{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T19:03:44Z","timestamp":1769195024322,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427287","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"69-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions"],"prefix":"10.1145","author":[{"given":"Suzan","family":"Ali","sequence":"first","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Mounir","family":"Elgharabawy","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Quentin","family":"Duchaussoy","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ACPM. 2016. SSLUnpinning - Xposed Module. https:\/\/github.com\/ac-pm\/SSLUnpinning_Xposed\/.  ACPM. 2016. SSLUnpinning - Xposed Module. https:\/\/github.com\/ac-pm\/SSLUnpinning_Xposed\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"David Adrian Karthikeyan Bhargavan Zakir Durumeric Pierrick Gaudry Matthew Green J.\u00a0Alex Halderman Nadia Heninger Drew Springall Emmanuel Thom\u00e9 Luke Valenta Benjamin VanderSloot Eric Wustrow Santiago Zanella-B\u00e9guelin and Paul Zimmermann. 2015. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. In ACM CSS. 5\u201317.  David Adrian Karthikeyan Bhargavan Zakir Durumeric Pierrick Gaudry Matthew Green J.\u00a0Alex Halderman Nadia Heninger Drew Springall Emmanuel Thom\u00e9 Luke Valenta Benjamin VanderSloot Eric Wustrow Santiago Zanella-B\u00e9guelin and Paul Zimmermann. 2015. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. In ACM CSS. 5\u201317.","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_3_2_1_4_1","unstructured":"Collin Anderson Masashi Crete-Nishihata Chris Dehghanpoor Ron Deibert Sarah McKune Davi Ottenheimer and John Scott-Railton. 2015. Are the Kids Alright? Digital Risks to Minors from South Korea\u2019s Smart Sheriff Application. Article.  Collin Anderson Masashi Crete-Nishihata Chris Dehghanpoor Ron Deibert Sarah McKune Davi Ottenheimer and John Scott-Railton. 2015. Are the Kids Alright? Digital Risks to Minors from South Korea\u2019s Smart Sheriff Application. Article."},{"key":"e_1_3_2_1_5_1","volume-title":"Last accessed","year":"2020","unstructured":"Android. Last accessed Oct. 2020 . Android Device Administration . https:\/\/developer.android.com\/guide\/topics\/admin\/device-admin\/. Android. Last accessed Oct. 2020. Android Device Administration. https:\/\/developer.android.com\/guide\/topics\/admin\/device-admin\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Last accessed","year":"2020","unstructured":"Android. Last accessed Oct. 2020 . UI\/Application Exerciser Monkey . https:\/\/developer.android.com\/studio\/test\/monkey.html. Android. Last accessed Oct. 2020. UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey.html."},{"key":"e_1_3_2_1_7_1","volume-title":"Last accessed","author":"Skshidlevsky Anton","year":"2020","unstructured":"Anton Skshidlevsky . Last accessed Oct. 2020 . Linux Deploy . https:\/\/github.com\/meefik\/linuxdeploy\/. Anton Skshidlevsky. Last accessed Oct. 2020. Linux Deploy. https:\/\/github.com\/meefik\/linuxdeploy\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J.\u00a0Alex Halderman Luca Invernizzi Michalis Kallitsis Deepak Kumar Chaz Lever Zane Ma Joshua Mason Damian Menscher Chad Seaman Nick Sullivan Kurt Thomas and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security. 1093\u20131110.  Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J.\u00a0Alex Halderman Luca Invernizzi Michalis Kallitsis Deepak Kumar Chaz Lever Zane Ma Joshua Mason Damian Menscher Chad Seaman Nick Sullivan Kurt Thomas and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security. 1093\u20131110."},{"key":"e_1_3_2_1_9_1","volume-title":"Appthority: ENTERPRISE MOBILE THREAT REPORT - Firebase Vulnerability: Exposing Sensitive Data via Thousands of Mobile Apps.","year":"2018","unstructured":"Appthority. 2018 . Appthority: ENTERPRISE MOBILE THREAT REPORT - Firebase Vulnerability: Exposing Sensitive Data via Thousands of Mobile Apps. Appthority. 2018. Appthority: ENTERPRISE MOBILE THREAT REPORT - Firebase Vulnerability: Exposing Sensitive Data via Thousands of Mobile Apps."