{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:11Z","timestamp":1750220051875,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1816497, 1700544"],"award-info":[{"award-number":["1816497, 1700544"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595795","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"870-883","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3324-2949","authenticated-orcid":false,"given":"Yangyong","family":"Zhang","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5808-0718","authenticated-orcid":false,"given":"Raj","family":"Vardhan","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0177-5524","authenticated-orcid":false,"given":"Phakpoom","family":"Chinprutthiwong","sequence":"additional","affiliation":[{"name":"Sisaket Rajabhat University, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-741X","authenticated-orcid":false,"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"unstructured":"[n. d.]. Alexa Skill: Angel Investor. https:\/\/www.amazon.com\/Stoked-Skills-LLC-Angel-Investor\/dp\/B07GBLHKVR\/.  [n. d.]. Alexa Skill: Angel Investor. https:\/\/www.amazon.com\/Stoked-Skills-LLC-Angel-Investor\/dp\/B07GBLHKVR\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"[n. d.]. Alexa Skill: Calm My Cat. https:\/\/www.amazon.com\/Voice-Games-Relax-My-Cat\/dp\/B07JZ775V3\/.  [n. d.]. Alexa Skill: Calm My Cat. https:\/\/www.amazon.com\/Voice-Games-Relax-My-Cat\/dp\/B07JZ775V3\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"[n. d.]. Alexa Skill: debugMining. https:\/\/www.amazon.com\/%E8%B0%A2%E5%8B%87-debugMining\/dp\/B07FFKLPY2.  [n. d.]. Alexa Skill: debugMining. https:\/\/www.amazon.com\/%E8%B0%A2%E5%8B%87-debugMining\/dp\/B07FFKLPY2.","key":"e_1_3_2_1_3_1"},{"unstructured":"[n. d.]. Alexa Skill: Mapnav. https:\/\/www.amazon.com\/none-mapNav\/dp\/B0849QD5F4\/.  [n. d.]. Alexa Skill: Mapnav. https:\/\/www.amazon.com\/none-mapNav\/dp\/B0849QD5F4\/.","key":"e_1_3_2_1_4_1"},{"unstructured":"[n. d.]. Alexa Skill: Mediktor. https:\/\/www.amazon.com\/Teckel-Solutions-S-L-Mediktor\/dp\/B075XRN21X\/.  [n. d.]. Alexa Skill: Mediktor. https:\/\/www.amazon.com\/Teckel-Solutions-S-L-Mediktor\/dp\/B075XRN21X\/.","key":"e_1_3_2_1_5_1"},{"unstructured":"[n. d.]. Alexa Skill: Shower Timer. https:\/\/www.amazon.com\/CMM-Tech-Shower-Timer\/dp\/B07HWRBL8M.  [n. d.]. Alexa Skill: Shower Timer. https:\/\/www.amazon.com\/CMM-Tech-Shower-Timer\/dp\/B07HWRBL8M.","key":"e_1_3_2_1_6_1"},{"unstructured":"[n. d.]. Alexa Skill: The Magic Door. https:\/\/www.amazon.com\/The-Magic-Door-LLC\/dp\/B01BMUU6JQ.  [n. d.]. Alexa Skill: The Magic Door. https:\/\/www.amazon.com\/The-Magic-Door-LLC\/dp\/B01BMUU6JQ.","key":"e_1_3_2_1_7_1"},{"unstructured":"[n. d.]. Alexa Skill: The Soap Box. https:\/\/www.amazon.com\/Blutag-Inc-The-Soap-Box\/dp\/B07L129Y27\/.  [n. d.]. Alexa Skill: The Soap Box. https:\/\/www.amazon.com\/Blutag-Inc-The-Soap-Box\/dp\/B07L129Y27\/.","key":"e_1_3_2_1_8_1"},{"unstructured":"[n. d.]. Alexa Skill: Twenty Questions. https:\/\/www.amazon.com\/Amazon-Twenty-Questions\/dp\/B01C3CO48G.  [n. d.]. Alexa Skill: Twenty Questions. https:\/\/www.amazon.com\/Amazon-Twenty-Questions\/dp\/B01C3CO48G.","key":"e_1_3_2_1_9_1"},{"unstructured":"[n. d.]. Alexa Skill: Wiffy. https:\/\/www.amazon.com\/hartman-Wiffy\/dp\/B06WVB8WM7\/.  [n. d.]. Alexa Skill: Wiffy. https:\/\/www.amazon.com\/hartman-Wiffy\/dp\/B06WVB8WM7\/.","key":"e_1_3_2_1_10_1"},{"unstructured":"[n. d.]. Amazon Alexa Account Linking Documentation. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/account-linking\/account-linking-concepts.html.  [n. d.]. Amazon Alexa Account Linking Documentation. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/account-linking\/account-linking-concepts.html.","key":"e_1_3_2_1_11_1"},{"unstructured":"[n. d.]. Custom Notification Skill. https:\/\/www.amazon.com\/Just-Reed-LLC-Custom-Notification\/dp\/B08G19NYMH\/.  [n. d.]. Custom Notification Skill. https:\/\/www.amazon.com\/Just-Reed-LLC-Custom-Notification\/dp\/B08G19NYMH\/.","key":"e_1_3_2_1_12_1"},{"unstructured":"[n. d.]