{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:50:25Z","timestamp":1775109025661,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Center for Applied Cybersecurity ATHENE"},{"name":"German Federal Ministry of Education and Research"},{"name":"Hessen State Ministry for Higher Education, Research and the Arts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528546","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"26-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Heinrich","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Niklas","family":"Bittner","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"REFERENCES [1] AirtagAlex. 2021. How to remove the speaker coil from the Airtag (make your Airtag very silent!) - YouTube. https:\/\/www.youtube.com\/  REFERENCES [1] AirtagAlex. 2021. How to remove the speaker coil from the Airtag (make your Airtag very silent!) - YouTube. https:\/\/www.youtube.com\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Inc. 2014. CLVisit | Apple Developer Documentation. https:\/\/developer. apple.com\/documentation\/corelocation\/clvisit  Apple Inc. 2014. CLVisit | Apple Developer Documentation. https:\/\/developer. apple.com\/documentation\/corelocation\/clvisit"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple Inc. 2020. Exposure Notification | Apple Developer Documentation. https: \/\/developer.apple.com\/documentation\/exposurenotification  Apple Inc. 2020. Exposure Notification | Apple Developer Documentation. https: \/\/developer.apple.com\/documentation\/exposurenotification"},{"key":"e_1_3_2_1_4_1","unstructured":"Apple Inc. 2020. Find My Network Accessory Specification - Release R1. https:\/\/images.frandroid.com\/wp-content\/uploads\/2020\/06\/Find_My_network_ accessory_protocol_specification.pdf  Apple Inc. 2020. Find My Network Accessory Specification - Release R1. https:\/\/images.frandroid.com\/wp-content\/uploads\/2020\/06\/Find_My_network_ accessory_protocol_specification.pdf"},{"key":"e_1_3_2_1_5_1","unstructured":"Apple Inc. 2021. AirTag. https:\/\/www.apple.com\/airtag\/  Apple Inc. 2021. AirTag. https:\/\/www.apple.com\/airtag\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Apple Inc. 2021. Apple's Find My network now offers new third-party finding experiences. https:\/\/www.apple.com\/newsroom\/2021\/04\/apples-find-mynetwork-now-offers-new-third-party-finding-experiences\/  Apple Inc. 2021. Apple's Find My network now offers new third-party finding experiences. https:\/\/www.apple.com\/newsroom\/2021\/04\/apples-find-mynetwork-now-offers-new-third-party-finding-experiences\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Apple Inc. 2021. Explore UWB-based car keys - WWDC21 - Videos - Apple Developer. https:\/\/developer.apple.com\/videos\/play\/wwdc2021\/10084\/  Apple Inc. 2021. Explore UWB-based car keys - WWDC21 - Videos - Apple Developer. https:\/\/developer.apple.com\/videos\/play\/wwdc2021\/10084\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Apple Inc. 2021. Tracker Detect - Apps on Google Play. https:\/\/play.google. com\/store\/apps\/details?id=com.apple.trackerdetect&hl=en&gl=US  Apple Inc. 2021. Tracker Detect - Apps on Google Play. https:\/\/play.google. com\/store\/apps\/details?id=com.apple.trackerdetect&hl=en&gl=US"},{"key":"e_1_3_2_1_10_1","unstructured":"Apple Inc. 2021. What to do if you get an alert that an AirTag or Find My network accessory is with you. https:\/\/support.apple.com\/en-us\/HT212227  Apple Inc. 2021. What to do if you get an alert that an AirTag or Find My network accessory is with you. https:\/\/support.apple.com\/en-us\/HT212227"},{"key":"e_1_3_2_1_11_1","unstructured":"Apple Inc. 2022. Profiles and Logs - Bug Reporting - Apple Developer. https: \/\/developer.apple.com\/bug-reporting\/profiles-and-logs\/  Apple Inc. 2022. Profiles and Logs - Bug Reporting - Apple Developer. https: \/\/developer.apple.com\/bug-reporting\/profiles-and-logs\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Find You: Building a stealth AirTag clone | Positive Security. https:\/\/positive.security\/blog\/find-you","author":"Br\u00e4unlein Felix","year":"2022","unstructured":"Felix Br\u00e4unlein . 2022 . Find You: Building a stealth AirTag clone | Positive Security. https:\/\/positive.security\/blog\/find-you Felix Br\u00e4unlein. 