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Sven Bugiel and Erik Derr. 2016. Reliable third-party library detection in android and its security applications. In ACM SIGSAC CCS. 356\u2013367.  Michael Backes Sven Bugiel and Erik Derr. 2016. Reliable third-party library detection in android and its security applications. In ACM SIGSAC CCS. 356\u2013367.","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_11_1","unstructured":"Anthony Bellissimo John Burgess and Kevin Fu. 2006. Secure Software Updates: Disappointments and New Challenges. In USENIX HotSec.  Anthony Bellissimo John Burgess and Kevin Fu. 2006. Secure Software Updates: Disappointments and New Challenges. In USENIX HotSec."},{"key":"e_1_3_2_1_12_1","volume-title":"Last accessed","year":"2020","unstructured":"Bluesnap.com. Last accessed Oct. 2020 . BlueSnap: Online Payment Solutions . https:\/\/home.bluesnap.com\/. Bluesnap.com. Last accessed Oct. 2020. BlueSnap: Online Payment Solutions. https:\/\/home.bluesnap.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"C. Marshall and C. Ellis. 2019. The best free parental control software 2019. https:\/\/www.techradar.com\/news\/the-best-free-parental-control-software\/.  C. Marshall and C. Ellis. 2019. The best free parental control software 2019. https:\/\/www.techradar.com\/news\/the-best-free-parental-control-software\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Mystique: Uncovering information leakage from browser extensions.. In ACM SIGSAC CCS. 1687\u20131700.","author":"Chen Quan","year":"2018","unstructured":"Quan Chen and Alexandros Kapravelos . 2018 . Mystique: Uncovering information leakage from browser extensions.. In ACM SIGSAC CCS. 1687\u20131700. Quan Chen and Alexandros Kapravelos. 2018. Mystique: Uncovering information leakage from browser extensions.. In ACM SIGSAC CCS. 1687\u20131700."},{"key":"e_1_3_2_1_15_1","unstructured":"Chrome. 2017. Remove DHE-based ciphers. https:\/\/www.chromestatus.com\/feature\/5128908798164992.  Chrome. 2017. Remove DHE-based ciphers. https:\/\/www.chromestatus.com\/feature\/5128908798164992."},{"key":"e_1_3_2_1_16_1","volume-title":"Last accessed","year":"2020","unstructured":"CIRT.net. Last accessed Oct. 2020 . Nikto Web Server Scanner . https:\/\/cirt.net\/Nikto2\/. CIRT.net. Last accessed Oct. 2020. Nikto Web Server Scanner. https:\/\/cirt.net\/Nikto2\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Common Sense Media and SurveyMonkey. 2017. Think You Know What Your Kids Are Doing Online? Think Again. Survey report https:\/\/www.commonsensemedia.org\/blog\/think-you-know-what-your-kids-are-doing-online-think-again.  Common Sense Media and SurveyMonkey. 2017. Think You Know What Your Kids Are Doing Online? Think Again. Survey report https:\/\/www.commonsensemedia.org\/blog\/think-you-know-what-your-kids-are-doing-online-think-again."},{"key":"e_1_3_2_1_18_1","volume-title":"I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques","author":"Cunche Mathieu","year":"2014","unstructured":"Mathieu Cunche . 2014. I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques ( 2014 ). Mathieu Cunche. 2014. I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques (2014)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Xavier de\u00a0Carn\u00e9\u00a0de Carnavalet and Mohammad Mannan. 2016. Killed by proxy: Analyzing client-end TLS interception software. In NDSS.  Xavier de\u00a0Carn\u00e9\u00a0de Carnavalet and Mohammad Mannan. 2016. Killed by proxy: Analyzing client-end TLS interception software. In NDSS.","DOI":"10.14722\/ndss.2016.23374"},{"key":"e_1_3_2_1_20_1","unstructured":"DQinstitute.org. 2020. Nearly two-thirds of children surveyed around the world are exposed to cyber risks first-ever global Child Online Safety Index reveals. Online article. https:\/\/www.dqinstitute.org\/news-post\/nearly-two-thirds-of-children-surveyed-around-the-world-are-exposed-to-cyber-risks-first-ever-global-child-online-safety-index-reveals\/.  DQinstitute.org. 2020. Nearly two-thirds of children surveyed around the world are exposed to cyber risks first-ever global Child Online Safety Index reveals. Online article. https:\/\/www.dqinstitute.org\/news-post\/nearly-two-thirds-of-children-surveyed-around-the-world-are-exposed-to-cyber-risks-first-ever-global-child-online-safety-index-reveals\/."