{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:47:03Z","timestamp":1767890823896,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3560512","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Study of User Privacy in Android Mobile AR Apps"],"prefix":"10.1145","author":[{"given":"Xiaoyi","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Rochester Institute of Technology, USA"}]},{"given":"Xueling","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Rochester Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. AppBrain. Retrieved July 2022 from https:\/\/www.appbrain.com"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_3_1","unstructured":"Steven Arzt Siegfried Rasthofer and Eric Bodden. 2013. SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_3_2_1_6_1","unstructured":"Zhongjie Ba Tianhang Zheng Xinyu Zhang Zhan Qin Baochun Li Xue Liu and Kui Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.. In NDSS."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"e_1_3_2_1_8_1","volume-title":"Mariano\u00a0Alca\u00f1iz Raya, and Giuseppe Riva.","author":"Cipresso Pietro","year":"2018","unstructured":"Pietro Cipresso, Irene Alice\u00a0Chicchi Giglioli, Mariano\u00a0Alca\u00f1iz Raya, and Giuseppe Riva. 2018. The past, present, and future of virtual and augmented reality research: a network and cluster analysis of the literature. Frontiers in psychology(2018), 2086."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_3_2_1_10_1","unstructured":"Anthony Desnos. 2022. Androguard. Retrieved Augues 1 2022 from https:\/\/androguard.readthedocs.io\/en\/latest\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","year":"2022","unstructured":"en.wikipedia.org. 2022. Augmented Reality. Retrieved July 31, 2022 from https:\/\/en.wikipedia.org\/wiki\/Augmented_reality"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","year":"2022","unstructured":"Google.Com. 2022. Manifest.permission. Retrieved July 31, 2022 from https:\/\/developer.android.com\/reference\/android\/Manifest.permission"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","year":"2022","unstructured":"Google.Com. 2022. Permissions on Android. Retrieved July 31, 2022 from https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"e_1_3_2_1_15_1","volume-title":"Provide information for Google Play\u2019s Data safety section. Retrieved Augues 1","year":"2022","unstructured":"Google.Com. 2022. Provide information for Google Play\u2019s Data safety section. Retrieved Augues 1, 2022 from https:\/\/support.google.com\/googleplay\/android-developer\/answer\/10787469?hl=en"},{"key":"e_1_3_2_1_16_1","volume-title":"Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps. In Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Harborth David","year":"2021","unstructured":"David Harborth and Alisa Frik. 2021. Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 513\u2013534."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106833"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_2_1_19_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Jana Suman","year":"2013","unstructured":"Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen\u00a0J Wang, and Eyal Ofek. 2013. Enabling {Fine-Grained} Permissions for Augmented Reality Applications with Recognizers. In 22nd USENIX Security Symposium (USENIX Security 13). 415\u2013430."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2017.8210616"},{"key":"e_1_3_2_1_21_1","unstructured":"Tadayoshi Kohno Joel Kollin David Molnar and Franziska\u00a0and Roesner. 2015. Display Leakage and Transparent Wearable Displays: Investigation of Risk Root Causes and Defenses. Technical Report MSR-TR-2015-18. https:\/\/www.microsoft.com\/en-us\/research\/publication\/display-leakage-and-transparent-wearable-displays-investigation-of-risk-root-causes-and-defenses\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00051"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Sarah\u00a0M Lehman Abrar\u00a0S Alrumayh Kunal Kolhe Haibin Ling and Chiu\u00a0C Tan. 2022. Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications. ACM Transactions on Privacy and Security(2022).","DOI":"10.1145\/3524020"},{"key":"e_1_3_2_1_24_1","volume-title":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC). IEEE, 1\u20138.","author":"Liu Xing","year":"2015","unstructured":"Xing Liu, Jiqiang Liu, and Wei Wang. 2015. Exploring sensor usage behaviors of Android applications based on data flow analysis. In 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC). IEEE, 1\u20138."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0446-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741657"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_28_1","unstructured":"Jack Nicas Cat Zakrzewski and J Greene. 2016. Augmented Reality Gets Boost From Success of Pok\u00e9mon Go\u2019. Wall Street Journal 13(2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_30_1","volume-title":"VR4Sec: 1st International Workshop on Security for XR and XR for Security.","author":"Roesner Franziska","unstructured":"Franziska Roesner and Tadayoshi Kohno. 2021. Security and Privacy for Augmented Reality: Our 10-Year Retrospective. In VR4Sec: 1st International Workshop on Security for XR and XR for Security."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJESMA.2019040101"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_2_1_34_1","unstructured":"Google\u00a0Play Store. 2022. AR Apps.Retrieved Augues 1 2022 from http:\/\/bit.ly\/GooglePlay_ArApps"},{"key":"e_1_3_2_1_35_1","unstructured":"Google\u00a0Play Store. 2022. AR Games.Retrieved Augues 1 2022 from http:\/\/bit.ly\/GooglePlay_ArGames"},{"key":"e_1_3_2_1_36_1","volume-title":"Characterizing Sensor Leaks in Android Apps. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 498\u2013509","author":"Sun Xiaoyu","year":"2021","unstructured":"Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, and John Grundy. 2021. Characterizing Sensor Leaks in Android Apps. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 498\u2013509."},{"key":"e_1_3_2_1_37_1","volume-title":"CWE-532: Insertion of Sensitive Information into Log File. Retrieved","author":"Common","year":"2022","unstructured":"Common weakness enumeration. 2006. CWE-532: Insertion of Sensitive Information into Log File. Retrieved Sept 1, 2022 from https:\/\/cwe.mitre.org\/data\/definitions\/532.html"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_3"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC47002.2019.00037"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288451"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3560512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3560512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:27:52Z","timestamp":1755851272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3560512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":41,"alternative-id":["10.1145\/3551349.3560512","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3560512","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}