{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:40Z","timestamp":1773511180238,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338498.3358650","type":"proceedings-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T18:15:00Z","timestamp":1573496100000},"page":"135-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["MagneticSpy"],"prefix":"10.1145","author":[{"given":"Nikolay","family":"Matyunin","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Tolga","family":"Arul","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Kristian","family":"Kullmann","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Jakub","family":"Szefer","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Android 9 Behaviour changes: all apps.https:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all  [n.d.]. Android 9 Behaviour changes: all apps.https:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Android Debug Bridge (adb) | Android Developers https:\/\/developer.android.com\/studio\/command-line\/adb  [n.d.]. Android Debug Bridge (adb) | Android Developers https:\/\/developer.android.com\/studio\/command-line\/adb"},{"key":"e_1_3_2_1_3_1","volume-title":"Android market history data and ranklists | 2011 -","year":"2018","unstructured":"[n.d.]. Android market history data and ranklists | 2011 - 2018 . https:\/\/www.androidrank.org\/ [n.d.]. Android market history data and ranklists | 2011 - 2018. https:\/\/www.androidrank.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Android Open Source Project: Bug 23310674: Enable hidepid=2 on proc. https:\/\/android- review.googlesource.com\/c\/platform\/system\/core\/+\/181345  [n.d.]. Android Open Source Project: Bug 23310674: Enable hidepid=2 on proc. https:\/\/android- review.googlesource.com\/c\/platform\/system\/core\/+\/181345"},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Apple Developer Documentation | Core Motion Framework. https:\/\/developer.apple.com\/documentation\/coremotion  [n.d.]. Apple Developer Documentation | Core Motion Framework. https:\/\/developer.apple.com\/documentation\/coremotion"},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Apple Developer Documentation | Preparing Your UI to Run in the Back-ground. https:\/\/developer.apple.com\/documentation\/uikit\/app_and_scenes\/preparing_your_ui_to_run_in_the_background  [n.d.]. Apple Developer Documentation | Preparing Your UI to Run in the Back-ground. https:\/\/developer.apple.com\/documentation\/uikit\/app_and_scenes\/preparing_your_ui_to_run_in_the_background"},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. Application Sandbox | Android Open Source Project. https:\/\/source.android.com\/security\/app- sandbox  [n.d.]. Application Sandbox | Android Open Source Project. https:\/\/source.android.com\/security\/app- sandbox"},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. AWS Device Farm.http:\/\/aws.amazon.com\/device-farm\/  [n.d.]. AWS Device Farm.http:\/\/aws.amazon.com\/device-farm\/"},{"key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. Background Execution Limits | Android Developers. https:\/\/developer.android.com\/about\/versions\/oreo\/background  [n.d.]. Background Execution Limits | Android Developers. https:\/\/developer.android.com\/about\/versions\/oreo\/background"},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Distribution dashboard | Android Developers.https:\/\/developer.android.com\/about\/dashboards\/  [n.d.]. Distribution dashboard | Android Developers.https:\/\/developer.android.com\/about\/dashboards\/"},{"key":"e_1_3_2_1_11_1","unstructured":"[n.d.]. Google Issue Tracker: 37140047: Android O prevents access to \/proc\/stat. https:\/\/issuetracker.google.com\/issues\/37140047  [n.d.]. Google Issue Tracker: 37140047: Android O prevents access to \/proc\/stat. https:\/\/issuetracker.google.com\/issues\/37140047"},{"key":"e_1_3_2_1_12_1","unstructured":"[n.d.]. Majestic Million - Majestic.https:\/\/majestic.com\/reports\/majestic- million  [n.d.]. Majestic Million - Majestic.https:\/\/majestic.com\/reports\/majestic- million"},{"key":"e_1_3_2_1_13_1","unstructured":"[n.d.]