},{"key":"e_1_3_2_1_21_1","unstructured":"[\n  21\n  ]  EasyList.Last accessed Apr. 24 2020. https:\/\/easylist.to\/easylist\/easylist.txt.  [21] EasyList.Last accessed Apr. 24 2020. https:\/\/easylist.to\/easylist\/easylist.txt."},{"key":"e_1_3_2_1_22_1","unstructured":"[\n  22\n  ]  EasyList.Last accessed Apr. 24 2020. https:\/\/easylist.to\/easylist\/easyprivacy.txt.  [22] EasyList.Last accessed Apr. 24 2020. https:\/\/easylist.to\/easylist\/easyprivacy.txt."},{"key":"e_1_3_2_1_23_1","unstructured":"[\n  23\n  ]  EasyList.Last accessed Apr. 24 2020. https:\/\/easylist.to\/easylist\/fanboy-social.txt.  [23] EasyList.Last accessed Apr. 24 2020. https:\/\/easylist.to\/easylist\/fanboy-social.txt."},{"key":"e_1_3_2_1_24_1","unstructured":"Ronald Eikenberg. 2019. Kaspersky script injection. https:\/\/www.heise.de\/ct\/artikel\/Kasper-Spy-Kaspersky-Anti-Virus-puts-users-at-risk-4496138.html.  Ronald Eikenberg. 2019. Kaspersky script injection. https:\/\/www.heise.de\/ct\/artikel\/Kasper-Spy-Kaspersky-Anti-Virus-puts-users-at-risk-4496138.html."},{"key":"e_1_3_2_1_25_1","unstructured":"EPIC.org. 2010. FTC Settles with Company that Failed to Tell Parents that Children\u2019s Information Would be Disclosed to Marketers. https:\/\/www.ftc.gov\/news-events\/press-releases\/2010\/11\/ftc-settles-company-failed-tell-parents-childrens-information.  EPIC.org. 2010. FTC Settles with Company that Failed to Tell Parents that Children\u2019s Information Would be Disclosed to Marketers. https:\/\/www.ftc.gov\/news-events\/press-releases\/2010\/11\/ftc-settles-company-failed-tell-parents-childrens-information."},{"key":"e_1_3_2_1_26_1","volume-title":"Last accessed","year":"2020","unstructured":"Facebook.com. Last accessed Oct. 2020 . App Events API. https:\/\/developers.facebook.com\/docs\/marketing-api\/app-event-api\/. Facebook.com. Last accessed Oct. 2020. App Events API. https:\/\/developers.facebook.com\/docs\/marketing-api\/app-event-api\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Last accessed","year":"2020","unstructured":"Facebook.com. Last accessed Oct. 2020 . Manually Build a Login Flow . https:\/\/developers.facebook.com\/docs\/facebook-login\/manually-build-a-login-flow\/. Facebook.com. Last accessed Oct. 2020. Manually Build a Login Flow. https:\/\/developers.facebook.com\/docs\/facebook-login\/manually-build-a-login-flow\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"\u00c1lvaro Feal Paolo Calciati Narseo Vallina-Rodriguez Carmela Troncoso and Alessandra Gorla. 2020. Angel or Devil? A Privacy Study of Mobile Parental Control Apps. In PETS.  \u00c1lvaro Feal Paolo Calciati Narseo Vallina-Rodriguez Carmela Troncoso and Alessandra Gorla. 2020. Angel or Devil? A Privacy Study of Mobile Parental Control Apps. In PETS.","DOI":"10.2478\/popets-2020-0029"},{"key":"e_1_3_2_1_29_1","volume-title":"Last accessed","author":"Foundation OWASP","year":"2020","unstructured":"OWASP Foundation . Last accessed Oct. 2020 . HTML5 Security Cheat Sheet . https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/HTML5_Security_Cheat_Sheet.html#local-storage. OWASP Foundation. Last accessed Oct. 2020. HTML5 Security Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/HTML5_Security_Cheat_Sheet.html#local-storage."},{"key":"e_1_3_2_1_30_1","volume-title":"Last accessed","author":"Foundation OWASP","year":"2020","unstructured":"OWASP Foundation . Last accessed Oct. 2020 . REST Security Cheat Sheet . https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/REST_Security_Cheat_Sheet.html. OWASP Foundation. Last accessed Oct. 2020. REST Security Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/REST_Security_Cheat_Sheet.html."},{"key":"e_1_3_2_1_31_1","unstructured":"FTC.gov. 2014. Parental Controls. Online article. https:\/\/www.consumer.ftc.gov\/articles\/0029-parental-controls.  FTC.gov. 2014. Parental Controls. Online article. https:\/\/www.consumer.ftc.gov\/articles\/0029-parental-controls."