{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:36:07Z","timestamp":1776101767690,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642310","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:06Z","timestamp":1715416686000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5254-3296","authenticated-orcid":false,"given":"Divyanshu","family":"Bhardwaj","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5017-9801","authenticated-orcid":false,"given":"Carolyn","family":"Guthoff","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0340-6204","authenticated-orcid":false,"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5644-3316","authenticated-orcid":false,"given":"Sascha","family":"Fahl","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2425-3013","authenticated-orcid":false,"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","unstructured":"[n. d.]. Chat Control: The EU\u2019s CSEM Scanner Proposal. Retrieved 2023-09-12 from https:\/\/www.patrick-breyer.de\/en\/posts\/chat-control\/"},{"key":"e_1_3_3_3_2_1","unstructured":"[n. d.]. NCMEC Child Sexual Abuse Material. Retrieved 2023-09-12 from http:\/\/www.missingkids.org\/theissues\/csam.html"},{"key":"e_1_3_3_3_3_1","unstructured":"[n. d.]. Thorn Child Pornography and Sexual Abuse Statistics. Retrieved 2023-09-12 from https:\/\/www.thorn.org\/child-pornography-and-abuse-statistics\/"},{"key":"e_1_3_3_3_4_1","unstructured":"2012. Charter of Fundamental Rights of the European Union. Retrieved 2023-09-12 from http:\/\/data.europa.eu\/eli\/treaty\/char_2012\/oj\/eng"},{"key":"e_1_3_3_3_5_1","unstructured":"2013. Children\u2019s Online Privacy Protection Rule (\"COPPA\"). Retrieved 2023-09-12 from https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa"},{"key":"e_1_3_3_3_6_1","volume-title":"Investigatory Powers Act","year":"2016","unstructured":"2016. Investigatory Powers Act 2016. Retrieved 2023-09-12 from https:\/\/www.legislation.gov.uk\/ukpga\/2016\/25\/contents\/enacted"},{"key":"e_1_3_3_3_7_1","unstructured":"2019. Attorney General Bill Barr Will Ask Zuckerberg To Halt Plans For End-To-End Encryption Across Facebook\u2019s Apps. Retrieved 2023-09-12 from https:\/\/www.buzzfeednews.com\/article\/ryanmac\/bill-barr-facebook-letter-halt-encryption"},{"key":"e_1_3_3_3_8_1","unstructured":"2020. Curbing the Surge in Online Child Abuse: The Dual Role of Digital Technology in Fighting and Facilitating Its Proliferation | Think Tank | European Parliament. Retrieved 2023-09-12 from https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2020)659360"},{"key":"e_1_3_3_3_9_1","unstructured":"2020. EU Strategy for a More Effective Fight against Child Sexual Abuse. Retrieved 2023-09-12 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A52020DC0607"},{"key":"e_1_3_3_3_10_1","unstructured":"2020. EU Technical Solutions to Detect Child Sexual Abuse in E2EE Communications. Retrieved 2023-09-12 from https:\/\/www.politico.eu\/wp-content\/uploads\/2020\/09\/SKM_C45820090717470-1_new.pdf"},{"key":"e_1_3_3_3_11_1","unstructured":"2020. EU Temporary Derogation of Directive. Retrieved 2023-09-12 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52020PC0568"},{"key":"e_1_3_3_3_12_1","unstructured":"2022. Assessment of Proposal for a Regulation Laying down Rules to Prevent and Combat Child Sexual Abuse | Think Tank | European Parliament. Retrieved 2023-09-12 from https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_STU(2023)740248"},{"key":"e_1_3_3_3_13_1","unstructured":"2022. EU Proposal for Laying down Rules to Prevent and Combat Child