{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:38:00Z","timestamp":1763105880577,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":115,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This work was supported by Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT), No.2020-0-00209.","award":["No.2020-0-0020"],"award-info":[{"award-number":["No.2020-0-0020"]}]},{"name":"This work was supported by Samsung Research."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1145\/3498361.3538939","type":"proceedings-article","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:21:53Z","timestamp":1655396513000},"page":"422-435","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["HearMeOut"],"prefix":"10.1145","author":[{"given":"Joongyum","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Jihwan","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Seongil","family":"Wi","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[{"name":"KAIST"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-010-9042-7"},{"key":"e_1_3_2_1_2_1","volume-title":"National police agency - voice phishing state 2016 to","author":"N. P. Agency","year":"2020","unstructured":"N. P. Agency . National police agency - voice phishing state 2016 to 2020 . https:\/\/www.data.go.kr\/data\/15063815\/fileData.do, 2021. N. P. Agency. National police agency - voice phishing state 2016 to 2020. https:\/\/www.data.go.kr\/data\/15063815\/fileData.do, 2021."},{"volume-title":"Ahnlab - leader in cyber threat analysis and response. https:\/\/www.ahnlab.com\/","year":"2022","key":"e_1_3_2_1_3_1","unstructured":"AhnLab. Ahnlab - leader in cyber threat analysis and response. https:\/\/www.ahnlab.com\/ , 2022 . AhnLab. Ahnlab - leader in cyber threat analysis and response. https:\/\/www.ahnlab.com\/, 2022."},{"key":"e_1_3_2_1_4_1","first-page":"78","volume-title":"Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","author":"T.","year":"2015","unstructured":"T. ain't you : Blocking spearphishing through behavioral modelling. Stringhini, gianluca and thonnard, olivier . In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment , pages 78 -- 97 , 2015 . T. ain't you: Blocking spearphishing through behavioral modelling. Stringhini, gianluca and thonnard, olivier. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 78--97, 2015."},{"key":"e_1_3_2_1_5_1","first-page":"257","volume-title":"Proceedings of the USENIX Security Symposium","author":"Akhawe D.","year":"2013","unstructured":"D. Akhawe and A. P. Felt . Alice in warningland: A large-scale field study of browser security warning effectiveness . In Proceedings of the USENIX Security Symposium , pages 257 -- 272 , 2013 . D. Akhawe and A. P. Felt. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the USENIX Security Symposium, pages 257--272, 2013."},{"key":"e_1_3_2_1_6_1","first-page":"787","volume-title":"Proceedings of the ACM Conference on Human Factors in Computing Systems","author":"Almuhimedi H.","year":"2015","unstructured":"H. Almuhimedi , F. Schaub , N. Sadeh , I. Adjerid , A. Acquisti , J. Gluck , L. F. Cranor , and Y. Agarwal . Your location has been shared 5,398 times! a field study on mobile app privacy nudging . In Proceedings of the ACM Conference on Human Factors in Computing Systems , pages 787 -- 796 , 2015 . H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. F. Cranor, and Y. Agarwal. Your location has been shared 5,398 times! a field study on mobile app privacy nudging. In Proceedings of the ACM Conference on Human Factors in Computing Systems, pages 787--796, 2015."},{"volume-title":"Android developers - setup battery historian. https:\/\/developer.android.com\/topic\/performance\/power\/setup-battery-historian","year":"2021","key":"e_1_3_2_1_7_1","unstructured":"Android. Android developers - setup battery historian. https:\/\/developer.android.com\/topic\/performance\/power\/setup-battery-historian , 2021 . Android. Android developers - setup battery historian. https:\/\/developer.android.com\/topic\/performance\/power\/setup-battery-historian, 2021."},{"volume-title":"Manifest permissions - process outgoing calls. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#PROCESS_OUTGOING_CALLS","year":"2021","key":"e_1_3_2_1_8_1","unstructured":"Android. Manifest permissions - process outgoing calls. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#PROCESS_OUTGOING_CALLS , 2021 . Android. Manifest permissions - process outgoing calls. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#PROCESS_OUTGOING_CALLS, 2021."},{"volume-title":"Manifest permissions - system alert window. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#SYSTEM_ALERT_WINDOW","year":"2021","key":"e_1_3_2_1_9_1","unstructured":"Android. Manifest permissions - system alert window. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#SYSTEM_ALERT_WINDOW , 2021 . Android. Manifest permissions - system alert window. https:\/\/developer.android.com\/reference\/android\/Manifest.permission#SYSTEM_ALERT_WINDOW, 2021."