. Google Play Protect. https:\/\/www.android.com\/play-protect\/ .  [n. d.]. Google Play Protect. https:\/\/www.android.com\/play-protect\/ .","key":"e_1_3_2_1_13_1"},{"unstructured":"[n. d.]. Proactive Events API. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/smapi\/proactive-events-api.html .  [n. d.]. Proactive Events API. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/smapi\/proactive-events-api.html .","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Accessed","author":"Website Project","year":"2020","unstructured":"[n. d.]. Project Website : Do Users Really Know Alexa?https:\/\/sites.google.com\/view\/dousersreallyknowalexa\/ . Accessed October 21, 2020 . [n. d.]. Project Website: Do Users Really Know Alexa?https:\/\/sites.google.com\/view\/dousersreallyknowalexa\/. Accessed October 21, 2020."},{"unstructured":"[n. d.]. What to do when your iPhone says an app has been using your location in the background. https:\/\/qz.com\/1713581\/what-to-do-when-an-iphone-app-is-using-your-location-in-the-background\/.  [n. d.]. What to do when your iPhone says an app has been using your location in the background. https:\/\/qz.com\/1713581\/what-to-do-when-an-iphone-app-is-using-your-location-in-the-background\/.","key":"e_1_3_2_1_16_1"},{"volume-title":"Accessed","year":"2020","unstructured":"[n. d.]. Where to host an Alexa Skill. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/understanding-custom-skills.html . Accessed April 30, 2020 . [n. d.]. Where to host an Alexa Skill. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/understanding-custom-skills.html. Accessed April 30, 2020.","key":"e_1_3_2_1_17_1"},{"unstructured":"2020. Alexa List in Alexa Skill Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/access-the-alexa-shopping-and-to-do-lists.html.  2020. Alexa List in Alexa Skill Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/access-the-alexa-shopping-and-to-do-lists.html.","key":"e_1_3_2_1_18_1"},{"unstructured":"2020. Alexa Reminder in Alexa Skill Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/smapi\/alexa-reminders-overview.html.  2020. Alexa Reminder in Alexa Skill Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/smapi\/alexa-reminders-overview.html.","key":"e_1_3_2_1_19_1"},{"unstructured":"2021. Alexa Certification\u2019s Security Requirements. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/security-testing-for-an-alexa-skill.html.  2021. Alexa Certification\u2019s Security Requirements. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/security-testing-for-an-alexa-skill.html.","key":"e_1_3_2_1_20_1"},{"unstructured":"2021. Alexa Developer Documentation: Account Linking Concept. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/account-linking\/account-linking-concepts.html.  2021. Alexa Developer Documentation: Account Linking Concept. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/account-linking\/account-linking-concepts.html.","key":"e_1_3_2_1_21_1"},{"unstructured":"2021. Alexa Permission in Custom Skill. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/configure-permissions-for-customer-information-in-your-skill.html.  2021. Alexa Permission in Custom Skill. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/configure-permissions-for-customer-information-in-your-skill.html.","key":"e_1_3_2_1_22_1"},{"unstructured":"2021. Alexa Skill: Running history check for Strava (unofficial). https:\/\/www.amazon.com\/Running-history-check-Strava-unofficial\/dp\/B06XG4Z1N6.  2021. Alexa Skill: Running history check for Strava (unofficial). https:\/\/www.amazon.com\/Running-history-check-Strava-unofficial\/dp\/B06XG4Z1N6.","key":"e_1_3_2_1_23_1"},{"unstructured":"2021. Voicebot.AI: Amazon Alexa Has 100k Skills. https:\/\/voicebot.ai\/2019\/10\/01\/amazon-alexa-has-100k-skills-but-momentum-slows-globally-here-is-the-breakdown-by-country\/  2021. Voicebot.AI: Amazon Alexa Has 100k Skills. https:\/\/voicebot.ai\/2019\/10\/01\/amazon-alexa-has-100k-skills-but-momentum-slows-globally-here-is-the-breakdown-by-country\/","key":"e_1_3_2_1_24_1"},{"unstructured":"2023. Strava Revenue and Usage Statistics. https:\/\/www.businessofapps.com\/data\/strava-statistics.  