{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:30Z","timestamp":1765841910665,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011199","name":"European Research Council","doi-asserted-by":"publisher","award":["ERC-StG-679158"],"award-info":[{"award-number":["ERC-StG-679158"]}],"id":[{"id":"10.13039\/100011199","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423656","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"710-723","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Who's left behind?"],"prefix":"10.1145","author":[{"given":"John P.","family":"Rula","sequence":"first","affiliation":[{"name":"Akamai"}]},{"given":"Philipp","family":"Richter","sequence":"additional","affiliation":[{"name":"Akamai \/ MIT"}]},{"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Arthur","family":"Berger","sequence":"additional","affiliation":[{"name":"Akamai \/ MIT"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2018. Android Security 2017 Year In Review. Android Open Source Project https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2017_Report_Final.pdf."},{"key":"e_1_3_2_2_2_1","unstructured":"2019. Android Security 2018 Year In Review. Android Open Source Project https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2018_Report_Final.pdf."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. WhatIsMyBrowser.com Developers. https:\/\/developers.whatismybrowser. com\/useragents\/explore\/hardware_type_specific\/phone\/."},{"key":"e_1_3_2_2_4_1","unstructured":"Amazon. 2020. Amazon Appstore App For Android. https:\/\/www.amazon.com\/gp\/mas\/get\/amazonapp."},{"volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis M.","key":"e_1_3_2_2_5_1","unstructured":"M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"key":"e_1_3_2_2_6_1","unstructured":"Apple. 2020. Apple App Store. https:\/\/www.apple.com\/ios\/app-store\/."},{"key":"e_1_3_2_2_7_1","unstructured":"Apple. 2020. Apple security updates. https:\/\/support.apple.com\/en-us\/HT201222."},{"key":"e_1_3_2_2_8_1","unstructured":"K. Chiu. 2020. Windows 7 is gone but China's dedicated users aren't ready to let go. https:\/\/www.abacusnews.com\/culture\/windows-7-gone-chinas-dedicated-users-arent-ready-let-go\/article\/3046210."},{"key":"e_1_3_2_2_9_1","unstructured":"CISCO. 2020. Cisco Annual Internet Report (2018-2023) White Paper. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html."},{"key":"e_1_3_2_2_10_1","unstructured":"US Federal Trade Commission. 2016. FTC To Study Mobile Device Industry's Security Update Practices. https:\/\/www.ftc.gov\/news-events\/press-releases\/2016\/05\/ftc-study-mobile-device-industrys-security-update-practices."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"L. F. DeKoven A. Randall A. Mirian G. Akiwate A. Blume L. K. Saul A. Schulman G. M. Voelker and S. Savage. 2019. Measuring Security Practices and How They Impact Security. In ACM IMC.","DOI":"10.1145\/3355369.3355571"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Z. Durumeric F. Li J. Kasten J. Amann J. Beekman M. Payer N. Weaver D. Adrian V. Paxson M. Bailey and J. A. Halderman. 2014. The Matter of Heartbleed. In ACM IMC.","DOI":"10.1145\/2663716.2663755"},{"volume-title":"USENIX Security Symposium.","author":"Durumeric Z.","key":"e_1_3_2_2_13_1","unstructured":"Z. Durumeric, E. Wustrow, and J. A. Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"P. Eckersley. 2010. How Unique Is Your Web Browser?. In Privacy Enhancing Technologies (PETS).","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"e_1_3_2_2_15_1","unstructured":"Ericsson. 2020. Mobile data traffic outlook. https:\/\/www.ericsson.com\/en\/mobility-report\/reports\/june-2020\/mobile-data-traffic-outlook."},{"key":"e_1_3_2_2_16_1","unstructured":"M. Ester H.-P. Kriegel J. Sander and X. Xu. 1996. A Density-based Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. (1996)."