},{"volume-title":"Android developers - android security bulletins. https:\/\/source.android.com\/security\/bulletin?hl=ko","year":"2022","key":"e_1_3_2_1_10_1","unstructured":"Android. Android developers - android security bulletins. https:\/\/source.android.com\/security\/bulletin?hl=ko , 2022 . Android. Android developers - android security bulletins. https:\/\/source.android.com\/security\/bulletin?hl=ko, 2022."},{"volume-title":"Android developers - google play target api level requirement. https:\/\/developer.android.com\/distribute\/best-practices\/develop\/target-sdk","year":"2022","key":"e_1_3_2_1_11_1","unstructured":"Android. Android developers - google play target api level requirement. https:\/\/developer.android.com\/distribute\/best-practices\/develop\/target-sdk , 2022 . Android. Android developers - google play target api level requirement. https:\/\/developer.android.com\/distribute\/best-practices\/develop\/target-sdk, 2022."},{"volume-title":"Android developers - request app permissions. https:\/\/developer.android.com\/training\/permissions\/requesting","year":"2022","key":"e_1_3_2_1_12_1","unstructured":"Android. Android developers - request app permissions. https:\/\/developer.android.com\/training\/permissions\/requesting , 2022 . Android. Android developers - request app permissions. https:\/\/developer.android.com\/training\/permissions\/requesting, 2022."},{"volume-title":"Android developers - unknown sources. https:\/\/developer.android.com\/studio\/publish#unknown-sources","year":"2022","key":"e_1_3_2_1_13_1","unstructured":"Android. Android developers - unknown sources. https:\/\/developer.android.com\/studio\/publish#unknown-sources , 2022 . Android. Android developers - unknown sources. https:\/\/developer.android.com\/studio\/publish#unknown-sources, 2022."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243778"},{"volume-title":"Apkmirror - free and safe android apk downloads. https:\/\/www.apkmirror.com\/","year":"2020","key":"e_1_3_2_1_15_1","unstructured":"APKMirror. Apkmirror - free and safe android apk downloads. https:\/\/www.apkmirror.com\/ , 2020 . APKMirror. Apkmirror - free and safe android apk downloads. https:\/\/www.apkmirror.com\/, 2020."},{"volume-title":"Apkmonk - download android app apks free. https:\/\/www.apkmonk.com\/","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"APKMonk. Apkmonk - download android app apks free. https:\/\/www.apkmonk.com\/ , 2020 . APKMonk. Apkmonk - download android app apks free. https:\/\/www.apkmonk.com\/, 2020."},{"volume-title":"Apkpure - download apk free online downloader. https:\/\/apkpure.com\/","year":"2020","key":"e_1_3_2_1_17_1","unstructured":"APKPure. Apkpure - download apk free online downloader. https:\/\/apkpure.com\/ , 2020 . APKPure. Apkpure - download apk free online downloader. https:\/\/apkpure.com\/, 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202597"},{"volume-title":"Android hardening protection, load the encrypted dex file from memory dynamically. https:\/\/www.bangcle.com\/","year":"2021","key":"e_1_3_2_1_20_1","unstructured":"Bangcle. Android hardening protection, load the encrypted dex file from memory dynamically. https:\/\/www.bangcle.com\/ , 2021 . Bangcle. Android hardening protection, load the encrypted dex file from memory dynamically. https:\/\/www.bangcle.com\/, 2021."},{"key":"e_1_3_2_1_21_1","first-page":"125","volume-title":"Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks","author":"Chan P. P.","year":"2012","unstructured":"P. P. Chan , L. C. Hui , and S.-M. Yiu . Droidchecker : analyzing android applications for capability leak . In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks , pages 125 -- 136 , 2012 . P. P. Chan, L. C. Hui, and S.-M. Yiu. Droidchecker: analyzing android applications for capability leak. In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks, pages 125--136, 2012."},{"key":"e_1_3_2_1_22_1","volume-title":"Voice phishing detection technique based on minimum classification error method incorporating codec parameters. IET signal processing, 4(5):502--509","author":"Chang J.-H.","year":"2010","unstructured":"J.-H. Chang and K.-H. Lee . Voice phishing detection technique based on minimum classification error method incorporating codec parameters. IET signal processing, 4(5):502--509 , 2010 . J.-H. Chang and K.-H. Lee. Voice phishing detection technique based on minimum classification error method incorporating codec parameters. IET signal processing, 4(5):502--509, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2014.49"},{"key":"e_1_3_2_1_24_1","volume-title":"Voice phishing damage over the past 5 years is 1.7 trillion won. 170,000 victims occurred. https:\/\/it.chosun.com\/site\/data\/html_dir\/2020\/09\/28\/2020092802480.html","author":"Chosun I.","year":"2021","unstructured":"I. Chosun . Voice phishing damage over the past 5 years is 1.7 trillion won. 170,000 victims occurred. https:\/\/it.chosun.com\/site\/data\/html_dir\/2020\/09\/28\/2020092802480.html , 2021 . I. Chosun. Voice phishing damage over the past 5 years is 1.7 trillion won. 170,000 victims occurred. https:\/\/it.chosun.com\/site\/data\/html_dir\/2020\/09\/28\/2020092802480.html, 2021."