2023. Strava Revenue and Usage Statistics. https:\/\/www.businessofapps.com\/data\/strava-statistics.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi , Kopo\u00a0 M Ramokapane , and Jose\u00a0 M Such . 2019 . More than smart speakers: security and privacy perceptions of smart home personal assistants . In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019). Noura Abdi, Kopo\u00a0M Ramokapane, and Jose\u00a0M Such. 2019. More than smart speakers: security and privacy perceptions of smart home personal assistants. In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_1_28_1","volume-title":"Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. arXiv preprint arXiv:1904.05734","author":"Abdullah Hadi","year":"2019","unstructured":"Hadi Abdullah , Washington Garcia , Christian Peeters , Patrick Traynor , Kevin\u00a0 RB Butler , and Joseph Wilson . 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. arXiv preprint arXiv:1904.05734 ( 2019 ). Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin\u00a0RB Butler, and Joseph Wilson. 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. arXiv preprint arXiv:1904.05734 (2019)."},{"volume-title":"22nd { USENIX} Security Symposium ({ USENIX} Security 13). 257\u2013272.","author":"Akhawe Devdatta","unstructured":"Devdatta Akhawe and Adrienne\u00a0Porter Felt . 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness . In 22nd { USENIX} Security Symposium ({ USENIX} Security 13). 257\u2013272. Devdatta Akhawe and Adrienne\u00a0Porter Felt. 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness. In 22nd { USENIX} Security Symposium ({ USENIX} Security 13). 257\u2013272.","key":"e_1_3_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2702123.2702210"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_32_1","volume-title":"10th Symposium On Usable Privacy and Security ({ SOUPS}","author":"Bravo-Lillo Cristian","year":"2014","unstructured":"Cristian Bravo-Lillo , Lorrie Cranor , Saranga Komanduri , Stuart Schechter , and Manya Sleeper . 2014 . Harder to ignore? Revisiting pop-up fatigue and approaches to prevent it . In 10th Symposium On Usable Privacy and Security ({ SOUPS} 2014). 105\u2013111. Cristian Bravo-Lillo, Lorrie Cranor, Saranga Komanduri, Stuart Schechter, and Manya Sleeper. 2014. Harder to ignore? Revisiting pop-up fatigue and approaches to prevent it. In 10th Symposium On Usable Privacy and Security ({ SOUPS} 2014). 105\u2013111."},{"volume-title":"25th { USENIX} Security Symposium ({ USENIX} Security 16). 513\u2013530.","author":"Carlini Nicholas","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016. Hidden voice commands . In 25th { USENIX} Security Symposium ({ USENIX} Security 16). 513\u2013530. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In 25th { USENIX} Security Symposium ({ USENIX} Security 16). 513\u2013530.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/3372297.3423339"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/3313831.3376551"},{"key":"e_1_3_2_1_36_1","volume-title":"Influence: Science and practice. Vol.\u00a04. Pearson education Boston.","author":"Cialdini B","year":"2009","unstructured":"Robert\u00a0 B Cialdini and Lloyd James . 2009 . Influence: Science and practice. Vol.\u00a04. Pearson education Boston. Robert\u00a0B Cialdini and Lloyd James. 2009. Influence: Science and practice. Vol.\u00a04. Pearson education Boston."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","first-page":"e5654","DOI":"10.2196\/jmir.5654","article-title":"The pros and cons of getting engaged in an online social community embedded within digital cognitive behavioral therapy for insomnia: survey among users","volume":"18","author":"Coulson S","year":"2016","unstructured":"Neil\u00a0 S Coulson , Richard Smedley , Sophie Bostock , Simon\u00a0 D Kyle , Rosie Gollancz , Annemarie\u00a0 I Luik , Peter Hames , and Colin\u00a0 A Espie . 