},{"key":"e_1_3_2_1_32_1","volume-title":"Last accessed","year":"2020","unstructured":"FTC.gov. Last accessed Oct. 2020 . Children\u2019s Online Privacy Protection Rule: A Six-Step Compliance Plan for Your Business . https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/childrens-online-privacy-protection-rule-six-step-compliance. FTC.gov. Last accessed Oct. 2020. Children\u2019s Online Privacy Protection Rule: A Six-Step Compliance Plan for Your Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/childrens-online-privacy-protection-rule-six-step-compliance."},{"key":"e_1_3_2_1_33_1","unstructured":"Google. 2012. Implementing OAuth 2.0 Authorization. https:\/\/developers.google.com\/youtube\/v3\/guides\/authentication.  Google. 2012. Implementing OAuth 2.0 Authorization. https:\/\/developers.google.com\/youtube\/v3\/guides\/authentication."},{"key":"e_1_3_2_1_34_1","volume-title":"Last accessed","year":"2020","unstructured":"Google. Last accessed June 2020 . Multiple Extensions are Compromised in a Browser Hijacking Scam . https:\/\/support.google.com\/chrome\/thread\/46798301. Google. Last accessed June 2020. Multiple Extensions are Compromised in a Browser Hijacking Scam. https:\/\/support.google.com\/chrome\/thread\/46798301."},{"key":"e_1_3_2_1_35_1","volume-title":"Last accessed","year":"2020","unstructured":"Google. Last accessed Oct. 2020 . Google Firebase . https:\/\/firebase.google.com\/. Google. Last accessed Oct. 2020. Google Firebase. https:\/\/firebase.google.com\/."},{"key":"e_1_3_2_1_37_1","volume-title":"Last accessed","year":"2020","unstructured":"IETF.org. Last accessed Oct. 2020 . HTTP Strict Transport Security (HSTS) . https:\/\/tools.ietf.org\/html\/rfc6797. IETF.org. Last accessed Oct. 2020. HTTP Strict Transport Security (HSTS). https:\/\/tools.ietf.org\/html\/rfc6797."},{"key":"e_1_3_2_1_38_1","unstructured":"Jon Martindale. 2019. Keep your kids safe online with these great parental control tools. Article. https:\/\/www.digitaltrends.com\/computing\/best-free-parental-control-software\/.  Jon Martindale. 2019. Keep your kids safe online with these great parental control tools. Article. https:\/\/www.digitaltrends.com\/computing\/best-free-parental-control-software\/."},{"key":"e_1_3_2_1_39_1","volume-title":"Last accessed","year":"2020","unstructured":"Komodia.com. Last accessed Oct. 2020 . Komodia URLs classification SDK. https:\/\/url-classification.io\/industry\/parental-control\/. Komodia.com. Last accessed Oct. 2020. Komodia URLs classification SDK. https:\/\/url-classification.io\/industry\/parental-control\/."},{"key":"e_1_3_2_1_40_1","volume-title":"Last accessed","author":"Nve L.","year":"2020","unstructured":"L. Nve . Last accessed Oct. 2020 . SSLStrip 2. https:\/\/github.com\/LeonardoNve\/sslstrip2\/. L. Nve. Last accessed Oct. 2020. SSLStrip2. https:\/\/github.com\/LeonardoNve\/sslstrip2\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Anh Le Janus Varmarken Simon Langhoff Anastasia Shuba Minas Gjoka and Athina Markopoulou. 2015. AntMonitor: A system for monitoring from mobile devices. In ACM SIGCOMM C2B(I)D.  Anh Le Janus Varmarken Simon Langhoff Anastasia Shuba Minas Gjoka and Athina Markopoulou. 2015. AntMonitor: A system for monitoring from mobile devices. In ACM SIGCOMM C2B(I)D.","DOI":"10.1145\/2787394.2787396"},{"key":"e_1_3_2_1_42_1","volume-title":"From collisions to chosen-prefix collisions application to full SHA-1","author":"Leurent Ga\u00ebtan","unstructured":"Ga\u00ebtan Leurent and Thomas Peyrin . 2019. From collisions to chosen-prefix collisions application to full SHA-1 . In EUROCRYPT. Springer . Ga\u00ebtan Leurent and Thomas Peyrin. 2019. From collisions to chosen-prefix collisions application to full SHA-1. In EUROCRYPT. Springer."},{"key":"e_1_3_2_1_43_1","volume-title":"SecureComm","author":"Li Xurong","unstructured":"Xurong Li , Chunming Wu , Shouling Ji , Qinchen Gu , and Raheem Beyah . 2017. HSTS Measurement and an Enhanced Stripping Attack Against HTTPS . In SecureComm . Springer . Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, and Raheem Beyah. 2017. HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. In SecureComm. Springer."