},{"volume-title":"voice phishing is evolving. https:\/\/biz.chosun.com\/site\/data\/html_dir\/2021\/03\/16\/2021031602609.html","year":"2021","key":"e_1_3_2_1_25_1","unstructured":"ChosunBiz. \"create a fraudulent banking app and intercept the call to the customer center\"... voice phishing is evolving. https:\/\/biz.chosun.com\/site\/data\/html_dir\/2021\/03\/16\/2021031602609.html , 2021 . ChosunBiz. \"create a fraudulent banking app and intercept the call to the customer center\"... voice phishing is evolving. https:\/\/biz.chosun.com\/site\/data\/html_dir\/2021\/03\/16\/2021031602609.html, 2021."},{"volume-title":"Police arrest two voice phishing criminals... only 20 victims were tempted by'return loan'. https:\/\/biz.chosun.com\/site\/data\/html_dir\/2021\/02\/17\/2021021700316.html","year":"2021","key":"e_1_3_2_1_26_1","unstructured":"ChosunBiz. Police arrest two voice phishing criminals... only 20 victims were tempted by'return loan'. https:\/\/biz.chosun.com\/site\/data\/html_dir\/2021\/02\/17\/2021021700316.html , 2021 . ChosunBiz. Police arrest two voice phishing criminals... only 20 victims were tempted by'return loan'. https:\/\/biz.chosun.com\/site\/data\/html_dir\/2021\/02\/17\/2021021700316.html, 2021."},{"key":"e_1_3_2_1_27_1","first-page":"1291","volume-title":"Proceedings of the USENIX Security Symposium","author":"Cidon A.","year":"2019","unstructured":"A. Cidon , L. Gavish , I. Bleier , N. Korshun , M. Schweighauser , and A. Tsitkin . High precision detection of business email compromise . In Proceedings of the USENIX Security Symposium , pages 1291 -- 1307 , 2019 . A. Cidon, L. Gavish, I. Bleier, N. Korshun, M. Schweighauser, and A. Tsitkin. High precision detection of business email compromise. In Proceedings of the USENIX Security Symposium, pages 1291--1307, 2019."},{"key":"e_1_3_2_1_28_1","volume-title":"A phone scammer posing as a detective called a police station in south korea. it didn't end well. https:\/\/edition.cnn.com\/2019\/11\/26\/asia\/south-korea-police-phone-scam-intl-hnk-scli\/index.html","author":"CNN.","year":"2021","unstructured":"CNN. A phone scammer posing as a detective called a police station in south korea. it didn't end well. https:\/\/edition.cnn.com\/2019\/11\/26\/asia\/south-korea-police-phone-scam-intl-hnk-scli\/index.html , 2021 . CNN. A phone scammer posing as a detective called a police station in south korea. it didn't end well. https:\/\/edition.cnn.com\/2019\/11\/26\/asia\/south-korea-police-phone-scam-intl-hnk-scli\/index.html, 2021."},{"key":"e_1_3_2_1_29_1","volume-title":"Auto two number. https:\/\/play.google.com\/store\/apps\/details?id=kr.co.thecheat.autotwonumber","author":"L.","year":"2021","unstructured":"L. COMPANY. Auto two number. https:\/\/play.google.com\/store\/apps\/details?id=kr.co.thecheat.autotwonumber , 2021 . L. COMPANY. Auto two number. https:\/\/play.google.com\/store\/apps\/details?id=kr.co.thecheat.autotwonumber, 2021."},{"key":"e_1_3_2_1_30_1","volume-title":"Android 8 release notes. https:\/\/developer.android.com\/about\/versions\/oreo\/android-8.1","author":"Developers A.","year":"2021","unstructured":"A. Developers . Android 8 release notes. https:\/\/developer.android.com\/about\/versions\/oreo\/android-8.1 , 2021 . A. Developers. Android 8 release notes. https:\/\/developer.android.com\/about\/versions\/oreo\/android-8.1, 2021."},{"key":"e_1_3_2_1_31_1","volume-title":"CallRedirectionService. https:\/\/developer.android.com\/reference\/android\/telecom\/CallRedirectionService","author":"Developers A.","year":"2021","unstructured":"A. Developers . Android documentation , CallRedirectionService. https:\/\/developer.android.com\/reference\/android\/telecom\/CallRedirectionService , 2021 . A. Developers. Android documentation, CallRedirectionService. https:\/\/developer.android.com\/reference\/android\/telecom\/CallRedirectionService, 2021."},{"key":"e_1_3_2_1_32_1","volume-title":"getEntry. https:\/\/developer.android.com\/reference\/java\/util\/zip\/ZipFile#getEntry(java.lang.String)","author":"Developers A.","year":"2021","unstructured":"A. Developers . Android documentation , getEntry. https:\/\/developer.android.com\/reference\/java\/util\/zip\/ZipFile#getEntry(java.lang.String) , 2021 . A. Developers. Android documentation, getEntry. https:\/\/developer.android.com\/reference\/java\/util\/zip\/ZipFile#getEntry(java.lang.String), 2021."