2016 . The pros and cons of getting engaged in an online social community embedded within digital cognitive behavioral therapy for insomnia: survey among users . Journal of medical Internet research 18 , 4 (2016), e5654 . Neil\u00a0S Coulson, Richard Smedley, Sophie Bostock, Simon\u00a0D Kyle, Rosie Gollancz, Annemarie\u00a0I Luik, Peter Hames, and Colin\u00a0A Espie. 2016. The pros and cons of getting engaged in an online social community embedded within digital cognitive behavioral therapy for insomnia: survey among users. Journal of medical Internet research 18, 4 (2016), e5654.","journal-title":"Journal of medical Internet research"},{"key":"e_1_3_2_1_38_1","volume-title":"The Web Conference","author":"Edu Jide","year":"2022","unstructured":"Jide Edu , Xavier\u00a0Ferrer Aran , Jose Such , and Guillermo Suarez-Tangil . 2022 . Measuring Alexa Skill Privacy Practices across Three Years . In The Web Conference 2022. ACM. Jide Edu, Xavier\u00a0Ferrer Aran, Jose Such, and Guillermo Suarez-Tangil. 2022. Measuring Alexa Skill Privacy Practices across Three Years. In The Web Conference 2022. ACM."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/1357054.1357219"},{"unstructured":"Kenneth\u00a0Michael Farley John O\u2019Reilly Leon Squire and Rick Beasley. 2001. Voice application development with VoiceXML. Pearson Education.  Kenneth\u00a0Michael Farley John O\u2019Reilly Leon Squire and Rick Beasley. 2001. Voice application development with VoiceXML. Pearson Education.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/2046707.2046779"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium, Vol.\u00a030","author":"Felt Adrienne\u00a0Porter","year":"2011","unstructured":"Adrienne\u00a0Porter Felt , Helen\u00a0 J Wang , Alexander Moshchuk , Steve Hanna , and Erika Chin . 2011 . Permission Re-Delegation: Attacks and Defenses .. In USENIX Security Symposium, Vol.\u00a030 . 88. Adrienne\u00a0Porter Felt, Helen\u00a0J Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses.. In USENIX Security Symposium, Vol.\u00a030. 88."},{"volume-title":"29th { USENIX} Security Symposium ({ USENIX} Security 20). 2649\u20132666.","author":"Guo Zhixiu","unstructured":"Zhixiu Guo , Zijin Lin , Pan Li , and Kai Chen . 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale . In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 2649\u20132666. Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 2649\u20132666.","key":"e_1_3_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/3313831.3376529"},{"doi-asserted-by":"crossref","unstructured":"Daniel Kahneman and Amos Tversky. 1979. On the interpretation of intuitive probability: A reply to Jonathan Cohen. (1979).  Daniel Kahneman and Amos Tversky. 1979. On the interpretation of intuitive probability: A reply to Jonathan Cohen. (1979).","key":"e_1_3_2_1_46_1","DOI":"10.1016\/0010-0277(79)90024-6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1007\/978-3-642-34638-5_6"},{"volume-title":"27th { USENIX} Security Symposium ({ USENIX} Security 18). 33\u201347.","author":"Kumar Deepak","unstructured":"Deepak Kumar , Riccardo Paccagnella , Paul Murley , Eric Hennenfent , Joshua Mason , Adam Bates , and Michael Bailey . 2018. Skill squatting attacks on amazon alexa . In 27th { USENIX} Security Symposium ({ USENIX} Security 18). 33\u201347. Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill squatting attacks on amazon alexa. In 27th { USENIX} Security Symposium ({ USENIX} Security 18). 33\u201347.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","volume-title":"A three-stage model summarizes product warning and environmental sign research. Safety science 61","author":"Laughery R","year":"2014","unstructured":"Kenneth\u00a0 R Laughery and Michael\u00a0 S Wogalter . 2014. A three-stage model summarizes product warning and environmental sign research. Safety science 61 ( 2014 ), 3\u201310. Kenneth\u00a0R Laughery and Michael\u00a0S Wogalter. 