5686."},{"key":"e_1_3_2_1_40_1","unstructured":"Bernhard Mueller and Sven Schleier. 2018. OWASP Mobile App Security Requirements and Verification v 1.0. (2018). https:\/\/github.com\/OWASP\/owasp-masvs\/releases\/download\/1.0\/OWASP_Mobile_AppSec_Verification_Standard_v1.0.pdf  Bernhard Mueller and Sven Schleier. 2018. OWASP Mobile App Security Requirements and Verification v 1.0. (2018). https:\/\/github.com\/OWASP\/owasp-masvs\/releases\/download\/1.0\/OWASP_Mobile_AppSec_Verification_Standard_v1.0.pdf"},{"key":"e_1_3_2_1_41_1","unstructured":"Nahuel Cayetano Riva. 2015 (accessed Feb 06 2018). Anti-instrumentation techniques: I know you 're there Frida! https:\/\/crackinglandia.wordpress.com\/2015\/11\/10\/anti-instrumentation-techniques-i-know-youre-there-frida\/.  Nahuel Cayetano Riva. 2015 (accessed Feb 06 2018). Anti-instrumentation techniques: I know you 're there Frida! https:\/\/crackinglandia.wordpress.com\/2015\/11\/10\/anti-instrumentation-techniques-i-know-youre-there-frida\/."},{"key":"e_1_3_2_1_42_1","volume-title":"Ninja: Towards Transparent Tracing and Debugging on ARM. In 26th USENIX Security Symposium. 33--49","author":"Ning Zhenyu","year":"2017","unstructured":"Zhenyu Ning and Fengwei Zhang . 2017 . Ninja: Towards Transparent Tracing and Debugging on ARM. In 26th USENIX Security Symposium. 33--49 . Zhenyu Ning and Fengwei Zhang. 2017. Ninja: Towards Transparent Tracing and Debugging on ARM. In 26th USENIX Security Symposium. 33--49."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium. 17--32","author":"Reaves Bradley","year":"2015","unstructured":"Bradley Reaves , Nolen Scaife , Adam M Bates , Patrick Traynor , and Kevin RB Butler . 2015 . Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World .. In USENIX Security Symposium. 17--32 . Bradley Reaves, Nolen Scaife, Adam M Bates, Patrick Traynor, and Kevin RB Butler. 2015. Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World.. In USENIX Security Symposium. 17--32."},{"key":"e_1_3_2_1_44_1","unstructured":"Rohit Salecha. 2017 (accessed Feb 06 2018). Pentesting Android Apps Using Frida. https:\/\/www.notsosecure.com\/pentesting-android-apps-using-frida\/.  Rohit Salecha. 2017 (accessed Feb 06 2018). Pentesting Android Apps Using Frida. https:\/\/www.notsosecure.com\/pentesting-android-apps-using-frida\/."},{"key":"e_1_3_2_1_45_1","unstructured":"Ryne Hager. 2017 (accessed Feb 06 2018). Google may have updated SafetyNet detection breaking some root hiding. http:\/\/www.androidpolice.com\/2017\/06\/14\/google-may-updated-safetynet-detection-breaking-root-hiding-methods\/.  Ryne Hager. 2017 (accessed Feb 06 2018). Google may have updated SafetyNet detection breaking some root hiding. http:\/\/www.androidpolice.com\/2017\/06\/14\/google-may-updated-safetynet-detection-breaking-root-hiding-methods\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Ryne Hager. 2017 (accessed Feb 06 2018). SafetyNet can detect Magisk again but a fix is in the works. http:\/\/www.androidpolice.com\/2017\/07\/16\/safetynet-can-detect-magisk-fix-works\/.  Ryne Hager. 2017 (accessed Feb 06 2018). SafetyNet can detect Magisk again but a fix is in the works. http:\/\/www.androidpolice.com\/2017\/07\/16\/safetynet-can-detect-magisk-fix-works\/."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"e_1_3_2_1_48_1","volume-title":"Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020","author":"Sgandurra Daniele","year":"2016","unstructured":"Daniele Sgandurra , Luis Mu\u00f1oz-Gonz\u00e1lez , Rabih Mohsen , and Emil C Lupu . 2016. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 ( 2016 ). Daniele Sgandurra, Luis Mu\u00f1oz-Gonz\u00e1lez, Rabih Mohsen, and Emil C Lupu. 2016. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 (2016)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_50_1","volume-title":"Password Managers: Attacks and Defenses. In 23rd USENIX Security Symposium. 449--464","author":"Silver David","year":"2014","unstructured":"David Silver , Suman Jana , Dan Boneh , Eric Chen , and Collin Jackson . 2014 . Password Managers: Attacks and Defenses. In 23rd USENIX Security Symposium. 449--464 . David Silver, Suman Jana, Dan Boneh, Eric Chen, and Collin Jackson. 2014. Password Managers: Attacks and Defenses. In 23rd USENIX Security Symposium. 449--464."},{"key":"e_1_3_2_1_51_1","unstructured":"Synk Security Team. 2018. Zip Slip Vulnerability. (2018). https:\/\/github.com\/snyk\/zip-slip-vulnerability  Synk Security Team. 2018. Zip Slip Vulnerability. (2018). https:\/\/github.com\/snyk\/zip-slip-vulnerability"},{"volume-title":"Security, Steganography, and Watermarking of Multimedia Contents IX","author":"Topkara Mercan","key":"e_1_3_2_1_52_1","unstructured":"Mercan Topkara , Umut Topkara , and Mikhail J Atallah . 2007. Information hiding through errors: a confusing approach . In Security, Steganography, and Watermarking of Multimedia Contents IX , Vol. 6505 . International Society for Optics and Photonics . Mercan Topkara, Umut Topkara, and Mikhail J Atallah. 2007. Information hiding through errors: a confusing approach. In Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505. International Society for Optics and Photonics."},{"key":"e_1_3_2_1_53_1","volume-title":"Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. In USENIX Security Symposium. 687--702","author":"Wang Ruoyu","year":"2013","unstructured":"Ruoyu Wang , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2013 . Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. In USENIX Security Symposium. 687--702 . Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2013. Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. In USENIX Security Symposium. 687--702."}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"San Juan PR USA","acronym":"ACSAC '18"},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274752","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274752"}},"subtitle":["Pitfalls of Designing and Implementing Content Delivery Apps"],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":53,"alternative-id":["10.1145\/3274694.3274752","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274752","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}