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Meng Luo Pierre Laperdrix Nima Honarmand and Nick Nikiforakis. 2019. Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. In NDSS.  Meng Luo Pierre Laperdrix Nima Honarmand and Nick Nikiforakis. 2019. Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. In NDSS.","DOI":"10.14722\/ndss.2019.23149"},{"key":"e_1_3_2_1_45_1","unstructured":"Jack Madden and Brian Madden. 2013. Enterprise Mobility Management: Everything you need to know about MDM MAM and BYOD. Jack Madden.  Jack Madden and Brian Madden. 2013. Enterprise Mobility Management: Everything you need to know about MDM MAM and BYOD. Jack Madden."},{"key":"e_1_3_2_1_46_1","volume-title":"Parental control app database exposed, leaving kids","author":"Jones Mark","unstructured":"Mark Jones , Komando.com. 2018. Parental control app database exposed, leaving kids \u2019 information compromised. News article. https:\/\/www.komando.com\/happening-now\/461381\/parental-control-app-database-exposed-leaving-kids-information-compromised. Mark Jones, Komando.com. 2018. Parental control app database exposed, leaving kids\u2019 information compromised. News article. https:\/\/www.komando.com\/happening-now\/461381\/parental-control-app-database-exposed-leaving-kids-information-compromised."},{"key":"e_1_3_2_1_48_1","volume-title":"Last accessed","year":"2020","unstructured":"MITMProxy.org. Last accessed Oct. 2020 . HTTPS proxy. https:\/\/MITMProxy.org\/. MITMProxy.org. Last accessed Oct. 2020. HTTPS proxy. https:\/\/MITMProxy.org\/."},{"key":"e_1_3_2_1_49_1","volume-title":"Last accessed","author":"MOBSF.","year":"2020","unstructured":"MOBSF. Last accessed Oct. 2020 . Mobile-Security-Framework-MobSF. https:\/\/github.com\/MobSF\/Mobile- Security-Framework-MobSF. MOBSF. Last accessed Oct. 2020. Mobile-Security-Framework-MobSF. https:\/\/github.com\/MobSF\/Mobile- Security-Framework-MobSF."},{"key":"e_1_3_2_1_50_1","unstructured":"Brendan Moran Hannes Tschofenig David Brown and Milosch Meriac. 2019. A Firmware Update Architecture for Internet of Things. Internet-Draft draft-ietf-suit-architecture-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-suit-architecture-08 Work in Progress.  Brendan Moran Hannes Tschofenig David Brown and Milosch Meriac. 2019. A Firmware Update Architecture for Internet of Things. Internet-Draft draft-ietf-suit-architecture-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-suit-architecture-08 Work in Progress."},{"key":"e_1_3_2_1_51_1","volume-title":"Last accessed","author":"Project OpenWrt","year":"2020","unstructured":"OpenWrt Project . Last accessed Oct. 2020 . OpenWrt . https:\/\/openwrt.org\/. OpenWrt Project. Last accessed Oct. 2020. OpenWrt. https:\/\/openwrt.org\/."},{"key":"e_1_3_2_1_52_1","volume-title":"The Best Parental Control Software for","year":"2019","unstructured":"PCMag.com. 2019. The Best Parental Control Software for 2019 . https:\/\/www.pcmag.com\/article2\/0,2817,2346997,00.asp\/. PCMag.com. 2019. The Best Parental Control Software for 2019. https:\/\/www.pcmag.com\/article2\/0,2817,2346997,00.asp\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Pew Research Center. 2016. Parents Teens and Digital Monitoring. Survey report http:\/\/www.pewinternet.org\/2016\/01\/07\/parents-teens-and-digital-monitoring\/.  Pew Research Center. 2016. Parents Teens and Digital Monitoring. Survey report http:\/\/www.pewinternet.org\/2016\/01\/07\/parents-teens-and-digital-monitoring\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Pierluigi Paganini. 2018. Parental control spyware app Family Orbit hacked pictures of hundreds of monitored children were exposed. News article. https:\/\/securityaffairs.co\/wordpress\/75888\/data-breach\/family-orbit-hacked.html.  Pierluigi Paganini. 2018. Parental control spyware app Family Orbit hacked pictures of hundreds of monitored children were exposed. News article. https:\/\/securityaffairs.co\/wordpress\/75888\/data-breach\/family-orbit-hacked.html."