{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:45Z","timestamp":1767340185933,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1145\/3558482.3581775","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T16:10:08Z","timestamp":1687968608000},"page":"31-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Android OS Privacy Under the Loupe -- A Tale from the East"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3755-5184","authenticated-orcid":false,"given":"Haoyu","family":"Liu","sequence":"first","affiliation":[{"name":"The University of Edinburgh, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4056-4014","authenticated-orcid":false,"given":"Douglas J.","family":"Leith","sequence":"additional","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1037-0158","authenticated-orcid":false,"given":"Paul","family":"Patras","sequence":"additional","affiliation":[{"name":"The University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"EdXposed Framework. 2022. GitHub - ElderDrivers\/EdXposed: Elder driver Xposed Framework. https:\/\/github.com\/ElderDrivers\/EdXposed.  EdXposed Framework. 2022. GitHub - ElderDrivers\/EdXposed: Elder driver Xposed Framework. https:\/\/github.com\/ElderDrivers\/EdXposed."},{"key":"e_1_3_2_2_2_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Aafer Yousra","year":"2016","unstructured":"Yousra Aafer , Xiao Zhang , and Wenliang Du . 2016 . Harvesting Inconsistent Security Configurations in Custom Android $$ROMs$$ via Differential Analysis . In 25th USENIX Security Symposium (USENIX Security 16) . 1153--1168. Yousra Aafer, Xiao Zhang, and Wenliang Du. 2016. Harvesting Inconsistent Security Configurations in Custom Android $$ROMs$$ via Differential Analysis. In 25th USENIX Security Symposium (USENIX Security 16). 1153--1168."},{"key":"e_1_3_2_2_3_1","unstructured":"Android Open Source Project. 2022. Android Permissions. https:\/\/source.android.com\/docs\/core\/permissions.  Android Open Source Project. 2022. Android Permissions. https:\/\/source.android.com\/docs\/core\/permissions."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00091"},{"key":"e_1_3_2_2_6_1","first-page":"10","article-title":"Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis","volume":"17","author":"Continella Andrea","year":"2017","unstructured":"Andrea Continella , Yanick Fratantonio , Martina Lindorfer , Alessandro Puccetti , Ali Zand , Christopher Kruegel , and Giovanni Vigna . 2017 . Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis .. In NDSS , Vol. 17. 10 -- 14722 . Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, and Giovanni Vigna. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.. In NDSS, Vol. 17. 10--14722.","journal-title":"NDSS"},{"key":"e_1_3_2_2_7_1","unstructured":"Aldo Cortesi Maximilian Hils Thomas Kriechbaumer and contributors. 2020. mitmproxy: A free and open source interactive HTTPS proxy (v5.01). https:\/\/mitmproxy.org\/  Aldo Cortesi Maximilian Hils Thomas Kriechbaumer and contributors. 2020. mitmproxy: A free and open source interactive HTTPS proxy (v5.01). https:\/\/mitmproxy.org\/"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.52"},{"key":"e_1_3_2_2_9_1","volume-title":"Proc IEEE INFOCOM","author":"Douglas Leith Stephen Farrell","year":"2021","unstructured":"Stephen Farrell Douglas Leith . 2021 . Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps . In Proc IEEE INFOCOM 2021. Stephen Farrell Douglas Leith. 2021. Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps. In Proc IEEE INFOCOM 2021."},{"key":"e_1_3_2_2_10_1","unstructured":"Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183.  Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_2_12_1","unstructured":"European Parliament and Council of the European Union. 2016. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (Data Protection Directive).  European Parliament and Council of the European Union. 2016. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (Data Protection Directive)."},{"key":"e_1_3_2_2_13_1","unstructured":"Frida. 2022. Dynamic instrumentation toolkit for developers reverse-engineers and security researchers. https:\/\/frida.re\/  Frida. 2022. Dynamic instrumentation toolkit for developers reverse-engineers and security researchers. https:\/\/frida.re\/"},{"key":"e_1_3_2_2_14_1","unstructured":"Government of Canada. 2021. Personal Information Protection and Electronic Documents Act.  Government of Canada. 2021. Personal Information Protection and Electronic Documents Act."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0050"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23597-0_11"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90022-9_12"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0279942"},{"key":"e_1_3_2_2_19_1","unstructured":"New York Times. 2021. The State of Consumer Data Privacy Laws in the US (And Why It Matters).  New York Times. 2021. The State of Consumer Data Privacy Laws in the US (And Why It Matters)."},{"key":"e_1_3_2_2_20_1","unstructured":"Newzoo. 2021. Top Countries by Smartphone Users. https:\/\/newzoo.com\/insights\/rankings\/top-countries-by-smartphone-penetration-and-users.  Newzoo. 2021. Top Countries by Smartphone Users. https:\/\/newzoo.com\/insights\/rankings\/top-countries-by-smartphone-penetration-and-users."},{"key":"e_1_3_2_2_21_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Nguyen Trung Tin","year":"2021","unstructured":"Trung Tin Nguyen , Michael Backes , Ninja Marnau , and Ben Stock . 