},{"key":"e_1_3_2_1_33_1","volume-title":"Android documentation, getInstalledApplications. https:\/\/developer.android.com\/reference\/android\/content\/pm\/PackageManager#getInstalledApplications(int)","author":"Developers A.","year":"2021","unstructured":"A. Developers . Android documentation, getInstalledApplications. https:\/\/developer.android.com\/reference\/android\/content\/pm\/PackageManager#getInstalledApplications(int) , 2021 . A. Developers. Android documentation, getInstalledApplications. https:\/\/developer.android.com\/reference\/android\/content\/pm\/PackageManager#getInstalledApplications(int), 2021."},{"key":"e_1_3_2_1_34_1","volume-title":"Android documentation, platform architecture. https:\/\/developer.android.com\/guide\/topics\/manifest\/intent-filter-element","author":"Developers A.","year":"2021","unstructured":"A. Developers . Android documentation, platform architecture. https:\/\/developer.android.com\/guide\/topics\/manifest\/intent-filter-element , 2021 . A. Developers. Android documentation, platform architecture. https:\/\/developer.android.com\/guide\/topics\/manifest\/intent-filter-element, 2021."},{"volume-title":"Google play python api. https:\/\/github.com\/dflower\/google-play-crawler","year":"2014","key":"e_1_3_2_1_35_1","unstructured":"dflower. Google play python api. https:\/\/github.com\/dflower\/google-play-crawler , 2014 . dflower. Google play python api. https:\/\/github.com\/dflower\/google-play-crawler, 2014."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/developer.android.com\/reference\/android\/content\/BroadcastReceiver#setResultData(java.lang.String)","author":"Documentation A.","year":"2021","unstructured":"A. Documentation . BroadcastReceiver - set ResultData . https:\/\/developer.android.com\/reference\/android\/content\/BroadcastReceiver#setResultData(java.lang.String) , 2021 . A. Documentation. BroadcastReceiver - setResultData. https:\/\/developer.android.com\/reference\/android\/content\/BroadcastReceiver#setResultData(java.lang.String), 2021."},{"key":"e_1_3_2_1_37_1","volume-title":"start. https:\/\/developer.android.com\/reference\/android\/media\/MediaPlayer#start()","author":"Documentation A.","year":"2021","unstructured":"A. Documentation . start. https:\/\/developer.android.com\/reference\/android\/media\/MediaPlayer#start() , 2021 . A. Documentation. start. https:\/\/developer.android.com\/reference\/android\/media\/MediaPlayer#start(), 2021."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.105"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_40_1","volume-title":"Hi there, we are phishing eyes. https:\/\/www.phishingeyes.com\/","author":"Eyes P.","year":"2021","unstructured":"P. Eyes . Hi there, we are phishing eyes. https:\/\/www.phishingeyes.com\/ , 2021 . P. Eyes. Hi there, we are phishing eyes. https:\/\/www.phishingeyes.com\/, 2021."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the US Department of Homeland Security Science Conference","author":"Fink E.","year":"2011","unstructured":"E. Fink , M. Sharifi , and J. G. Carbonell . Application of machine learning and crowdsourcing to detection of cybersecurity threats . In Proceedings of the US Department of Homeland Security Science Conference , 2011 . E. Fink, M. Sharifi, and J. G. Carbonell. Application of machine learning and crowdsourcing to detection of cybersecurity threats. In Proceedings of the US Department of Homeland Security Science Conference, 2011."},{"key":"e_1_3_2_1_44_1","volume-title":"That's not your neighbor calling. https:\/\/www.consumer.ftc.gov\/blog\/2018\/01\/thatsnot-your-neighbor-calling","author":"Fletcher E.","year":"2018","unstructured":"E. Fletcher . That's not your neighbor calling. https:\/\/www.consumer.ftc.gov\/blog\/2018\/01\/thatsnot-your-neighbor-calling , 2018 . E. Fletcher. That's not your neighbor calling. https:\/\/www.consumer.ftc.gov\/blog\/2018\/01\/thatsnot-your-neighbor-calling, 2018."},{"key":"e_1_3_2_1_45_1","volume-title":"Government imposter scams top the list of reported frauds. https:\/\/www.ftc.gov\/news-events\/blogs\/data-spotlight\/2019\/07\/government-imposter-scams-top-list-reported-frauds","author":"Fletcher E.","year":"2019","unstructured":"E. Fletcher . Government imposter scams top the list of reported frauds. https:\/\/www.ftc.gov\/news-events\/blogs\/data-spotlight\/2019\/07\/government-imposter-scams-top-list-reported-frauds , 2019 . E. Fletcher. Government imposter scams top the list of reported frauds. https:\/\/www.ftc.gov\/news-events\/blogs\/data-spotlight\/2019\/07\/government-imposter-scams-top-list-reported-frauds, 2019."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/www.fsec.or.kr\/fsec\/index.do","author":"FSI.","year":"2015","unstructured":"FSI. Financial security institute. https:\/\/www.fsec.or.kr\/fsec\/index.do , 2015 . FSI. Financial security institute. https:\/\/www.fsec.or.kr\/fsec\/index.do, 2015."