{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:15:21Z","timestamp":1769742921522,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":116,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["777855, 830927, 833683"],"award-info":[{"award-number":["777855, 830927, 833683"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1934597"],"award-info":[{"award-number":["CNS-1934597"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485366","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"1065-1081","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration"],"prefix":"10.1145","author":[{"given":"Michalis","family":"Diamantaris","sequence":"first","affiliation":[{"name":"FORTH, Heraklion, Crete, Greece"}]},{"given":"Serafeim","family":"Moustakas","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Crete, Greece"}]},{"given":"Lichao","family":"Sun","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Technical University of Crete, Chania, Crete, Greece"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Raccoon - APK downloader. https:\/\/bit.ly\/1yIT4bR."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. JMango - Mobile Apps vs. Mobile Websites: User Preferences. https:\/\/ jmango360.com\/wiki-pages-trends\/mobile-app-vs-mobile-website-statistics\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_4_1","unstructured":"AdAway. 2021. Ad-blocking for your Android. https:\/\/adaway.org\/. Accessed: 2021-02--25."},{"key":"e_1_3_2_1_5_1","unstructured":"AdGuard. 2021. Surf the Web Ad-Free and Safely. Shield up! https:\/\/adguard.com\/en\/welcome.html. Accessed: 2021-02--25."},{"key":"e_1_3_2_1_6_1","unstructured":"AdMob. 2021. How much revenue can you earn from AdMob. https:\/\/admob.google.com\/home\/resources\/how-much-revenue-can-you-earn-from-admob\/. Accessed: 2021-02--25."},{"key":"e_1_3_2_1_7_1","unstructured":"AdSense. 2021. Ad implementation policies - Ad placement policies. https:\/\/support.google.com\/adsense\/answer\/1346295. Accessed: 2021-02--23."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991091"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1971.10488811"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2708685"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-088"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00004"},{"key":"e_1_3_2_1_14_1","unstructured":"Anssi Kostiainen Alexander Shalamov. 2018. Accelerometer. https:\/\/www.w3.org\/TR\/accelerometer\/. Accessed: 2018-07--13."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_3_2_1_16_1","unstructured":"Ben Alman. 2018. Monkey-patch (hook) functions for debugging and stuff. https:\/\/github.com\/cowboy\/javascript-hooker. Accessed: 2018-04--23."},{"key":"e_1_3_2_1_17_1","volume-title":"Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416","author":"Bojinov Hristo","year":"2014","unstructured":"Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014)."},{"key":"e_1_3_2_1_18_1","first-page":"9","article-title":"TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion","volume":"11","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. HotSec, Vol. 11 (2011), 9--9.","journal-title":"HotSec"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313549"},{"key":"e_1_3_2_1_21_1","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Andrea Continella Yanick Fratantonio Martina Lindorfer Alessandro Puccetti Ali Zand Christopher Kruegel and Giovanni Vigna. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.. In NDSS.","DOI":"10.14722\/ndss.2017.23465"},{"key":"e_1_3_2_1_23_1","unstructured":"Cortesi Aldo and Hils Mayimilian and Kriechbaumer Thomas. [n. d.]. mitmproxy. https:\/\/mitmproxy.org. v. 3.0.3."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243860"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_2_1_27_1","unstructured":"Anupam Das Nikita Borisov and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.. In NDSS."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0005"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081600"},{"key":"e_1_3_2_1_30_1","unstructured":"Android Developers. 2021 a. Interstitial (legacy API). https:\/\/developers.google.com\/admob\/android\/interstitial. Accessed: 2021-02--25."},{"key":"e_1_3_2_1_31_1","unstructured":"Android Developers. 2021 b. Multi-Window Support. https:\/\/developer.android.com\/guide\/topics\/ui\/multi-window. Accessed: 2021-04--26."},{"key":"e_1_3_2_1_32_1","unstructured":"Android Developers. 