2022. Find You: Building a stealth AirTag clone | Positive Security. https:\/\/positive.security\/blog\/find-you"},{"key":"e_1_3_2_1_13_1","volume-title":"Apple's AirTags Are a Gift to Stalkers. Wired (May","author":"Cahn Albert Fox","year":"2021","unstructured":"Albert Fox Cahn . 2021. Apple's AirTags Are a Gift to Stalkers. Wired (May 2021 ). https:\/\/www.wired.com\/story\/opinion-apples-air-tags-are-a-gift-to-stalkers\/ Section : tags. Albert Fox Cahn. 2021. Apple's AirTags Are a Gift to Stalkers. Wired (May 2021). https:\/\/www.wired.com\/story\/opinion-apples-air-tags-are-a-gift-to-stalkers\/ Section: tags."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0003"},{"key":"e_1_3_2_1_15_1","unstructured":"Hartley Charlton. 2021. Apple's AirTag Item Trackers Increasingly Linked to Criminal Activity. https:\/\/www.macrumors.com\/2021\/12\/31\/airtag-increasinglylinked-to-crime\/  Hartley Charlton. 2021. Apple's AirTag Item Trackers Increasingly Linked to Criminal Activity. https:\/\/www.macrumors.com\/2021\/12\/31\/airtag-increasinglylinked-to-crime\/"},{"key":"e_1_3_2_1_16_1","volume-title":"May 16--19","author":"Chipolo","year":"2022","unstructured":"Chipolo d.o.o. 2021. Chipolo ONE Spot. https:\/\/chipolo.net\/en\/pages\/chipoloone-spot WiSec '22 , May 16--19 , 2022 , San Antonio, TX , USA Alexander Heinrich, Niklas Bittner, and Matthias Hollick Chipolo d.o.o. 2021. Chipolo ONE Spot. https:\/\/chipolo.net\/en\/pages\/chipoloone-spot WiSec '22, May 16--19, 2022, San Antonio, TX, USA Alexander Heinrich, Niklas Bittner, and Matthias Hollick"},{"key":"e_1_3_2_1_17_1","volume-title":"Timey Wimey -- What's Really Inside Apple's U1 Chip. Presentation at Black Hat USA","author":"Classen Jiska","year":"2021","unstructured":"Jiska Classen and Alexander Heinrich . 2021. Wibbly Wobbly , Timey Wimey -- What's Really Inside Apple's U1 Chip. Presentation at Black Hat USA 2021 . Jiska Classen and Alexander Heinrich. 2021. Wibbly Wobbly, Timey Wimey -- What's Really Inside Apple's U1 Chip. Presentation at Black Hat USA 2021."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528547"},{"key":"e_1_3_2_1_19_1","volume-title":"Hardwear.Io NL 2021: Over The Air-Tag: Shenanigans With A Keyfinder by Jiska , Fabian And Thomas. https:\/\/www.youtube.com\/watch?v=nrs0kNG7jcA","author":"Classen Jiska","year":"2021","unstructured":"Jiska Classen , Thomas Roth , and Fabian Freyer . 2021 . Hardwear.Io NL 2021: Over The Air-Tag: Shenanigans With A Keyfinder by Jiska , Fabian And Thomas. https:\/\/www.youtube.com\/watch?v=nrs0kNG7jcA Jiska Classen, Thomas Roth, and Fabian Freyer. 2021. Hardwear.Io NL 2021: Over The Air-Tag: Shenanigans With A Keyfinder by Jiska , Fabian And Thomas. https:\/\/www.youtube.com\/watch?v=nrs0kNG7jcA"},{"key":"e_1_3_2_1_20_1","volume-title":"Review | Apple's AirTag trackers made it frighteningly easy to \"stalk' me in a test. Washington Post (May","author":"Fowler Geoffrey A.","year":"2021","unstructured":"Geoffrey A. Fowler . 2021. Review | Apple's AirTag trackers made it frighteningly easy to \"stalk' me in a test. Washington Post (May 2021 ). https: \/\/www.washingtonpost.com\/technology\/2021\/05\/05\/apple-airtags-stalking\/ Geoffrey A. Fowler. 2021. Review | Apple's AirTag trackers made it frighteningly easy to \"stalk' me in a test. Washington Post (May 2021). https: \/\/www.washingtonpost.com\/technology\/2021\/05\/05\/apple-airtags-stalking\/"},{"key":"e_1_3_2_1_21_1","volume-title":"Tile Falls Short. Washington Post (March","author":"Fowler Geoffrey A.","year":"2022","unstructured":"Geoffrey A. Fowler . 2022. Review | Am I Being Tracked? Anti-stalking Tech from Apple , Tile Falls Short. Washington Post (March 2022 ). https:\/\/www. washingtonpost.com\/technology\/2022\/03\/31\/airtags-stalking\/ Geoffrey A. Fowler. 2022. Review | Am I Being Tracked? Anti-stalking Tech from Apple, Tile Falls Short. Washington Post (March 2022). https:\/\/www. washingtonpost.com\/technology\/2022\/03\/31\/airtags-stalking\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Toward a Secure Crowdsourced Location Tracking System. arXiv:2106.00217 [cs] (June","author":"Garg Chinmay","year":"2021","unstructured":"Chinmay Garg , Aravind Machiry , Andrea Continella , Christopher Kruegel , and Giovanni Vigna . 2021. Toward a Secure Crowdsourced Location Tracking System. arXiv:2106.00217 [cs] (June 2021 ). https:\/\/doi.org\/10.1145\/3448300.3467821 arXiv: 2106.00217. 