{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T11:34:21Z","timestamp":1768736061458,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ramon y Cajal","award":["RYC-2020-029401-I"],"award-info":[{"award-number":["RYC-2020-029401-I"]}]},{"name":"EPSRC","award":["EP\/T026723\/1"],"award-info":[{"award-number":["EP\/T026723\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512289","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:13:07Z","timestamp":1650863587000},"page":"670-680","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Measuring Alexa Skill Privacy Practices across Three Years"],"prefix":"10.1145","author":[{"given":"Jide","family":"Edu","sequence":"first","affiliation":[{"name":"King's College London, United Kingdom"}]},{"given":"Xavier","family":"Ferrer-Aran","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[{"name":"IMDEA Networks Institute, Spain"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo Ramokapane, and Jose Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 451\u2013466."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_1_3_1","volume-title":"Conditions of Use & Sale. https:\/\/www.amazon.co.uk\/gp\/help\/customer\/display.html?nodeId=GLSBYFE9MGKKQXXM. [Online","year":"2021","unstructured":"Amazon. 2019. Conditions of Use & Sale. https:\/\/www.amazon.co.uk\/gp\/help\/customer\/display.html?nodeId=GLSBYFE9MGKKQXXM. [Online; last accessed June-2021]."},{"key":"e_1_3_2_1_4_1","volume-title":"Security Testing for an Alexa Skill. https:\/\/developer.amazon.com\/docs\/custom-skills\/security-testing-for-an-alexa-skill.html. [Online","year":"2019","unstructured":"Amazon. 2019. Security Testing for an Alexa Skill. https:\/\/developer.amazon.com\/docs\/custom-skills\/security-testing-for-an-alexa-skill.html. [Online; last accessed 03-July-2019]."},{"key":"e_1_3_2_1_5_1","volume-title":"Build Skills with the Alexa Skills Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/ask-overviews\/build-skills-with-the-alexa-skills-kit.html. [Online","year":"2020","unstructured":"Amazon. 2020. Build Skills with the Alexa Skills Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/ask-overviews\/build-skills-with-the-alexa-skills-kit.html. [Online; last accessed 15-October-2020]."},{"key":"e_1_3_2_1_6_1","volume-title":"Host a Custom Skill as a Web Service. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/host-a-custom-skill-as-a-web-service.html. [Online","year":"2021","unstructured":"Amazon. 2020. Host a Custom Skill as a Web Service. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/host-a-custom-skill-as-a-web-service.html. [Online; last accessed 29-May-2021]."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311956"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.40"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.326"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3129116"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_2_1_14_1","volume-title":"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 531\u2013548. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/fernandes"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00013"},{"key":"e_1_3_2_1_16_1","volume-title":"SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2649\u20132666. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/guo"},{"key":"e_1_3_2_1_17_1","unstructured":"D.\u00a0Neuburger Jeffrey. 2021. Supreme Court Vacates LinkedIn-HiQ Scraping Decision Remands to Ninth Circuit for Another Look. https:\/\/www.natlawreview.com\/article\/supreme-court-vacates-linkedin-hiq-scraping-decision-remands-to-ninth-circuit"},{"key":"e_1_3_2_1_18_1","unstructured":"Yunhan Jia Qi\u00a0Alfred Chen Shiqi Wang Amir Rahmati Earlence Fernandes Zhuoqing Mao and Atul Prakash. 2017. ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms. NDSS. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2017\/09\/ndss2017-08-2-jia_slides.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Google Assistant Actions Total 4,253","author":"Kinsella Bret","year":"2019","unstructured":"Bret Kinsella. 2019. Google Assistant Actions Total 4,253 in January 2019. https:\/\/voicebot.ai\/2019\/02\/15\/google-assistant-actions-total-4253-in-january-2019-up-2-5x-in-past-year-but-7-5-the-total-number-alexa-skills-in-u-s\/. [Online; last accessed June-2021]."},{"key":"e_1_3_2_1_20_1","volume-title":"Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium. USENIX, 33\u201347","author":"Kumar Deepak","year":"2018","unstructured":"Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium. USENIX, 33\u201347."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23111"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427250"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446389"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110103"},{"key":"e_1_3_2_1_26_1","volume-title":"Assessing Privacy Risks in Android: A User-Centric Approach","author":"Mylonas Alexios","unstructured":"Alexios Mylonas, Marianthi Theoharidou, and Dimitris Gritzalis. 2014. Assessing Privacy Risks in Android: A User-Centric Approach. In Risk Assessment and Risk-Driven Testing, Thomas Bauer, J\u00fcrgen Gro\u00dfmann, Fredrik Seehusen, Ketil St\u00f8len, and Marc-Florian Wendland (Eds.). Cham, 21\u201337."},{"key":"e_1_3_2_1_27_1","volume-title":"Amazon Alexa now has over 1,000 Skills, up from 135 in January. https:\/\/techcrunch.com\/2016\/06\/03\/amazon-alexa-now-has-over-1000-skills-up-from-135. [Online","author":"Perez Sarah","year":"2020","unstructured":"Sarah Perez. 2016. Amazon Alexa now has over 1,000 Skills, up from 135 in January. https:\/\/techcrunch.com\/2016\/06\/03\/amazon-alexa-now-has-over-1000-skills-up-from-135. [Online; last accessed May-2020]."},{"key":"e_1_3_2_1_28_1","volume-title":"Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. In Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Ponticello Alexander","year":"2021","unstructured":"Alexander Ponticello, Matthias Fassl, and Katharina Krombholz. 2021. Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 475\u2013492."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053246"},{"key":"e_1_3_2_1_30_1","unstructured":"Cornell\u00a0Law School. 2021. VAN BUREN v. UNITED STATES 940 F. 3d 1192. https:\/\/www.law.cornell.edu\/supremecourt\/text\/19-783"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196772"},{"key":"e_1_3_2_1_32_1","volume-title":"Permission Issues in Open-Source Android Apps: An Exploratory Study. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). 238\u2013249","author":"Scoccia Gian\u00a0Luca","year":"2019","unstructured":"Gian\u00a0Luca Scoccia, Anthony Peruma, Virginia Pujols, Ivano Malavolta, and Daniel\u00a0E. Krutz. 2019. Permission Issues in Open-Source Android Apps: An Exploratory Study. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). 238\u2013249."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2021.102604"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380179"},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/stanfordnlp.github.io\/CoreNLP\/. Accessed","year":"2021","unstructured":"[35] Stanfordnlp.2021. https:\/\/stanfordnlp.github.io\/CoreNLP\/. Accessed May 2021]."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/663"},{"key":"e_1_3_2_1_37_1","volume-title":"Number of digital voice assistants in use worldwide from 2019 to 2024 (in billions). https:\/\/www.statista.com\/statistics\/973815\/worldwide-digital-voice-assistant-in-use\/. [Online","author":"Vailshery Lionel\u00a0Sujay","year":"2021","unstructured":"Lionel\u00a0Sujay Vailshery. 2021. Number of digital voice assistants in use worldwide from 2019 to 2024 (in billions). https:\/\/www.statista.com\/statistics\/973815\/worldwide-digital-voice-assistant-in-use\/. [Online; last accessed May-2021]."},{"key":"e_1_3_2_1_38_1","volume-title":"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In 2019 IEEE Symposium on Security and Privacy (SP)","author":"Zhang N.","year":"2019","unstructured":"N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, and F. Qian. 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1381\u20131396."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","location":"Virtual Event, Lyon France","acronym":"WWW '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:15Z","timestamp":1750188615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":39,"alternative-id":["10.1145\/3485447.3512289","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512289","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}