},{"key":"e_1_3_2_1_55_1","volume-title":"Last accessed","year":"2020","unstructured":"Portswigger.net. Last accessed Mar. 2020 . The Burp Suite family. https:\/\/portswigger.net\/burp. Portswigger.net. Last accessed Mar. 2020. The Burp Suite family. https:\/\/portswigger.net\/burp."},{"key":"e_1_3_2_1_56_1","volume-title":"Last accessed","author":"Privacy Exodus","year":"2020","unstructured":"Exodus Privacy . Last accessed Mar. 2020 . The privacy audit platform for Android applications. https:\/\/reports.exodus-privacy.eu.org\/en\/trackers\/. Exodus Privacy. Last accessed Mar. 2020. The privacy audit platform for Android applications. https:\/\/reports.exodus-privacy.eu.org\/en\/trackers\/."},{"key":"e_1_3_2_1_57_1","volume-title":"Last accessed","year":"2020","unstructured":"Pypi.org. Last accessed Oct. 2020 . Python WHOIS Library . https:\/\/pypi.org\/project\/whois\/. Pypi.org. Last accessed Oct. 2020. Python WHOIS Library. https:\/\/pypi.org\/project\/whois\/."},{"key":"e_1_3_2_1_58_1","unstructured":"Abbas Razaghpanah Rishab Nithyanand Narseo Vallina-Rodriguez Srikanth Sundaresan Mark Allman and Christian Kreibich\u00a0Phillipa Gill. 2018. Apps trackers privacy and regulators. In NDSS.  Abbas Razaghpanah Rishab Nithyanand Narseo Vallina-Rodriguez Srikanth Sundaresan Mark Allman and Christian Kreibich\u00a0Phillipa Gill. 2018. Apps trackers privacy and regulators. In NDSS."},{"key":"e_1_3_2_1_59_1","volume-title":"Haystack: In situ mobile traffic analysis in user space. arXiv preprint arXiv:1510.01419(2015).","author":"Razaghpanah Abbas","year":"2015","unstructured":"Abbas Razaghpanah , Narseo Vallina-Rodriguez , Srikanth Sundaresan , Christian Kreibich , Phillipa Gill , Mark Allman , and Vern Paxson . 2015 . Haystack: In situ mobile traffic analysis in user space. arXiv preprint arXiv:1510.01419(2015). Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, and Vern Paxson. 2015. Haystack: In situ mobile traffic analysis in user space. arXiv preprint arXiv:1510.01419(2015)."},{"key":"e_1_3_2_1_60_1","volume-title":"mo (bile) problems: Analysis of branchless banking applications. ACM TOPS","author":"Reaves Bradley","year":"2017","unstructured":"Bradley Reaves , Jasmine Bowers , Nolen Scaife , Adam Bates , Arnav Bhartiya , Patrick Traynor , and Kevin\u00a0 RB Butler . 2017. Mo (bile) money , mo (bile) problems: Analysis of branchless banking applications. ACM TOPS ( 2017 ). Bradley Reaves, Jasmine Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, and Kevin\u00a0RB Butler. 2017. Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications. ACM TOPS (2017)."},{"key":"e_1_3_2_1_61_1","volume-title":"Last accessed","author":"Security Reverse Shell","year":"2020","unstructured":"Reverse Shell Security . Last accessed Oct. 2020 . Routersploit Embedded Devices Exploitation framework. https:\/\/github.com\/threat9\/routersploit\/. Reverse Shell Security. Last accessed Oct. 2020. Routersploit Embedded Devices Exploitation framework. https:\/\/github.com\/threat9\/routersploit\/."},{"key":"e_1_3_2_1_62_1","volume-title":"Abbas Razaghpanah, Narseo Vallina-Rodriguez, and Serge Egelman.","author":"Reyes Irwin","year":"2018","unstructured":"Irwin Reyes , Primal Wijesekera , Joel Reardon , Amit Elazari\u00a0Bar On , Abbas Razaghpanah, Narseo Vallina-Rodriguez, and Serge Egelman. 2018 . \u201cWon\u2019t somebody think of the children?\u201d examining COPPA compliance at scale. PETS ( 2018). Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari\u00a0Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez, and Serge Egelman. 2018. \u201cWon\u2019t somebody think of the children?\u201d examining COPPA compliance at scale. PETS (2018)."},{"key":"e_1_3_2_1_63_1","volume-title":"Last accessed","author":"Sahni Shiv","year":"2020","unstructured":"Shiv Sahni . Last accessed Mar. 2020 . FireBase Scanner . https:\/\/github.com\/shivsahni\/FireBaseScanner. Shiv Sahni. Last accessed Mar. 2020. FireBase Scanner. https:\/\/github.com\/shivsahni\/FireBaseScanner."},{"key":"e_1_3_2_1_64_1","volume-title":"Last accessed","author":"Privacy Samet","year":"2020","unstructured":"Samet Privacy , LLC. Last accessed Oct. 2020 . Official membership page. https:\/\/www.kidsafeseal.com\/certifiedproducts\/kidoz_sdk_app.html. Samet Privacy, LLC. Last accessed Oct. 2020. Official membership page. https:\/\/www.kidsafeseal.com\/certifiedproducts\/kidoz_sdk_app.html."