},{"key":"e_1_3_2_1_47_1","volume-title":"https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/view\/WindowManagerImpl. java","author":"Git G.","year":"2021","unstructured":"G. Git . WindownManagerImpl.java. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/view\/WindowManagerImpl. java , 2021 . G. Git. WindownManagerImpl.java. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/master\/core\/java\/android\/view\/WindowManagerImpl. java, 2021."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456635"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23176"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"volume-title":"If it takes once, get out 100 million... fear of the voice phishing app. https:\/\/www.hankyung.com\/it\/article\/2020101200371","year":"2020","key":"e_1_3_2_1_52_1","unstructured":"HanKyung. If it takes once, get out 100 million... fear of the voice phishing app. https:\/\/www.hankyung.com\/it\/article\/2020101200371 , 2020 . HanKyung. If it takes once, get out 100 million... fear of the voice phishing app. https:\/\/www.hankyung.com\/it\/article\/2020101200371, 2020."},{"key":"e_1_3_2_1_53_1","volume-title":"Virus Bulletin","author":"Harley D.","year":"2012","unstructured":"D. Harley , M. Grooten , S. Burn , and C. Johnston . My pc has 32,539 errors: how telephone support scams really work . Virus Bulletin , 2012 . D. Harley, M. Grooten, S. Burn, and C. Johnston. My pc has 32,539 errors: how telephone support scams really work. Virus Bulletin, 2012."},{"key":"e_1_3_2_1_54_1","first-page":"1273","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ho G.","year":"2019","unstructured":"G. Ho , A. Cidon , L. Gavish , M. Schweighauser , V. Paxson , S. Savage , G. M. Voelker , and D. Wagner . Detecting and characterizing lateral phishing at scale . In Proceedings of the USENIX Security Symposium , pages 1273 -- 1290 , 2019 . G. Ho, A. Cidon, L. Gavish, M. Schweighauser, V. Paxson, S. Savage, G. M. Voelker, and D. Wagner. Detecting and characterizing lateral phishing at scale. In Proceedings of the USENIX Security Symposium, pages 1273--1290, 2019."},{"key":"e_1_3_2_1_55_1","first-page":"469","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ho G.","year":"2017","unstructured":"G. Ho , A. Sharma , M. Javed , V. Paxson , and D. Wagner . Detecting credential spearphishing in enterprise settings . In Proceedings of the USENIX Security Symposium , pages 469 -- 485 , 2017 . G. Ho, A. Sharma, M. Javed, V. Paxson, and D. Wagner. Detecting credential spearphishing in enterprise settings. In Proceedings of the USENIX Security Symposium, pages 469--485, 2017."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053017"},{"key":"e_1_3_2_1_57_1","volume-title":"in Asia. Overseas chinese in japan warned on phone scams demanding bank transfers. https:\/\/www.scmp.com\/week-asia\/lifestyle-culture\/article\/3116336\/overseas-chinese-japan-warned-phone-scams-demanding","author":"T.","year":"2021","unstructured":"T. W. in Asia. Overseas chinese in japan warned on phone scams demanding bank transfers. https:\/\/www.scmp.com\/week-asia\/lifestyle-culture\/article\/3116336\/overseas-chinese-japan-warned-phone-scams-demanding , 2021 . T. W. in Asia. Overseas chinese in japan warned on phone scams demanding bank transfers. https:\/\/www.scmp.com\/week-asia\/lifestyle-culture\/article\/3116336\/overseas-chinese-japan-warned-phone-scams-demanding, 2021."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"e_1_3_2_1_59_1","volume-title":"https:\/\/developer.apple.com\/documentation\/callkit","author":"OS.","year":"2022","unstructured":"i OS. Apple developers - callkit. https:\/\/developer.apple.com\/documentation\/callkit , 2022 . iOS. Apple developers - callkit. https:\/\/developer.apple.com\/documentation\/callkit, 2022."},{"key":"e_1_3_2_1_60_1","volume-title":"https:\/\/developer.apple.com\/tutorials\/swiftui\/creating-and-combining-views","author":"OS.","year":"2022","unstructured":"i OS. Apple developers - creating and combining views. https:\/\/developer.apple.com\/tutorials\/swiftui\/creating-and-combining-views , 2022 . iOS. Apple developers - creating and combining views. https:\/\/developer.apple.com\/tutorials\/swiftui\/creating-and-combining-views, 2022."},{"key":"e_1_3_2_1_61_1","volume-title":"https:\/\/developer.apple.com\/forums\/thread\/106125","author":"OS.","year":"2022","unstructured":"i OS. Apple developers - developer forums. https:\/\/developer.apple.com\/forums\/thread\/106125 , 2022 . iOS. Apple developers - developer forums. https:\/\/developer.apple.com\/forums\/thread\/106125, 2022."},{"key":"e_1_3_2_1_62_1","volume-title":"https:\/\/developer.apple.com\/documentation\/avfoundation\/media_playback_and_selection\/creating_a_basic_video_player_ios_and_tvos\/enabling_background_audio","author":"OS.","year":"2022","unstructured":"i OS. Apple developers - enabling background audio. https:\/\/developer.apple.com\/documentation\/avfoundation\/media_playback_and_selection\/creating_a_basic_video_player_ios_and_tvos\/enabling_background_audio , 2022 . iOS. Apple developers - enabling background audio. https:\/\/developer.apple.com\/documentation\/avfoundation\/media_playback_and_selection\/creating_a_basic_video_player_ios_and_tvos\/enabling_background_audio, 2022."