2021 . Share First, Ask Later (or Never?) Studying Violations of $$GDPR's$$ Explicit Consent in Android Apps . In 30th USENIX Security Symposium (USENIX Security 21) . 3667--3684. Trung Tin Nguyen, Michael Backes, Ninja Marnau, and Ben Stock. 2021. Share First, Ask Later (or Never?) Studying Violations of $$GDPR's$$ Explicit Consent in Android Apps. In 30th USENIX Security Symposium (USENIX Security 21). 3667--3684."},{"key":"e_1_3_2_2_22_1","unstructured":"Personal Information Protection Commission Japan. 2020. Act on the Protection of Personal Information.  Personal Information Protection Commission Japan. 2020. Act on the Protection of Personal Information."},{"key":"e_1_3_2_2_23_1","unstructured":"Presidencia da Republica Federativa do Brasil. 2020. Lei Geral de Protecao de Dados Pessoais.  Presidencia da Republica Federativa do Brasil. 2020. Lei Geral de Protecao de Dados Pessoais."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_2_25_1","volume-title":"28th USENIX Security Symposium.","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon , \u00c1lvaro Feal , Primal Wijesekera , Amit Elazari Bar On , Narseo Vallina-Rodriguez , and Serge Egelman . 2019 . 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system . In 28th USENIX Security Symposium. Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system. In 28th USENIX Security Symposium."},{"key":"e_1_3_2_2_26_1","volume-title":"The 25th Annual Network and Distributed System Security Symposium (NDSS","author":"Ren Jingjing","year":"2018","unstructured":"Jingjing Ren , Martina Lindorfer , Daniel J Dubois , Ashwin Rao , David Choffnes , Narseo Vallina-Rodriguez , 2018 . Bug fixes, improvements,... and privacy leaks . In The 25th Annual Network and Distributed System Security Symposium (NDSS 2018). Jingjing Ren, Martina Lindorfer, Daniel J Dubois, Ashwin Rao, David Choffnes, Narseo Vallina-Rodriguez, et al. 2018. Bug fixes, improvements,... and privacy leaks. In The 25th Annual Network and Distributed System Security Symposium (NDSS 2018)."},{"key":"e_1_3_2_2_27_1","unstructured":"RikkaApps. 2022. GitHub - RikkaApps\/Riru: Inject into zygote process. https:\/\/github.com\/RikkaApps\/Riru.  RikkaApps. 2022. GitHub - RikkaApps\/Riru: Inject into zygote process. https:\/\/github.com\/RikkaApps\/Riru."},{"volume-title":"Mobile Operating System Market Share in China -","year":"2022","key":"e_1_3_2_2_28_1","unstructured":"Statcounter. 2022. Mobile Operating System Market Share in China - October 2022 . https:\/\/gs.statcounter.com\/os-market-share\/mobile\/china. Statcounter. 2022. Mobile Operating System Market Share in China - October 2022. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/china."},{"key":"e_1_3_2_2_29_1","unstructured":"Tencent. 2022. GitHub - Tencent\/soter: A secure and quick biometric authentication standard and platform in Android held by Tencent.  Tencent. 2022. GitHub - Tencent\/soter: A secure and quick biometric authentication standard and platform in Android held by Tencent."},{"key":"e_1_3_2_2_30_1","unstructured":"The National People's Congress of the People's Republic of China. 2021. Personal Information Protection Law of the People's Republic of China. http:\/\/en.npc.gov.cn.cdurl.cn\/2021--12\/29\/c_694559.htm.  The National People's Congress of the People's Republic of China. 2021. Personal Information Protection Law of the People's Republic of China. http:\/\/en.npc.gov.cn.cdurl.cn\/2021--12\/29\/c_694559.htm."},{"key":"e_1_3_2_2_31_1","unstructured":"topjohnwu. 2022. GitHub - topjohnwu\/Magisk: The Magic Mask for Android. https:\/\/github.com\/topjohnwu\/Magisk.  topjohnwu. 2022. GitHub - topjohnwu\/Magisk: The Magic Mask for Android. https:\/\/github.com\/topjohnwu\/Magisk."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398812"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_19"},{"key":"e_1_3_2_2_34_1","unstructured":"Wikipedia. 2022. International Mobile Equipment Identity. https:\/\/en.wikipedia.org\/wiki\/International_Mobile_Equipment_Identity.  Wikipedia. 2022. International Mobile Equipment Identity. https:\/\/en.wikipedia.org\/wiki\/International_Mobile_Equipment_Identity."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_2_37_1","volume-title":"Host Fingerprinting and Tracking on the Web:Privacy and Security Implications. In Network and Distributed System Security Symposium (NDSS).","author":"Yen Ting-Fang","year":"2012","unstructured":"Ting-Fang Yen , Yinglian Xie , Fang Yu , Roger (Peng) Yu , and Martin Abadi . 2012 . Host Fingerprinting and Tracking on the Web:Privacy and Security Implications. In Network and Distributed System Security Symposium (NDSS). Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger (Peng) Yu, and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web:Privacy and Security Implications. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"}],"event":{"name":"WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Guildford United Kingdom","acronym":"WiSec '23"},"container-title":["Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3581775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3581775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:07Z","timestamp":1750178827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3581775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":38,"alternative-id":["10.1145\/3558482.3581775","10.1145\/3558482"],"URL":"https:\/\/doi.org\/10.1145\/3558482.3581775","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}