Sexual Abuse. Retrieved 2023-09-12 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=COM%3A2022%3A209%3AFIN"},{"key":"e_1_3_3_3_14_1","unstructured":"2022. Online Safety Bill - Parliamentary Bills - UK Parliament. Retrieved 2023-09-12 from https:\/\/bills.parliament.uk\/bills\/3137"},{"key":"e_1_3_3_3_15_1","unstructured":"2023. Chat Control - The End of the Privacy of Digital Correspondence. Retrieved 2023-09-07 from https:\/\/www.patrick-breyer.de\/en\/posts\/messaging-and-chat-control\/"},{"key":"e_1_3_3_3_16_1","unstructured":"2023. CyberTipline 2022 Report. Retrieved 2023-09-04 from https:\/\/www.missingkids.org\/cybertiplinedata"},{"key":"e_1_3_3_3_17_1","unstructured":"2023. EURion Constellation. Retrieved 2023-09-12 from https:\/\/en.wikipedia.org\/w\/index.php?title=EURion_constellation&oldid=1174760675"},{"key":"e_1_3_3_3_18_1","unstructured":"2023. Google Image Search. Retrieved 2023-09-04 from https:\/\/www.google.com\/imghp"},{"key":"e_1_3_3_3_19_1","unstructured":"2023. Microsoft Bing. Retrieved 2023-09-04 from https:\/\/www.bing.com\/images\/"},{"key":"e_1_3_3_3_20_1","volume-title":"118th Congress (2023-2024)","author":"Text","year":"2023","unstructured":"2023. Text - S.1207 - 118th Congress (2023-2024): EARN IT Act of 2023. Retrieved 2023-09-12 from https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/1207\/text"},{"key":"e_1_3_3_3_21_1","unstructured":"2023. TinEye. Retrieved 2023-09-04 from https:\/\/tineye.com\/"},{"key":"e_1_3_3_3_22_1","volume-title":"Bugs in Our Pockets: The Risks of Client-Side Scanning. arXiv:2110.07450 [cs] (Oct","author":"Abelson Hal","year":"2021","unstructured":"Hal Abelson, Ross Anderson, Steven\u00a0M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter\u00a0G. Neumann, Ronald\u00a0L. Rivest, Jeffrey\u00a0I. Schiller, Bruce Schneier, Vanessa Teague, and Carmela Troncoso. 2021. Bugs in Our Pockets: The Risks of Client-Side Scanning. arXiv:2110.07450 [cs] (Oct. 2021). arxiv:2110.07450\u00a0[cs] Retrieved 2023-09-12 from http:\/\/arxiv.org\/abs\/2110.07450"},{"key":"e_1_3_3_3_23_1","volume-title":"Telecommunications and Other Legislation Amendment (Assistance and Access) Act","author":"Affairs Home","year":"2018","unstructured":"Home Affairs. 2018. Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018. Retrieved 2023-09-12 from https:\/\/www.legislation.gov.au\/Details\/C2018A00148\/Html\/Text, http:\/\/www.legislation.gov.au\/Details\/C2018A00148"},{"key":"e_1_3_3_3_24_1","volume-title":"Customer Letter: The San Bernardino Case. Retrieved 2023-09-12 from http:\/\/www.apple.com\/customer-letter\/","year":"2016","unstructured":"Apple. 2016. Customer Letter: The San Bernardino Case. Retrieved 2023-09-12 from http:\/\/www.apple.com\/customer-letter\/"},{"key":"e_1_3_3_3_25_1","unstructured":"Apple. 2021. Child Safety. Retrieved 2023-09-12 from https:\/\/www.apple.com\/child-safety\/"},{"key":"e_1_3_3_3_26_1","unstructured":"Apple. 2021. CSAM Detection - Technical Summary. Retrieved 2023-09-12 from https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf"},{"key":"e_1_3_3_3_27_1","unstructured":"Apple. 2021. Security Threat Model Review of Apple\u2019s Child Safety Features. Retrieved 2023-12-01 from https:\/\/www.apple.com\/child-safety\/pdf\/Security_Threat_Model_Review_of_Apple_Child_Safety_Features.pdf"},{"key":"e_1_3_3_3_28_1","unstructured":"Apple. 2023. About Communication Safety in Messages. Retrieved 2023-09-12 from https:\/\/support.apple.com\/en-us\/HT212850"},{"key":"e_1_3_3_3_29_1","unstructured":"Apple. 