. MDN web docs: User-Agent - HTTP.https:\/\/developer.mozilla.org\/en- US\/docs\/Web\/HTTP\/Headers\/User- Agent  [n.d.]. MDN web docs: User-Agent - HTTP.https:\/\/developer.mozilla.org\/en- US\/docs\/Web\/HTTP\/Headers\/User- Agent"},{"key":"e_1_3_2_1_14_1","unstructured":"[n.d.]. Sensors overview | Android Developers. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview  [n.d.]. Sensors overview | Android Developers. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview"},{"key":"e_1_3_2_1_15_1","unstructured":"[n.d.]. Visual Studio AppCenter. https:\/\/visualstudio.microsoft.com\/app- center\/  [n.d.]. Visual Studio AppCenter. https:\/\/visualstudio.microsoft.com\/app- center\/"},{"key":"e_1_3_2_1_16_1","unstructured":"[n.d.]. WebKit WebView | Android Developers. https:\/\/developer.android.com\/reference\/android\/webkit\/WebView  [n.d.]. WebKit WebView | Android Developers. https:\/\/developer.android.com\/reference\/android\/webkit\/WebView"},{"key":"e_1_3_2_1_17_1","unstructured":"Alexa Internet Inc. [n.d.]. Alexa Top 500 Global Sites. https:\/\/www.alexa.com\/topsites  Alexa Internet Inc. [n.d.]. Alexa Top 500 Global Sites. https:\/\/www.alexa.com\/topsites"},{"key":"e_1_3_2_1_18_1","unstructured":"Apple corp. [n.d.]. iOS Security Guide. https:\/\/www.apple.com\/business\/site\/docs\/iOS_Security_Guide.pdf  Apple corp. [n.d.]. iOS Security Guide. https:\/\/www.apple.com\/business\/site\/docs\/iOS_Security_Guide.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Financial Cryptography and Data Security - 19th International Conference","author":"Biedermann Sebastian","year":"2015","unstructured":"Sebastian Biedermann , Stefan Katzenbeisser , and Jakub Szefer . 2015. Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors . In Financial Cryptography and Data Security - 19th International Conference , 2015 . 489--496. Sebastian Biedermann, Stefan Katzenbeisser, and Jakub Szefer. 2015. Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. In Financial Cryptography and Data Security - 19th International Conference, 2015. 489--496."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_21_1","volume-title":"New York)","volume":"54","author":"Cai Yongyao","year":"2012","unstructured":"Yongyao Cai , Yang Zhao , Xianfeng Ding , and James Fennelly . 2012 . Magnetometer basics for mobile phone applications. Electron. Prod.(Garden City , New York) , Vol. 54 , 2 (2012). Yongyao Cai, Yang Zhao, Xianfeng Ding, and James Fennelly. 2012. Magnetometer basics for mobile phone applications. Electron. Prod.(Garden City, New York), Vol. 54, 2 (2012)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855840.1855861"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium. 1037--1052","author":"Chen Qi Alfred","year":"2014","unstructured":"Qi Alfred Chen , Zhiyun Qian , and Zhuoqing Morley Mao . 2014 . Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks . In Proceedings of the 23rd USENIX Security Symposium. 1037--1052 . Qi Alfred Chen, Zhiyun Qian, and Zhuoqing Morley Mao. 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proceedings of the 23rd USENIX Security Symposium. 1037--1052."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057232"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_39"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"e_1_3_2_1_28_1","unstructured":"Eric Enge. [n.d.]. Mobile vs Desktop Usage in 2018: Mobile takes the lead. https:\/\/www.stonetemple.com\/mobile-vs-desktop-usage-study\/  Eric Enge. [n.d.]. Mobile vs Desktop Usage in 2018: Mobile takes the lead. https:\/\/www.stonetemple.com\/mobile-vs-desktop-usage-study\/"},{"key":"e_1_3_2_1_29_1","volume-title":"22nd European Symposium on Research in Computer Security","author":"Berk G\u00fc","year":"2017","unstructured":"Berk G\u00fc lmezoglu, Andreas Zankl , Thomas Eisenbarth , and Berk Sunar . 2017 . Perf Web: How to Violate Web Privacy with Hardware Performance Events . In 22nd European Symposium on Research in Computer Security , Oslo, Norway. 