},{"key":"e_1_3_2_1_63_1","volume-title":"https:\/\/developer.apple.com\/documentation\/mapkitjs\/mapkit\/overlays","author":"OS.","year":"2022","unstructured":"i OS. Apple developers - overlays. https:\/\/developer.apple.com\/documentation\/mapkitjs\/mapkit\/overlays , 2022 . iOS. Apple developers - overlays. https:\/\/developer.apple.com\/documentation\/mapkitjs\/mapkit\/overlays, 2022."},{"key":"e_1_3_2_1_64_1","volume-title":"https:\/\/developer.apple.com\/kr\/xcode\/","author":"OS.","year":"2022","unstructured":"i OS. Apple developers - xcode. https:\/\/developer.apple.com\/kr\/xcode\/ , 2022 . iOS. Apple developers - xcode. https:\/\/developer.apple.com\/kr\/xcode\/, 2022."},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the USENIX Workshop on Usable Security","author":"Jain S.","year":"2014","unstructured":"S. Jain , J. Lindqvist , Should i protect you? understanding developers' behavior to privacy-preserving apis . In Proceedings of the USENIX Workshop on Usable Security , 2014 . S. Jain, J. Lindqvist, et al. Should i protect you? understanding developers' behavior to privacy-preserving apis. In Proceedings of the USENIX Workshop on Usable Security, 2014."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307660"},{"volume-title":"Give me my information and my caution disappears... 'intercepted app'. https:\/\/www.joongang.co.kr\/article\/25031605","year":"2021","key":"e_1_3_2_1_67_1","unstructured":"JoonGang. Give me my information and my caution disappears... 'intercepted app'. https:\/\/www.joongang.co.kr\/article\/25031605 , 2021 . JoonGang. Give me my information and my caution disappears... 'intercepted app'. https:\/\/www.joongang.co.kr\/article\/25031605, 2021."},{"volume-title":"earning 4 million won a month\"... the trap of 'part-time honey' targeting housewives and students. https:\/\/www.joongang.co.kr\/article\/25031604","year":"2021","key":"e_1_3_2_1_68_1","unstructured":"JoonGang. \"managing only the phone , earning 4 million won a month\"... the trap of 'part-time honey' targeting housewives and students. https:\/\/www.joongang.co.kr\/article\/25031604 , 2021 . JoonGang. \"managing only the phone, earning 4 million won a month\"... the trap of 'part-time honey' targeting housewives and students. https:\/\/www.joongang.co.kr\/article\/25031604, 2021."},{"key":"e_1_3_2_1_69_1","volume-title":"100 million per hour, 700 billion damage... vocie phishing is still active even in the face of covid. https:\/\/news.kbs.co.kr\/news\/view.do?ncd=5226186","author":"K. B. S.","year":"2021","unstructured":"K. B. S. (KBS). 100 million per hour, 700 billion damage... vocie phishing is still active even in the face of covid. https:\/\/news.kbs.co.kr\/news\/view.do?ncd=5226186 , 2021 . K. B. S. (KBS). 100 million per hour, 700 billion damage... vocie phishing is still active even in the face of covid. https:\/\/news.kbs.co.kr\/news\/view.do?ncd=5226186, 2021."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_71_1","volume-title":"Police capture 93 members of a vishing ring that led to the death of a 20-something. https:\/\/english.khan.co.kr\/khan_art_view.html?artid=202011051706177&code=710100","author":"K.","year":"2020","unstructured":"K. Ki-jeong. Police capture 93 members of a vishing ring that led to the death of a 20-something. https:\/\/english.khan.co.kr\/khan_art_view.html?artid=202011051706177&code=710100 , 2020 . K. Ki-jeong. Police capture 93 members of a vishing ring that led to the death of a 20-something. https:\/\/english.khan.co.kr\/khan_art_view.html?artid=202011051706177&code=710100, 2020."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379503.3403553"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373146"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994640"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970277"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078838"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.156"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978687"},{"key":"e_1_3_2_1_81_1","volume-title":"Black Hat","author":"Marzuoli A.","year":"2016","unstructured":"A. Marzuoli , H. A. Kingravi , D. Dewey , A. Dallas , T. Calhoun , T. Nelms , and R. Pienta . Call me: Gathering threat intelligence on telephony scams to detect fraud . Black Hat , 2016 . A. Marzuoli, H. A. Kingravi, D. Dewey, A. Dallas, T. Calhoun, T. Nelms, and R. Pienta. Call me: Gathering threat intelligence on telephony scams to detect fraud. Black Hat, 2016."