2021 c. Permissions updates in Android 11. https:\/\/developer.android.com\/about\/versions\/11\/privacy\/permissions. Accessed: 2021-04--26."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3403947"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300027"},{"key":"e_1_3_2_1_36_1","unstructured":"DoubleVerify. 2021. DOUBLEVERIFY PRIVACY NOTICES - SOLUTIONS PRIVACY NOTICE. https:\/\/doubleverify.com\/privacy-notice\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_39_1","unstructured":"Tobias Fiebig Jan Krissler and Ronny H\"ansch. 2014. Security Impact of High Resolution Smartphone Cameras.. In WOOT."},{"key":"e_1_3_2_1_40_1","unstructured":"Maximiliano Firtman. 2018. Mobile HTML5 Compatibility on Mobile Devices. http:\/\/mobilehtml5.org\/. Accessed: 2018-04--22."},{"key":"e_1_3_2_1_41_1","volume-title":"2017 IEEE Symposium on Security and Privacy (SP). 1041--1057","author":"Fratantonio Y.","unstructured":"Y. Fratantonio, C. Qian, S. P. Chung, and W. Lee. 2017. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. In 2017 IEEE Symposium on Security and Privacy (SP). 1041--1057."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00074"},{"key":"e_1_3_2_1_43_1","unstructured":"Google. 2020. WebView - A View that displays web pages. https:\/\/developer.android.com\/reference\/android\/webkit\/WebView. Accessed: 2020--10--28."},{"key":"e_1_3_2_1_44_1","unstructured":"Google. 2021. Provide advance notice to the Google Play App Review team. https:\/\/support.google.com\/googleplay\/android-developer\/contact\/adv_note. Accessed: 2021-04--26."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"e_1_3_2_1_46_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_47_1","volume-title":"Reconstructing what you said: Text Inference using Smartphone Motion","author":"Hodges Duncan","year":"2018","unstructured":"Duncan Hodges and Oliver Buckley. 2018. Reconstructing what you said: Text Inference using Smartphone Motion. IEEE Transactions on Mobile Computing (2018)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2611489"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134064"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818032"},{"key":"e_1_3_2_1_51_1","unstructured":"Hayden James. 2020. Smartphone Market Share. https:\/\/www.idc.com\/promo\/smartphone-market-share\/os. Accessed: 2020--10--11."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374552"},{"key":"e_1_3_2_1_53_1","unstructured":"Matthew Kaplan. 2021. 52 In-App Advertising Statistics You Should Know. https:\/\/www.inmobi.com\/blog\/2019\/05\/21\/52-in-app-advertising-statistics-you-should-know. Accessed: 2021-02--25."},{"key":"e_1_3_2_1_54_1","unstructured":"Joongyum Kim Jung-hwan Park and Sooel Son. 2011. The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. In NDSS."},{"key":"e_1_3_2_1_55_1","volume-title":"The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. In 28th Network & Distributed System Security Symposium (NDSS'21)","author":"Kim Joongyum","year":"2020","unstructured":"Joongyum Kim, Jung-hwan Park, and Sooel Son. 2020. The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. In 28th Network & Distributed System Security Symposium (NDSS'21). 1--16."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313539"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0369-x"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Wei Meng Ren Ding Simon P Chung Steven Han and Wenke Lee. 2016. The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.. In NDSS.","DOI":"10.14722\/ndss.2016.23353"},{"key":"e_1_3_2_1_61_1","volume-title":"USENIX Security Symposium. 1053--1067","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In USENIX Security Symposium. 1053--1067."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_63_1","unstructured":"Mounir Lamouri Marcos C\u00e1ceres. 2018. Screen orientation API. https:\/\/www.w3.org\/TR\/screen-orientation\/. Accessed: 2018-07--13."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the Mobile Security Technologies Workshop (MoST).","author":"Mutchler Patrick","year":"2015","unstructured":"Patrick Mutchler, Adam Doup\u00e9, John Mitchell, Chris Kruegel, and Giovanni Vigna. 2015. A large-scale study of mobile web app security. In Proceedings of the Mobile Security Technologies Workshop (MoST)."},{"key":"e_1_3_2_1_65_1","unstructured":"Vinod Nair and Geoffrey E Hinton. 2010. Rectified linear units improve restricted boltzmann machines. In Icml."