},{"volume-title":"Facebook: Free Basics. https:\/\/connectivity.fb.com\/free-basics\/.","year":"2020","key":"e_1_3_2_2_17_1","unstructured":"Facebook. 2020. Facebook: Free Basics. https:\/\/connectivity.fb.com\/free-basics\/."},{"key":"e_1_3_2_2_18_1","unstructured":"Federal Trade Commision. 2018. Mobile Security Updates: Understanding the Issues."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"R. Fielding J. Gettys J. Mogul H. Frystyk L. Masinter P. Leach and T. Berners-Lee. 1999. Hypertext Transfer Protocol - HTTP\/1.1. RFC 2616. IETF. http:\/\/tools.ietf.org\/rfc\/rfc2616.txt","DOI":"10.17487\/rfc2616"},{"volume-title":"European lawmakers propose a 'right to repair' for mobiles and laptops. [online]","year":"2020","key":"e_1_3_2_2_20_1","unstructured":"Natasha Lomas for techcrunch.com. 2020. European lawmakers propose a 'right to repair' for mobiles and laptops. [online] March 11, 2020, https:\/\/techcrunch.com\/2020\/03\/11\/european-lawmakers-propose-a-right-to-repair-for-mobiles-and-laptops\/."},{"key":"e_1_3_2_2_21_1","unstructured":"A. Forget S. Pearman J. Thomas A. Acquisti N. Christin L. Faith Cranor S. Egelman M. Harbach and R. Telang. 2016. Do or Do Not There Is No Try: UserEngagement May Not Improve Security Outcomes. In USENIX SOUPS."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"S. Frei T. Duebendorfer and B. Plattner. 2009. Firefox (In)Security Update Dynamics Exposed. ACM CCR 39 1 (2009).","DOI":"10.1145\/1496091.1496094"},{"key":"e_1_3_2_2_23_1","unstructured":"Google. 2020. Google Play Store. https:\/\/play.google.com\/store."},{"key":"e_1_3_2_2_24_1","volume":"201","author":"Kline J.","unstructured":"J. Kline, A. Cahn, P. Barford, and J. Sommers. 2017. On the Structure and Characteristics of User Agent Strings. In ACM IMC.","journal-title":"J. Sommers."},{"key":"e_1_3_2_2_25_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan","author":"Kocher P.","year":"2018","unstructured":"P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. ArXiv e-prints (Jan 2018). arXiv:1801.01203"},{"key":"e_1_3_2_2_26_1","volume-title":"Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web. In USENIX Security.","author":"Li F.","year":"2020","unstructured":"F. Li. 2020. Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web. In USENIX Security."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"F. Li and V. Paxson. 2017. A Large-Scale Empirical Study of Security Patches.","DOI":"10.1145\/3133956.3134072"},{"key":"e_1_3_2_2_28_1","unstructured":"M. Lipp M. Schwarz D. Gruss T. Prescher W. Haas S. Mangard P. Kocher D. Genkin Y. Yarom and M. Hamburg. 2018. Meltdown. ArXiv e-prints (Jan 2018). arXiv:1801.01207"},{"key":"e_1_3_2_2_29_1","unstructured":"A. Mathur and M. Chetty. 2017. Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates. In USENIX SOUPS."},{"volume-title":"The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. In IEEE Symp. on Security and Privacy.","author":"Nappa A.","key":"e_1_3_2_2_30_1","unstructured":"A. Nappa, R. Johnson, L. Bilge, J. Caballero, and T. Dumitras. 2015. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. In IEEE Symp. on Security and Privacy."},{"key":"e_1_3_2_2_31_1","volume-title":"Mind the Gap: Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis. HITB Conference","author":"Nohl K.","year":"2018","unstructured":"K. Nohl and J. Lell. 2018. Mind the Gap: Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis. HITB Conference 2018."},{"key":"e_1_3_2_2_32_1","volume-title":"Apps: A Systematic Study of the Mobile App Ecosystem. In ACM IMC.","author":"Petsas T.","year":"2013","unstructured":"T. Petsas, A. Papadogiannakis, M. Polychronakis, E. P. Markatos, and T. Karagiannis. 2013. Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem. In ACM IMC."},{"key":"e_1_3_2_2_33_1","unstructured":"Scientific Policy Department for Economic and Quality of Life Policies Directorate-General for Internal Policies. 