{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:55:34Z","timestamp":1752674134189,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-17-1-0039"],"award-info":[{"award-number":["W911NF-17-1-0039"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006601","name":"Ministero degli Affari Esteri e della Cooperazione Internazionale","doi-asserted-by":"publisher","award":["PGR00814"],"award-info":[{"award-number":["PGR00814"]}],"id":[{"id":"10.13039\/501100006601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359814","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"328-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting (absent) app-to-app authentication on cross-device short-distance channels"],"prefix":"10.1145","author":[{"given":"Stefano","family":"Cristalli","sequence":"first","affiliation":[{"name":"University of Milan, Milan, Italy"}]},{"given":"Long","family":"Lu","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Danilo","family":"Bruschi","sequence":"additional","affiliation":[{"name":"University of Milan, Milan, Italy"}]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[{"name":"University of Milan, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Android BluetoothChat Sample. https:\/\/github.com\/googlesamples\/android-BluetoothChat. Accessed: 2019-01-18.  [n.d.]. Android BluetoothChat Sample. https:\/\/github.com\/googlesamples\/android-BluetoothChat. Accessed: 2019-01-18."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. ProGuard. https:\/\/www.guardsquare.com\/en\/products\/proguard. Accessed: 2018-11-19.  [n.d.]. ProGuard. https:\/\/www.guardsquare.com\/en\/products\/proguard. Accessed: 2018-11-19."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Shrink your code and resources. https:\/\/developer.android.com\/studio\/build\/shrink-code. Accessed: 2018-11-19.  [n.d.]. Shrink your code and resources. https:\/\/developer.android.com\/studio\/build\/shrink-code. Accessed: 2018-11-19."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. WiFi Direct +. https:\/\/play.google.com\/store\/apps\/details?id=com.netcompss_gh.wifidirect. Accessed: 2019-02-15.  [n.d.]. WiFi Direct +. https:\/\/play.google.com\/store\/apps\/details?id=com.netcompss_gh.wifidirect. Accessed: 2019-02-15."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2009.5335562"},{"key":"e_1_3_2_1_8_1","first-page":"86","article-title":"Extending Formal Analysis of Mobile Device Authentication","volume":"1","author":"Claycomb William R.","year":"2011","unstructured":"William R. Claycomb and Dongwan Shin . 2011 . Extending Formal Analysis of Mobile Device Authentication . J. Internet Serv. Inf. Secur. 1 (2011), 86 -- 102 . William R. Claycomb and Dongwan Shin. 2011. Extending Formal Analysis of Mobile Device Authentication. J. Internet Serv. Inf. Secur. 1 (2011), 86--102.","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-15773"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Soteris Demetriou Xiao-yong Zhou Muhammad Naveed Yeonjoon Lee Kan Yuan XiaoFeng Wang and Carl A Gunter. 2015. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.. In NDSS.  Soteris Demetriou Xiao-yong Zhou Muhammad Naveed Yeonjoon Lee Kan Yuan XiaoFeng Wang and Carl A Gunter. 2015. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.. In NDSS.","DOI":"10.14722\/ndss.2015.23098"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2013THP0011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"e_1_3_2_1_14_1","unstructured":"Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183.  Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2410768"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6812292"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.48"},{"key":"e_1_3_2_1_20_1","volume-title":"Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. In NDSS.","author":"Naveed Muhammad","year":"2014","unstructured":"Muhammad Naveed , Xiao-yong Zhou, Soteris Demetriou , XiaoFeng Wang , and Carl A Gunter . 2014 . Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. In NDSS. Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, and Carl A Gunter. 2014. Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. In NDSS."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6590055"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243785"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978297"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7579020"},{"volume-title":"Pervasive Services, 2006 ACS\/IEEE International Conference on. IEEE, 173--180","author":"Dongwan","key":"e_1_3_2_1_27_1","unstructured":"Dongwan Shin et al. 2006. Using a two dimensional colorized barcode solution for authentication in pervasive computing . In Pervasive Services, 2006 ACS\/IEEE International Conference on. IEEE, 173--180 . Dongwan Shin et al. 2006. Using a two dimensional colorized barcode solution for authentication in pervasive computing. In Pervasive Services, 2006 ACS\/IEEE International Conference on. IEEE, 173--180."},{"key":"e_1_3_2_1_28_1","unstructured":"Dirk Balfanz Smetters Dirk Balfanz D. K. Smetters Paul Stewart and H. Chi Wong. 2002. Talking To Strangers: Authentication in Ad-Hoc Wireless Networks.  Dirk Balfanz Smetters Dirk Balfanz D. K. Smetters Paul Stewart and H. Chi Wong. 2002. Talking To Strangers: Authentication in Ad-Hoc Wireless Networks."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359814","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":30,"alternative-id":["10.1145\/3359789.3359814","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359814","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}