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_2_1_67_1","volume-title":"USENIX Security Symposium.","author":"Nguyen Trung Tin","year":"2021","unstructured":"Trung Tin Nguyen, Michael Backes, Ninja Marnau, and Ben Stock. 2021. Share First, Ask Later (or Never?)-Studying Violations of GDPR's Explicit Consent in Android Apps. In USENIX Security Symposium."},{"key":"e_1_3_2_1_68_1","volume-title":"2013 IEEE symposium on. IEEE, 541--555","author":"Nikiforakis Nick","year":"2013","unstructured":"Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. 2013. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Security and privacy (SP), 2013 IEEE symposium on. IEEE, 541--555."},{"key":"e_1_3_2_1_69_1","volume-title":"Data Privacy Management, and Security Assurance","author":"Olejnik \u0141ukasz","unstructured":"\u0141ukasz Olejnik, Gunes Acar, Claude Castelluccia, and Claudia Diaz. 2015. The leaking battery. In Data Privacy Management, and Security Assurance. Springer."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_71_1","unstructured":"Pierluigi Paganini. 2019. Android apps use the motion sensor to evade detection and deliver Anubis malware. https:\/\/securityaffairs.co\/wordpress\/80037\/malware\/android-apps-motion-sensor.html."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052691"},{"key":"e_1_3_2_1_73_1","volume-title":"Markatos","author":"Papadopoulos Panagiotis","year":"2018","unstructured":"Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P. Markatos. 2018. Exclusive: How the (Synced) Cookie Monster Breached My Encrypted VPN Session (EuroSec'18)."},{"key":"e_1_3_2_1_74_1","unstructured":"BI INDIA PARTNER. 2020. Freecharge's innovative ad that used accelerometer and gyroscope motion sensors helped the brand reach 4.5 million users. https:\/\/www.businessinsider.in\/advertising\/ad-tech\/article\/freecharges-innovative-ad-that-used-accelerometer-and-gyroscope-motion-sensors-helped-the-brand-reach-4--5-million-users\/articleshow\/78384923.cms. Accessed: 2021-04--26."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766511"},{"key":"e_1_3_2_1_78_1","volume-title":"Towards HTTPS Everywhere on Android: We Are Not There Yet. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Possemato Andrea","year":"2020","unstructured":"Andrea Possemato and Yanick Fratantonio. 2020. Towards HTTPS Everywhere on Android: We Are Not There Yet. In 29th USENIX Security Symposium (USENIX Security 20). 343--360."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_1_80_1","unstructured":"Ashis Kumar Ratha Shibani Sahu and Priya Meher. 2018. HTML5 in Web Development: A New Approach. (2018)."},{"key":"e_1_3_2_1_81_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system. In 28th USENIX Security Symposium (USENIX Security 19). 603--620."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1689239.1689243"},{"key":"e_1_3_2_1_83_1","unstructured":"Tomas Reimers\/Github. 2017. Axolotl Machine Learning Framework. https:\/\/github.com\/tomasreimers\/axolotl. Accessed: 2020--10--28."},{"key":"e_1_3_2_1_84_1","volume-title":"Network and Distributed System Security Symposium.","author":"Ren Jingjing","year":"2018","unstructured":"Jingjing Ren, Martina Lindorfer, Daniel J Dubois, Ashwin Rao, David Choffnes, and Narseo Vallina-Rodriguez. 2018. A longitudinal study of pii leaks across android app versions. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_1_86_1","volume-title":"Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on. IEEE, 149--157","author":"Ren Yanzhi","year":"2013","unstructured":"Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2013. Smartphone based user verification leveraging gait recognition for mobile healthcare systems. In Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on. IEEE, 149--157."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_1_88_1","volume-title":"Andrei Popescu.","author":"Tibbett Rich","year":"2018","unstructured":"Rich Tibbett, Tim Volodine, Steve Block, Andrei Popescu. 2018. Device orientation event. https:\/\/www.w3.org\/TR\/orientation-event\/. Accessed: 2018-07--13."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_2"},{"key":"e_1_3_2_1_90_1","volume-title":"9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Roesner Franziska","year":"2012","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and defending against third-party tracking on the web. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 155--168."},{"key":"e_1_3_2_1_91_1","unstructured":"rovo89. 2018. Xposed framework. https:\/\/repo.xposed.info."