80--97. Berk G\u00fc lmezoglu, Andreas Zankl, Thomas Eisenbarth, and Berk Sunar. 2017. Perf Web: How to Violate Web Privacy with Hardware Performance Events. In 22nd European Symposium on Research in Computer Security, Oslo, Norway. 80--97."},{"key":"e_1_3_2_1_30_1","volume-title":"Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields. arXiv preprint arXiv:1802.02317","author":"Guri Mordechai","year":"2018","unstructured":"Mordechai Guri , Andrey Daidakulov , and Yuval Elovici . 2018 . Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields. arXiv preprint arXiv:1802.02317 (2018). Mordechai Guri, Andrey Daidakulov, and Yuval Elovici. 2018. Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields. arXiv preprint arXiv:1802.02317 (2018)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0071325"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","author":"Marc Ju\u00e1","year":"2014","unstructured":"Marc Ju\u00e1 rez, Sadia Afroz , Gunes Acar , Claudia D'i az, and Rachel Greenstadt . 2014 . A Critical Evaluation of Website Fingerprinting Attacks . In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , Scottsdale, AZ, USA , November 3-7, 2014. 263--274. Marc Ju\u00e1 rez, Sadia Afroz, Gunes Acar, Claudia D'i az, and Rachel Greenstadt. 2014. A Critical Evaluation of Website Fingerprinting Attacks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. 263--274."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0036"},{"key":"e_1_3_2_1_35_1","volume-title":"27th USENIX Security Symposium .","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In 27th USENIX Security Symposium . Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium ."},{"key":"e_1_3_2_1_36_1","unstructured":"Tina Lu. [n.d.]. Almost Half Of Smartphone Users Spend More Than 5 Hours A Day on Their Mobile Device. https:\/\/www.counterpointresearch.com\/almost-half-of-smartphone-users-spend-more-than-5-hours-a-day-on-their-mobile-device\/  Tina Lu. [n.d.]. Almost Half Of Smartphone Users Spend More Than 5 Hours A Day on Their Mobile Device. https:\/\/www.counterpointresearch.com\/almost-half-of-smartphone-users-spend-more-than-5-hours-a-day-on-their-mobile-device\/"},{"key":"e_1_3_2_1_37_1","volume-title":"Spyros Boukoros, Markus Heinrich, Andr\u00e9 Schaller, Maksim Kolinichenko, and Stefan Katzenbeisser.","author":"Matyunin Nikolay","year":"2018","unstructured":"Nikolay Matyunin , Nikolaos Athanasios Anagnostopoulos , Spyros Boukoros, Markus Heinrich, Andr\u00e9 Schaller, Maksim Kolinichenko, and Stefan Katzenbeisser. 2018 . Tracking Private Browsing Sessions using CPU-based Covert Channels. In WiSec . Nikolay Matyunin, Nikolaos Athanasios Anagnostopoulos, Spyros Boukoros, Markus Heinrich, Andr\u00e9 Schaller, Maksim Kolinichenko, and Stefan Katzenbeisser. 2018. Tracking Private Browsing Sessions using CPU-based Covert Channels. In WiSec."},{"key":"e_1_3_2_1_38_1","volume-title":"ASP-DAC","author":"Matyunin Nikolay","year":"2016","unstructured":"Nikolay Matyunin , Jakub Szefer , Sebastian Biedermann , and Stefan Katzenbeisser . 2016. Covert channels using mobile device's magnetic field sensors . In ASP-DAC 2016 , Macao . Nikolay Matyunin, Jakub Szefer, Sebastian Biedermann, and Stefan Katzenbeisser. 2016. Covert channels using mobile device's magnetic field sensors. In ASP-DAC 2016, Macao."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0369-x"},{"key":"e_1_3_2_1_40_1","volume-title":"The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. ACM SIGSAC CCS","author":"Oren Yossef","year":"2015","unstructured":"Yossef Oren , Vasileios P Kemerlis , Simha Sethumadhavan , and Angelos D Keromytis . 2015. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. ACM SIGSAC CCS ( 2015 ). arxiv: 1502.0737 Yossef Oren, Vasileios P Kemerlis, Simha Sethumadhavan, and Angelos D Keromytis. 2015. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. ACM SIGSAC CCS (2015). arxiv: 1502.0737"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_42_1","unstructured":"Alexander Shalamov and Mikhail Pozdnyakov. [n.d.]