},{"key":"e_1_3_2_1_65_1","volume-title":"Last accessed","author":"Privacy Samet","year":"2020","unstructured":"Samet Privacy , LLC. Last accessed Oct. 2020 . Official membership page. https:\/\/www.kidsafeseal.com\/certifiedproducts\/familytime_app.html. Samet Privacy, LLC. Last accessed Oct. 2020. Official membership page. https:\/\/www.kidsafeseal.com\/certifiedproducts\/familytime_app.html."},{"key":"e_1_3_2_1_66_1","unstructured":"Sellcell.com. 2019. Kids Cell Phone Use Survey 2019 \u2013 Truth About Kids & Phones. News article. https:\/\/www.sellcell.com\/blog\/kids-cell-phone-use-survey-2019\/.  Sellcell.com. 2019. Kids Cell Phone Use Survey 2019 \u2013 Truth About Kids & Phones. News article. https:\/\/www.sellcell.com\/blog\/kids-cell-phone-use-survey-2019\/."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Zhiyong Shan Raina Samuel and Iulian Neamtiu. 2019. Device Administrator Use and Abuse in Android: Detection and Characterization. In MobiCom.  Zhiyong Shan Raina Samuel and Iulian Neamtiu. 2019. Device Administrator Use and Abuse in Android: Detection and Characterization. In MobiCom.","DOI":"10.1145\/3300061.3345452"},{"key":"e_1_3_2_1_68_1","volume-title":"Playing with danger: A taxonomy and evaluation of threats to smart toys","author":"Shasha Sharon","year":"2019","unstructured":"Sharon Shasha , Moustafa Mahmoud , Mohammad Mannan , and Amr Youssef . 2019. Playing with danger: A taxonomy and evaluation of threats to smart toys . IEEE Internet of Things Journal( 2019 ), 2986\u20133002. Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, and Amr Youssef. 2019. Playing with danger: A taxonomy and evaluation of threats to smart toys. IEEE Internet of Things Journal(2019), 2986\u20133002."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Oleksii Starov and Nick Nikiforakis. 2017. Extended tracking powers: Measuring the privacy diffusion enabled by browser extensions.. In WWW.  Oleksii Starov and Nick Nikiforakis. 2017. Extended tracking powers: Measuring the privacy diffusion enabled by browser extensions.. In WWW.","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_1_70_1","volume-title":"Last accessed","year":"2020","unstructured":"Stiller, Nate. Last accessed Oct. 2020 . MAC Address Lookup . https:\/\/www.macvendorlookup.com\/mac-address-lookup\/. Stiller, Nate. Last accessed Oct. 2020. MAC Address Lookup. https:\/\/www.macvendorlookup.com\/mac-address-lookup\/."},{"key":"e_1_3_2_1_71_1","volume-title":"Exploiting dhcp server-side ip address conflict detection: A dhcp starvation attack","author":"Tripathi Nikhil","unstructured":"Nikhil Tripathi and Neminath Hubballi . 2015. Exploiting dhcp server-side ip address conflict detection: A dhcp starvation attack . In IEEE ANTS. IEEE , 1\u20133. Nikhil Tripathi and Neminath Hubballi. 2015. Exploiting dhcp server-side ip address conflict detection: A dhcp starvation attack. In IEEE ANTS. IEEE, 1\u20133."},{"key":"e_1_3_2_1_72_1","unstructured":"UK Council for Child Internet Safety (UKCCIS). 2016. Child Safety Online: A Practical Guide for Providers of Social Media and Interactive Services. Online article. https:\/\/www.gov.uk\/government\/publications\/child-safety-online-a-practical-guide-for-providers-of-social-media-and-interactive-services.  UK Council for Child Internet Safety (UKCCIS). 2016. Child Safety Online: A Practical Guide for Providers of Social Media and Interactive Services. Online article. https:\/\/www.gov.uk\/government\/publications\/child-safety-online-a-practical-guide-for-providers-of-social-media-and-interactive-services."},{"key":"e_1_3_2_1_73_1","volume-title":"Children at increased risk of harm online during global COVID-19 pandemic","unstructured":"Unicef. 2020. Children at increased risk of harm online during global COVID-19 pandemic . Press release. https:\/\/www.unicef.org\/press-releases\/children-increased-risk-harm-online-during-global-covid-19-pandemic. Unicef. 