},{"key":"e_1_3_2_1_92_1","unstructured":"Android SDK. 2021 a. SYSTEM_ALERT_WINDOW permission. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#SYSTEM_ALERT_WINDOW. Accessed: 2021-02--10."},{"key":"e_1_3_2_1_93_1","unstructured":"Android SDK. 2021 b. Window Layout - FLAG_SECURE. https:\/\/developer.android.com\/reference\/android\/view\/WindowManager.LayoutParams.html#FLAG_SECURE. Accessed: 2021-02--10."},{"key":"e_1_3_2_1_94_1","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Shekhar Shashi","year":"2012","unstructured":"Shashi Shekhar, Michael Dietz, and Dan S Wallach. 2012. Adsplit: Separating smartphone advertising from applications. In 21st USENIX Security Symposium (USENIX Security 12). 553--567."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2801694.2801707"},{"key":"e_1_3_2_1_96_1","unstructured":"Prabhsimran Singh. 2020. Install Burpsuite's or any CA certificate to system store in Android 10 and 11. https:\/\/pswalia2u.medium.com\/install-burpsuites-or-any-ca-certificate-to-system-store-in-android-10-and-11--38e508a5541a."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_3_2_1_98_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, Vol. 15, 1 (2014), 1929--1958."},{"key":"e_1_3_2_1_99_1","unstructured":"Terry Stancheva. 2021. 50+ App Revenue Statistics - Mobile Is Changing the Game. https:\/\/techjury.net\/blog\/app-revenue-statistics\/#gref."},{"key":"e_1_3_2_1_100_1","unstructured":"statcounter. 2021. Mobile Operating System Market Share Worldwide. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Accessed: 2021-02--10."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419205"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"crossref","unstructured":"Mohammad Tahaei and Kami Vaniea. 2021. \"Developers Are Responsible\": What Ad Networks Tell Developers About Privacy. (2021).","DOI":"10.1145\/3411763.3451805"},{"key":"e_1_3_2_1_103_1","unstructured":"NEXD team. 2020. The Nexd Perspective: Gyroscope ads engage your audience. https:\/\/www.nexd.com\/blog\/using-gyroscope-ads-to-better-engage-your-audience\/. Accessed: 2020--10--28."},{"key":"e_1_3_2_1_104_1","volume-title":"Mobility and Security (NTMS), 2015 7th International Conference on. IEEE, 1--5.","author":"Upathilake Randika","year":"2015","unstructured":"Randika Upathilake, Yingkun Li, and Ashraf Matrawy. 2015. A classification of web browser fingerprinting techniques. In New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on. IEEE, 1--5."},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_7"},{"key":"e_1_3_2_1_106_1","unstructured":"Rick Waldron. 2019. Generic Sensor API. https:\/\/www.w3.org\/TR\/generic-sensor\/. Accessed: 2021-02--10."},{"key":"e_1_3_2_1_107_1","unstructured":"Wardell Bagby. 2021. Sensor Disabler - This Xposed module allows you to modify and disable various sensors on your device. https:\/\/github.com\/wardellbagby\/Sensor-Disabler. Accessed: 2021-08--10."},{"key":"e_1_3_2_1_108_1","volume-title":"9th USENIX Workshop on Offensive Technologies (WOOT '15)","author":"Watanabe Takuya","unstructured":"Takuya Watanabe, Mitsuaki Akiyama, and Tatsuya Mori. [n.,d.]. RouteDetector: Sensor-based positioning system that exploits spatio-temporal regularity of human mobility. In 9th USENIX Workshop on Offensive Technologies (WOOT '15)."},{"key":"e_1_3_2_1_109_1","unstructured":"Robert Williams. 2020. Facebook's ad revenue rises 25% to record $20.7B. https:\/\/www.mobilemarketer.com\/news\/facebooks-ad-revenue-rises-25-to-record-207b\/571362\/. Accessed: 2020--10--28."},{"key":"e_1_3_2_1_110_1","unstructured":"xda developers. 2021. A Magic Mask to alter System Systemless-ly. https:\/\/www.xda-developers.com\/how-to-install-magisk\/."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_7"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052577"},{"key":"e_1_3_2_1_114_1","volume-title":"2019 IEEE Symposium on Security and Privacy (SP).","author":"Zhang Jiexin","unstructured":"Jiexin Zhang, Alastair Beresford, and Ian Sheret. [n.,d.]. Sensorid: Sensor calibration fingerprinting for smartphones. In 2019 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.9775"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485366","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:29Z","timestamp":1763498909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":116,"alternative-id":["10.1145\/3460120.3485366","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485366","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}