2014. A three-stage model summarizes product warning and environmental sign research. Safety science 61 (2014), 3\u201310."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1109\/MPRV.2019.2906991"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1145\/1179529.1179532"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1007\/BF00055564"},{"key":"e_1_3_2_1_53_1","volume-title":"World-Wide Web survey research: Benefits, potential problems, and solutions. Behavior research methods, instruments, & computers 29, 2","author":"Schmidt C","year":"1997","unstructured":"William\u00a0 C Schmidt . 1997. World-Wide Web survey research: Benefits, potential problems, and solutions. Behavior research methods, instruments, & computers 29, 2 ( 1997 ), 274\u2013279. William\u00a0C Schmidt. 1997. World-Wide Web survey research: Benefits, potential problems, and solutions. Behavior research methods, instruments, & computers 29, 2 (1997), 274\u2013279."},{"key":"e_1_3_2_1_54_1","volume-title":"Reflective and impulsive determinants of social behavior. Personality and social psychology review 8, 3","author":"Strack Fritz","year":"2004","unstructured":"Fritz Strack and Roland Deutsch . 2004. Reflective and impulsive determinants of social behavior. Personality and social psychology review 8, 3 ( 2004 ), 220\u2013247. Fritz Strack and Roland Deutsch. 2004. Reflective and impulsive determinants of social behavior. Personality and social psychology review 8, 3 (2004), 220\u2013247."},{"key":"e_1_3_2_1_55_1","volume-title":"Security Symposium ({ USENIX} Security 19)","author":"Thompson Christopher","year":"2019","unstructured":"Christopher Thompson , Martin Shelton , Emily Stark , Maximilian Walker , Emily Schechter , and Adrienne\u00a0Porter Felt . 2019 . The web\u2019s identity crisis: understanding the effectiveness of website identity indicators. In 28th { USENIX} Security Symposium ({ USENIX} Security 19) . 1715\u20131732. Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne\u00a0Porter Felt. 2019. The web\u2019s identity crisis: understanding the effectiveness of website identity indicators. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 1715\u20131732."},{"key":"e_1_3_2_1_56_1","volume-title":"Communication-human information processing (C-HIP) model. Handbook of warnings","author":"Wogalter S","year":"2006","unstructured":"Michael\u00a0 S Wogalter . 2006. Communication-human information processing (C-HIP) model. Handbook of warnings ( 2006 ), 51\u201361. Michael\u00a0S Wogalter. 2006. Communication-human information processing (C-HIP) model. Handbook of warnings (2006), 51\u201361."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_58_1","volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE.","author":"Zhang Nan","year":"2019","unstructured":"Nan Zhang , Xianghang Mi , Xuan Feng , XiaoFeng Wang , Yuan Tian , and Feng Qian . 2019 . Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems . In IEEE Symposium on Security and Privacy (SP). IEEE. Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, and Feng Qian. 2019. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In IEEE Symposium on Security and Privacy (SP). IEEE."},{"doi-asserted-by":"crossref","unstructured":"Yangyong Zhang Lei Xu Abner Mendoza Guangliang Yang Phakpoom Chinprutthiwong and Guofei Gu. 2019. Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.. In NDSS.  Yangyong Zhang Lei Xu Abner Mendoza Guangliang Yang Phakpoom Chinprutthiwong and Guofei Gu. 2019. Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.. In NDSS.","key":"e_1_3_2_1_59_1","DOI":"10.14722\/ndss.2019.23525"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"ASIA CCS '23","name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595795","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3595795","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":59,"alternative-id":["10.1145\/3579856.3595795","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595795","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}