10.1145\/3448300.3467821 Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, and Giovanni Vigna. 2021. Toward a Secure Crowdsourced Location Tracking System. arXiv:2106.00217 [cs] (June 2021). https:\/\/doi.org\/10.1145\/3448300.3467821 arXiv: 2106.00217."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2017. Battery Historian. https:\/\/github.com\/google\/battery-historian  Google. 2017. Battery Historian. https:\/\/github.com\/google\/battery-historian"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468251"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0045"},{"key":"e_1_3_2_1_26_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Heinze Dennis","year":"2020","unstructured":"Dennis Heinze , Jiska Classen , and Matthias Hollick . 2020 . ToothPicker: Apple Picking in the iOS Bluetooth Stack . In 14th USENIX Workshop on Offensive Technologies (WOOT 20) . USENIX Association. https:\/\/www.usenix.org\/conference\/ woot20\/presentation\/heinze Dennis Heinze, Jiska Classen, and Matthias Hollick. 2020. ToothPicker: Apple Picking in the iOS Bluetooth Stack. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association. https:\/\/www.usenix.org\/conference\/ woot20\/presentation\/heinze"},{"key":"e_1_3_2_1_27_1","unstructured":"Michael Kan. 2022. 'Silent AirTags' With Speakers Removed Pop Up on Etsy eBay. https:\/\/uk.pcmag.com\/mobile-phone-accessories\/138509\/silent-airtags-withspeakers-removed-pop-up-on-etsy-ebay Section: Mobile Phone Accessories.  Michael Kan. 2022. 'Silent AirTags' With Speakers Removed Pop Up on Etsy eBay. https:\/\/uk.pcmag.com\/mobile-phone-accessories\/138509\/silent-airtags-withspeakers-removed-pop-up-on-etsy-ebay Section: Mobile Phone Accessories."},{"key":"e_1_3_2_1_28_1","unstructured":"Alex Kirschner and Apple Inc. 2022. An update on AirTag and unwanted tracking. https:\/\/www.apple.com\/newsroom\/2022\/02\/an-update-on-airtag-andunwanted-tracking\/  Alex Kirschner and Apple Inc. 2022. An update on AirTag and unwanted tracking. https:\/\/www.apple.com\/newsroom\/2022\/02\/an-update-on-airtag-andunwanted-tracking\/"},{"key":"e_1_3_2_1_29_1","volume-title":"Discovery of AirTag tracking device prevents double theft of truck. FOX 7 Austin (Dec","author":"Koski Rudy","year":"2021","unstructured":"Rudy Koski . 2021. Discovery of AirTag tracking device prevents double theft of truck. FOX 7 Austin (Dec . 2021 ). https:\/\/www.fox7austin.com\/news\/discoveryof-airtag-tracking-device-prevents-double-theft-of-truck#95 Rudy Koski. 2021. Discovery of AirTag tracking device prevents double theft of truck. FOX 7 Austin (Dec. 2021). https:\/\/www.fox7austin.com\/news\/discoveryof-airtag-tracking-device-prevents-double-theft-of-truck#95"},{"key":"e_1_3_2_1_30_1","volume-title":"Computer Security -- ESORICS 2021 (Lecture Notes in Computer Science)","author":"Kr\u00f6ll Tobias","unstructured":"Tobias Kr\u00f6ll , Stephan Kleber , Frank Kargl , Matthias Hollick , and Jiska Classen . 2021. ARIstoteles -- Dissecting Apple's Baseband Interface . In Computer Security -- ESORICS 2021 (Lecture Notes in Computer Science) . Springer International Publishing , Cham , 133--151. https:\/\/doi.org\/10.1007\/978--3-030--88418--5_7 10.1007\/978--3-030--88418--5_7 Tobias Kr\u00f6ll, Stephan Kleber, Frank Kargl, Matthias Hollick, and Jiska Classen. 2021. ARIstoteles -- Dissecting Apple's Baseband Interface. In Computer Security -- ESORICS 2021 (Lecture Notes in Computer Science). Springer International Publishing, Cham, 133--151. https:\/\/doi.org\/10.1007\/978--3-030--88418--5_7"},{"key":"e_1_3_2_1_31_1","volume-title":"Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs\/2111.05313","author":"Leu Patrick","year":"2021","unstructured":"Patrick Leu , Giovanni Camurati , Alexander Heinrich , Marc Roeschlin , Claudio Anliker , Matthias Hollick , Srdjan Capkun , and Jiska Classen . 2021 . Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs\/2111.05313 (2021). https:\/\/arxiv.org\/abs\/2111.05313 arXiv: 2111.05313. Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, and Jiska Classen. 2021. Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs\/2111.05313 (2021). https:\/\/arxiv.org\/abs\/2111.05313 arXiv: 2111.05313."