2020. Children at increased risk of harm online during global COVID-19 pandemic. Press release. https:\/\/www.unicef.org\/press-releases\/children-increased-risk-harm-online-during-global-covid-19-pandemic."},{"key":"e_1_3_2_1_74_1","volume-title":"Last accessed","author":"U.S. Federal Trade Commission","year":"2020","unstructured":"U.S. Federal Trade Commission . Last accessed Oct. 2020 . COPPA Safe Harbor Program . https:\/\/www.ftc.gov\/safe-harbor-program\/. U.S. Federal Trade Commission. Last accessed Oct. 2020. COPPA Safe Harbor Program. https:\/\/www.ftc.gov\/safe-harbor-program\/."},{"key":"e_1_3_2_1_75_1","unstructured":"Narseo Vallina-Rodriguez Srikanth Sundaresan Abbas Razaghpanah Rishab Nithyanand Mark Allman Christian Kreibich and Phillipa Gill. 2016. Tracking the trackers: Towards understanding the mobile advertising and tracking ecosystem. arXiv preprint arXiv:1609.07190(2016).  Narseo Vallina-Rodriguez Srikanth Sundaresan Abbas Razaghpanah Rishab Nithyanand Mark Allman Christian Kreibich and Phillipa Gill. 2016. Tracking the trackers: Towards understanding the mobile advertising and tracking ecosystem. arXiv preprint arXiv:1609.07190(2016)."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Verizon. 2019. Verizon 2019 Data Breach Investigation Report. https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report.pdf.  Verizon. 2019. Verizon 2019 Data Breach Investigation Report. https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report.pdf.","DOI":"10.1016\/S1361-3723(19)30060-0"},{"key":"e_1_3_2_1_77_1","volume-title":"Vulnerability Spotlight: The Circle of a Bug\u2019s Life. News article. https:\/\/blog.talosintelligence.com\/2017\/10\/vulnerability-spotlight-circle.html.","author":"Largent William","year":"2017","unstructured":"William Largent . 2017 . Vulnerability Spotlight: The Circle of a Bug\u2019s Life. News article. https:\/\/blog.talosintelligence.com\/2017\/10\/vulnerability-spotlight-circle.html. William Largent. 2017. Vulnerability Spotlight: The Circle of a Bug\u2019s Life. News article. https:\/\/blog.talosintelligence.com\/2017\/10\/vulnerability-spotlight-circle.html."},{"key":"e_1_3_2_1_78_1","unstructured":"Wired.co.uk. 2019. A series of dumb security flaws left millions of EA Origin users exposed. News article. https:\/\/www.wired.co.uk\/article\/ea-origin-account-login-security-flaw.  Wired.co.uk. 2019. A series of dumb security flaws left millions of EA Origin users exposed. News article. https:\/\/www.wired.co.uk\/article\/ea-origin-account-login-security-flaw."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Pamela Wisniewski Arup\u00a0Kumar Ghosh Heng Xu Mary\u00a0Beth Rosson and John\u00a0M Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?. In ACM CSCW. 51\u201369.  Pamela Wisniewski Arup\u00a0Kumar Ghosh Heng Xu Mary\u00a0Beth Rosson and John\u00a0M Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?. In ACM CSCW. 51\u201369.","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_2_1_80_1","volume-title":"Last accessed","year":"2020","unstructured":"yandex.ru. Last accessed June 2020 . AppMetrica tracking URL parameters. https:\/\/appmetrica.yandex.ru\/docs\/mobile-tracking\/concepts\/postback-specification.html. yandex.ru. Last accessed June 2020. AppMetrica tracking URL parameters. https:\/\/appmetrica.yandex.ru\/docs\/mobile-tracking\/concepts\/postback-specification.html."},{"key":"e_1_3_2_1_81_1","unstructured":"ZDNet.com. 2019. The latest dark web cyber-criminal trend: Selling children\u2019s personal data. News article. https:\/\/www.zdnet.com\/article\/the-latest-dark-web-cyber-criminal-trend-selling-childrens-personal-data\/.  ZDNet.com. 2019. The latest dark web cyber-criminal trend: Selling children\u2019s personal data. News article. https:\/\/www.zdnet.com\/article\/the-latest-dark-web-cyber-criminal-trend-selling-childrens-personal-data\/."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427287","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427287"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":78,"alternative-id":["10.1145\/3427228.3427287","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427287","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}