2020. Sustainable Consumption and Consumer Protection Legislation."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"A. Razaghpanah R. Nithyanand N. Vallina-Rodriguez S. Sundaresan M. Allman C. Kreibich and P. Gill. 2018. Apps Trackers Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. In NDSS.","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"J. Ren D. J. Dubois D. Choffnes A. M. Mandalari R. Kolcun and H. Haddadi. 2019. Information Exposure From Consumer IoT Devices: A Multidimensional Network-Informed Measurement Approach. In ACM IMC.","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"J. Ren M. Lindorfer D. Dubois A. Rao D. Choffnes and N. Vallina-Rodriguez. 2018. Bug Fixes Improvements ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. In NDSS.","DOI":"10.14722\/ndss.2018.23143"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987473"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"P. Richter F. Wohlfart N. Vallina-Rodriguez M. Allman R. Bush A. Feldmann C. Kreibich N. Weaver and V. Paxson. 2016. A Multi-Perspective Analysis of Carrier-Grade NAT Deployment. In ACM IMC.","DOI":"10.1145\/2987443.2987474"},{"key":"e_1_3_2_2_39_1","unstructured":"Samsung. 2020. What version of Android can I upgrade my Samsung phone to? https:\/\/www.samsung.com\/au\/support\/mobile-devices\/android-version-availability\/."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"A. Sarabi Z. Zhu C. Xiao M. Liu and T. Dumitras. 2017. Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State. In PAM.","DOI":"10.1007\/978-3-319-54328-4_9"},{"key":"e_1_3_2_2_41_1","volume-title":"Walled Garden: Deconstructing Facebook's Free Basics Program. ACM CCR 47, 5","author":"Sen R.","year":"2018","unstructured":"R. Sen, S. Ahmad, A. Phokeer, Z. A. Farooq, I. A. Qazi, D. Choffnes, and K. P. Gummadi. 2018. Inside the Walled Garden: Deconstructing Facebook's Free Basics Program. ACM CCR 47, 5 (2018)."},{"key":"e_1_3_2_2_42_1","unstructured":"International Telecommunication Union. 2020. ICT Data and Statistics. https:\/\/www.itu.int\/ITU-D\/ict\/statistics\/ict\/."},{"key":"e_1_3_2_2_43_1","unstructured":"International Telecommunication Union. 2020. Individuals Using the Internet Statistics. https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"K. Vaniea and Y. Rashidi. 2016. Tales of Software Updates: The Process of Updating Software. In ACM CHI.","DOI":"10.1145\/2858036.2858303"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"S. Vargas U. Goel M. Steiner and A. Balasubramanian. 2019. Characterizing JSON Traffic Patterns on a CDN. In ACM IMC.","DOI":"10.1145\/3355369.3355594"},{"key":"e_1_3_2_2_46_1","unstructured":"W3C. 2020. Definition of User Agent. https:\/\/www.w3.org\/WAI\/UA\/work\/wiki\/Definition_of_User_Agent."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"N. Xia H. H. Song Y. Liao M. Iliofotou A. Nucci Z-L. Zhang and A. Kuzmanovic. 2013. Mosaic: quantifying privacy leakage in mobile networks. In ACM SIGCOMM.","DOI":"10.1145\/2486001.2486008"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"L. Zhang D. Choffnes D. Levin T. Dumitra\u015f A. Mislove A. Schulman and C. Wilson. 2014. Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed. In ACM IMC.","DOI":"10.1145\/2663716.2663758"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Y. Zhang H. Mekky Z-L Zhang R. Torres S-J Lee A. Tongaonkar and M. Mellia. 2015. Detecting Malicious Activities with User-Agent Based Profiles. Int. J. Network Management (2015).","DOI":"10.1002\/nem.1900"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:36:59Z","timestamp":1765841819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423656"}},"subtitle":["Measuring Adoption of Application Updates at Scale"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":49,"alternative-id":["10.1145\/3419394.3423656","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423656","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}