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23163"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_2"},{"key":"e_1_3_2_1_84_1","volume-title":"news. Beware of the smishing and phishing text pretending to be a 'health checkup' guide. https:\/\/www.idsn.co.kr\/news\/articleView.html?idxno=32189","author":"D.","year":"2020","unstructured":"D. S. news. Beware of the smishing and phishing text pretending to be a 'health checkup' guide. https:\/\/www.idsn.co.kr\/news\/articleView.html?idxno=32189 , 2020 . D. S. news. Beware of the smishing and phishing text pretending to be a 'health checkup' guide. https:\/\/www.idsn.co.kr\/news\/articleView.html?idxno=32189, 2020."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"e_1_3_2_1_86_1","first-page":"379","volume-title":"Proceedings of the USENIX Security Symposium","author":"Oest A.","year":"2020","unstructured":"A. Oest , Y. Safaei , P. Zhang , B. Wardman , K. Tyers , Y. Shoshitaishvili , and A. Doup\u00e9 . Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists . In Proceedings of the USENIX Security Symposium , pages 379 -- 396 , 2020 . A. Oest, Y. Safaei, P. Zhang, B. Wardman, K. Tyers, Y. Shoshitaishvili, and A. Doup\u00e9. Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In Proceedings of the USENIX Security Symposium, pages 379--396, 2020."},{"key":"e_1_3_2_1_87_1","first-page":"361","volume-title":"Proceedings of the USENIX Security Symposium","author":"Oest A.","year":"2020","unstructured":"A. Oest , P. Zhang , B. Wardman , E. Nunes , J. Burgis , A. Zand , K. Thomas , A. Doup\u00e9 , and G.-J. Ahn . Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale . In Proceedings of the USENIX Security Symposium , pages 361 -- 377 , 2020 . A. Oest, P. Zhang, B. Wardman, E. Nunes, J. Burgis, A. Zand, K. Thomas, A. Doup\u00e9, and G.-J. Ahn. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In Proceedings of the USENIX Security Symposium, pages 361--377, 2020."},{"volume-title":"PhishTank: Join the fight against phishing. https:\/\/www.phishtank.com\/","year":"2016","key":"e_1_3_2_1_88_1","unstructured":"PhishTank. PhishTank: Join the fight against phishing. https:\/\/www.phishtank.com\/ , 2016 . PhishTank. PhishTank: Join the fight against phishing. https:\/\/www.phishtank.com\/, 2016."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243785"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.40"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"e_1_3_2_1_93_1","volume-title":"anti scam. https:\/\/www.antiscam.co.kr\/","author":"Scam A.","year":"2021","unstructured":"A. Scam . Smart phishing protect , anti scam. https:\/\/www.antiscam.co.kr\/ , 2021 . A. Scam. Smart phishing protect, anti scam. https:\/\/www.antiscam.co.kr\/, 2021."},{"key":"e_1_3_2_1_94_1","volume-title":"https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:packages\/services\/Telecomm\/src\/com\/android\/server\/telecom\/NewOutgoingCallIntentBroadcaster.java","author":"Search A. C.","year":"2021","unstructured":"A. C. Search . NewOutgoingCallIntentBroadcaster.broadcastIntent. https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:packages\/services\/Telecomm\/src\/com\/android\/server\/telecom\/NewOutgoingCallIntentBroadcaster.java , 2021 . A. C. Search. NewOutgoingCallIntentBroadcaster.broadcastIntent. https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:packages\/services\/Telecomm\/src\/com\/android\/server\/telecom\/NewOutgoingCallIntentBroadcaster.java, 2021."},{"key":"e_1_3_2_1_95_1","volume-title":"https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:frameworks\/base\/services\/core\/java\/com\/android\/server\/pm\/permission\/PermissionManagerService.java","author":"Search A. C.","year":"2022","unstructured":"A. C. Search . PermissionManagerService. https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:frameworks\/base\/services\/core\/java\/com\/android\/server\/pm\/permission\/PermissionManagerService.java , 2022 . A. C. Search. PermissionManagerService. https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:frameworks\/base\/services\/core\/java\/com\/android\/server\/pm\/permission\/PermissionManagerService.java, 2022."},{"key":"e_1_3_2_1_96_1","volume-title":"https:\/\/english.fss.or.kr\/download.bbs?bbsid=1289364303986&fidx=1581467525296","author":"Service F. S.","year":"2019","unstructured":"F. S. Service . 2018 annual report. https:\/\/english.fss.or.kr\/download.bbs?bbsid=1289364303986&fidx=1581467525296 , 2019 . F. S. Service. 2018 annual report. https:\/\/english.fss.or.kr\/download.bbs?bbsid=1289364303986&fidx=1581467525296, 2019."},{"key":"e_1_3_2_1_97_1","volume-title":"https:\/\/english.fss.or.kr\/download.bbs?bbsid=1289364303986&fidx=1609131857837","author":"Service F. S.","year":"2020","unstructured":"F. S. Service . 2019 annual report. https:\/\/english.fss.or.kr\/download.bbs?bbsid=1289364303986&fidx=1609131857837 , 2020 . F. S. Service. 2019 annual report. https:\/\/english.fss.or.kr\/download.bbs?bbsid=1289364303986&fidx=1609131857837, 2020."