. Sensors for the Web! https:\/\/developers.google.com\/web\/updates\/2017\/09\/sensors-for-the-web  Alexander Shalamov and Mikhail Pozdnyakov. [n.d.]. Sensors for the Web! https:\/\/developers.google.com\/web\/updates\/2017\/09\/sensors-for-the-web"},{"key":"e_1_3_2_1_43_1","volume-title":"Robust Website Fingerprinting Through the Cache Occupancy Channel. In 28th USENIX Security Symposium ($$USENIX$$ Security 19)","author":"Shusterman Anatoly","year":"2019","unstructured":"Anatoly Shusterman , Lachlan Kang , Yarden Haskal , Yosef Meltser , Prateek Mittal , Yossi Oren , and Yuval Yarom . 2019 . Robust Website Fingerprinting Through the Cache Occupancy Channel. In 28th USENIX Security Symposium ($$USENIX$$ Security 19) . 639--656. Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, and Yuval Yarom. 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel. In 28th USENIX Security Symposium ($$USENIX$$ Security 19). 639--656."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0020"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939922"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security.","author":"Spreitzer Raphael","year":"2018","unstructured":"Raphael Spreitzer , Felix Kirchengast , Daniel Gruss , and Stefan Mangard . 2018 a. Proc Harvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android . In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, and Stefan Mangard. 2018a. Proc Harvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212506"},{"key":"e_1_3_2_1_48_1","unstructured":"Lexi Sydow and Sam Cheney. [n.d.]. 2017 Retrospective: A Monumental Year for the App Economy. https:\/\/www.appannie.com\/en\/insights\/market-data\/app-annie-2017-retrospective\/  Lexi Sydow and Sam Cheney. [n.d.]. 2017 Retrospective: A Monumental Year for the App Economy. https:\/\/www.appannie.com\/en\/insights\/market-data\/app-annie-2017-retrospective\/"},{"key":"e_1_3_2_1_49_1","unstructured":"Rick Waldron Mikhail Pozdnyakov and Alexander Shalamov. [n.d.]. Generic Sensor API. W3C Candidate Recommendation. https:\/\/www.w3.org\/TR\/generic-sensor\/  Rick Waldron Mikhail Pozdnyakov and Alexander Shalamov. [n.d.]. Generic Sensor API. W3C Candidate Recommendation. https:\/\/www.w3.org\/TR\/generic-sensor\/"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_51_1","unstructured":"Lin Yan Yao Guo Xiangqun Chen and Hong Mei. 2015. A Study on Power Side Channels on Mobile Devices. (2015). arxiv: arXiv:1512.07972v1  Lin Yan Yao Guo Xiangqun Chen and Hong Mei. 2015. A Study on Power Side Channels on Mobile Devices. (2015). arxiv: arXiv:1512.07972v1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639446"},{"key":"e_1_3_2_1_53_1","volume-title":"Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In 18th USENIX Security Symposium","author":"Zhang Kehuan","year":"2009","unstructured":"Kehuan Zhang and XiaoFeng Wang . 2009 . Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In 18th USENIX Security Symposium , Montreal, Canada , August 10-14, 2009, Proceedings. 17--32. Kehuan Zhang and XiaoFeng Wang. 2009. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In 18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings. 17--32."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23260"},{"key":"e_1_3_2_1_55_1","unstructured":"Xiao-yong Zhou Soteris Demetriou Dongjing He Muhammad Naveed Xiaorui Pan XiaoFeng Wang Carl A. Gunter and Klara Nahrstedt. 2013. Identity location disease and more: inferring your secrets from android public resources. In ACM SIGSAC CCS.  Xiao-yong Zhou Soteris Demetriou Dongjing He Muhammad Naveed Xiaorui Pan XiaoFeng Wang Carl A. Gunter and Klara Nahrstedt. 2013. Identity location disease and more: inferring your secrets from android public resources. In ACM SIGSAC CCS."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338498.3358650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358650"}},"subtitle":["Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":55,"alternative-id":["10.1145\/3338498.3358650","10.1145\/3338498"],"URL":"https:\/\/doi.org\/10.1145\/3338498.3358650","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}