},{"key":"e_1_3_2_1_32_1","volume-title":"Are Apple AirTags Being Used to Track People and Steal Cars? The New York Times (Dec","author":"Mac Ryan","year":"2021","unstructured":"Ryan Mac and Kashmir Hill . 2021. Are Apple AirTags Being Used to Track People and Steal Cars? The New York Times (Dec . 2021 ). https:\/\/www.nytimes.com\/ 2021\/12\/30\/technology\/apple-airtags-tracking-stalking.html Ryan Mac and Kashmir Hill. 2021. Are Apple AirTags Being Used to Track People and Steal Cars? The New York Times (Dec. 2021). https:\/\/www.nytimes.com\/ 2021\/12\/30\/technology\/apple-airtags-tracking-stalking.html"},{"key":"e_1_3_2_1_33_1","volume-title":"Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol. arXiv:1904.10600 [cs] (June","author":"Martin Jeremy","year":"2019","unstructured":"Jeremy Martin , Douglas Alpuche , Kristina Bodeman , Lamont Brown , Ellis Fenske , Lucas Foppe , Travis Mayberry , Erik C. Rye , Brandon Sipes , and Sam Teplov . 2019. Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol. arXiv:1904.10600 [cs] (June 2019 ). http:\/\/arxiv.org\/abs\/1904.10600 arXiv: 1904.10600. Jeremy Martin, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik C. Rye, Brandon Sipes, and Sam Teplov. 2019. Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol. arXiv:1904.10600 [cs] (June 2019). http:\/\/arxiv.org\/abs\/1904.10600 arXiv: 1904.10600."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485616"},{"key":"e_1_3_2_1_35_1","unstructured":"Samsung Electronics Inc. 2020. Find My Mobile | Apps & Services. https: \/\/www.samsung.com\/my\/apps\/find-my-mobile\/  Samsung Electronics Inc. 2020. Find My Mobile | Apps & Services. https: \/\/www.samsung.com\/my\/apps\/find-my-mobile\/"},{"key":"e_1_3_2_1_36_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Stute Milan","year":"2021","unstructured":"Milan Stute , Alexander Heinrich , Jannik Lorenz , and Matthias Hollick . 2021 . Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi . In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 3917--3934. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/ presentation\/stute Milan Stute, Alexander Heinrich, Jannik Lorenz, and Matthias Hollick. 2021. Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 3917--3934. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/ presentation\/stute"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241566"},{"key":"e_1_3_2_1_38_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Stute Milan","year":"2019","unstructured":"Milan Stute , Sashank Narain , Alex Mariotto , Alexander Heinrich , David Kreitschmann , Guevara Noubir , and Matthias Hollick . 2019 . A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, USA, 37--54. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/stute Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, and Matthias Hollick. 2019. A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, USA, 37--54. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/stute"},{"key":"e_1_3_2_1_39_1","unstructured":"The Ethics Commission of TU Darmstadt. 2019. Ethics Application TU Darmstadt. https:\/\/www.intern.tu-darmstadt.de\/gremien\/ethikkommisson\/antragstellung\/ index.en.jsp  The Ethics Commission of TU Darmstadt. 2019. Ethics Application TU Darmstadt. https:\/\/www.intern.tu-darmstadt.de\/gremien\/ethikkommisson\/antragstellung\/ index.en.jsp"},{"key":"e_1_3_2_1_40_1","unstructured":"Tile Inc. 2020. How Does the Tile Network Work? | Tile. https:\/\/www.thetileapp. com\/en-eu\/blog\/what-is-tile-network-community-find-lost-stolen-far-away  Tile Inc. 2020. How Does the Tile Network Work? | Tile. https:\/\/www.thetileapp. com\/en-eu\/blog\/what-is-tile-network-community-find-lost-stolen-far-away"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351"},{"key":"e_1_3_2_1_42_1","unstructured":"XY Labs. 2014. XY - The secure iOS\/Android Bluetooth tracking tag. https: \/\/www.kickstarter.com\/projects\/xyfindit\/xy-the-secure-tracking-ta  XY Labs. 2014. XY - The secure iOS\/Android Bluetooth tracking tag. https: \/\/www.kickstarter.com\/projects\/xyfindit\/xy-the-secure-tracking-ta"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:27Z","timestamp":1750191147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":41,"alternative-id":["10.1145\/3507657.3528546","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528546","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}