},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861405"},{"key":"e_1_3_2_1_99_1","volume-title":"An empirical analysis of phishing blacklists","author":"Sheng S.","year":"2009","unstructured":"S. Sheng , B. Wardman , G. Warner , L. Cranor , J. Hong , and C. Zhang . An empirical analysis of phishing blacklists . 2009 . S. Sheng, B. Wardman, G. Warner, L. Cranor, J. Hong, and C. Zhang. An empirical analysis of phishing blacklists. 2009."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326072"},{"volume-title":"JADX - dex to java decompiler. https:\/\/github.com\/skylot\/jadx","year":"2021","key":"e_1_3_2_1_101_1","unstructured":"skylot. JADX - dex to java decompiler. https:\/\/github.com\/skylot\/jadx , 2021 . skylot. JADX - dex to java decompiler. https:\/\/github.com\/skylot\/jadx, 2021."},{"key":"e_1_3_2_1_102_1","volume-title":"anti spy app. https:\/\/cyberbureau.police.go.kr\/mobile\/sub\/sub_03_j.jsp","author":"Spy A.","year":"2021","unstructured":"A. Spy . Cyber bureau , anti spy app. https:\/\/cyberbureau.police.go.kr\/mobile\/sub\/sub_03_j.jsp , 2021 . A. Spy. Cyber bureau, anti spy app. https:\/\/cyberbureau.police.go.kr\/mobile\/sub\/sub_03_j.jsp, 2021."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2646641"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_106_1","first-page":"1421","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Thomas K.","year":"2017","unstructured":"K. Thomas , F. Li , A. Zand , J. Barrett , J. Ranieri , L. Invernizzi , Y. Markov , O. Comanescu , V. Eranti , A. Moscicki , D. Margolis , V. Paxson , and E. Bursztein . Data breaches, phishing, or malware? understanding the risks of stolen credentials . In Proceedings of the ACM Conference on Computer and Communications Security , pages 1421 -- 1434 , 2017 . K. Thomas, F. Li, A. Zand, J. Barrett, J. Ranieri, L. Invernizzi, Y. Markov, O. Comanescu, V. Eranti, A. Moscicki, D. Margolis, V. Paxson, and E. Bursztein. Data breaches, phishing, or malware? understanding the risks of stolen credentials. In Proceedings of the ACM Conference on Computer and Communications Security, pages 1421--1434, 2017."},{"key":"e_1_3_2_1_107_1","unstructured":"U. TODAY. Robocalls and scam calls persist during pandemic so americans have stopped answering the phone. https:\/\/www.usatoday.com\/story\/tech\/2021\/02\/12\/robocalls-scammers-fraud-phone-calls-increase-fcc-ftc-efforts\/6706727002\/ 2021.  U. TODAY. Robocalls and scam calls persist during pandemic so americans have stopped answering the phone. https:\/\/www.usatoday.com\/story\/tech\/2021\/02\/12\/robocalls-scammers-fraud-phone-calls-increase-fcc-ftc-efforts\/6706727002\/ 2021."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"key":"e_1_3_2_1_109_1","first-page":"1327","volume-title":"Proceedings of the USENIX Security Symposium","author":"Tu H.","year":"2019","unstructured":"H. Tu , A. Doup\u00e9 , Z. Zhao , and G.-J. Ahn . Users really do answer telephone scams . In Proceedings of the USENIX Security Symposium , pages 1327 -- 1340 , 2019 . H. Tu, A. Doup\u00e9, Z. Zhao, and G.-J. Ahn. Users really do answer telephone scams. In Proceedings of the USENIX Security Symposium, pages 1327--1340, 2019."},{"volume-title":"Better when together, whowho. https:\/\/www.whowhocorp.com\/ko\/","year":"2021","key":"e_1_3_2_1_110_1","unstructured":"Whowho. Better when together, whowho. https:\/\/www.whowhocorp.com\/ko\/ , 2021 . Whowho. Better when together, whowho. https:\/\/www.whowhocorp.com\/ko\/, 2021."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"issue":"4","key":"e_1_3_2_1_112_1","first-page":"297","article-title":"Phishing, smishing & vishing: an assessment of threats against mobile devices","volume":"5","author":"Yeboah-Boateng E. O.","year":"2014","unstructured":"E. O. Yeboah-Boateng and P. M. Amanor . Phishing, smishing & vishing: an assessment of threats against mobile devices . Journal of Emerging Trends in Computing and Information Sciences , 5 ( 4 ): 297 -- 307 , 2014 . E. O. Yeboah-Boateng and P. M. Amanor. Phishing, smishing & vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences, 5(4):297--307, 2014.","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_11"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10030"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Portland Oregon","acronym":"MobiSys '22"},"container-title":["Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3498361.3538939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3498361.3538939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:04Z","timestamp":1750183804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3498361.3538939"}},"subtitle":["detecting voice phishing activities in Android"],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":115,"alternative-id":["10.1145\/3498361.3538939","10.1145\/3498361"],"URL":"https:\/\/doi.org\/10.1145\/3498361.3538939","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}