2023. Sensitive Content Analysis. Retrieved 2023-09-12 from https:\/\/developer.apple.com\/documentation\/sensitivecontentanalysis"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/14613557211026935"},{"key":"e_1_3_3_3_32_1","unstructured":"Danijela Frange\u017e Anton\u00a0Toni Klan\u010dnik Mojca\u00a0\u017dagar Karer Bj\u00f8rn-Erik Ludvigsen Jaros\u0142aw Ko\u0144czyk Fernando\u00a0Ruiz Perez Mikko Veijalainen and Maurine Lewin. 2015. The Importance of Terminology Related to Child Sexual Exploitation. In Revija Za Kriminalistiko in Kriminologijo. Retrieved 2023-09-12 from https:\/\/www.policija.si\/images\/stories\/Publikacije\/RKK\/PDF\/2015\/04\/RKK2015-04_DanijelaFrangez_TheImportanceOfTerminology.pdf"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_3_3_34_1","unstructured":"Andrew Crocker and\u00a0Gennie Gebhart. 2019. Don\u2019t Let Encrypted Messaging Become a Hollow Promise. Retrieved 2023-09-12 from https:\/\/www.eff.org\/deeplinks\/2019\/07\/dont-let-encrypted-messaging-become-hollow-promise"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00178"},{"key":"e_1_3_3_3_36_1","unstructured":"Peter Guest. 2023. Britain Admits Defeat in Controversial Fight to Break Encryption. Retrieved 2023-09-12 from https:\/\/www.wired.com\/story\/britain-admits-defeat-online-safety-bill-encryption\/"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484559"},{"key":"e_1_3_3_3_38_1","volume-title":"6th Workshop on Technology and Consumer Protection (ConPro). Retrieved 2023-09-12 from https:\/\/www.ml.informatik.tu-darmstadt.de\/papers\/hintersdorf2022conpro_learning.pdf","author":"Hintersdorf Dominik","unstructured":"Dominik Hintersdorf, Lukas Struppek, Daniel Neider, and Kristian Kersting. 2022. Investigating the Risks of Client-Side Scanning for the Use Case NeuralHash. In 6th Workshop on Technology and Consumer Protection (ConPro). Retrieved 2023-09-12 from https:\/\/www.ml.informatik.tu-darmstadt.de\/papers\/hintersdorf2022conpro_learning.pdf"},{"key":"e_1_3_3_3_39_1","unstructured":"Ashish Hooda Andrey Labunets Tadayoshi Kohno and Earlence Fernandes. 2022. Re-Purposing Perceptual Hashing Based Client Side Scanning for Physical Surveillance. arxiv:2212.04107\u00a0[cs] Retrieved 2023-09-12 from http:\/\/arxiv.org\/abs\/2212.04107"},{"key":"e_1_3_3_3_40_1","unstructured":"Ian Levy Crispin Robinson. 2018. Principles for a More Informed Exceptional Access Debate. Retrieved 2023-09-11 from https:\/\/www.lawfaremedia.org\/article\/principles-more-informed-exceptional-access-debate"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","unstructured":"Shubham Jain Ana-Maria Cretu Antoine Cully and Yves-Alexandre de Montjoye. 2023. Deep Perceptual Hashing Algorithms with Hidden Dual Purpose: When Client-Side Scanning Does Facial Recognition. https:\/\/doi.org\/10.1109\/SP46215.2023.00179 arxiv:2306.11924\u00a0[cs]","DOI":"10.1109\/SP46215.2023.00179"},{"key":"e_1_3_3_3_42_1","volume-title":"Adversarial Detection Avoidance Attacks: Evaluating the Robustness of Perceptual Hashing-Based Client-Side Scanning. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Jain Shubham","year":"2022","unstructured":"Shubham Jain, Ana-Maria Cre\u021bu, and Yves-Alexandre de Montjoye. 2022. Adversarial Detection Avoidance Attacks: Evaluating the Robustness of Perceptual Hashing-Based Client-Side Scanning. In 31st USENIX Security Symposium (USENIX Security 22). 2317\u20132334. Retrieved 2023-09-12 from https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/jain"},{"key":"e_1_3_3_3_43_1","unstructured":"Joe Mullin. 2023. The EARN IT Bill Is Back Seeking To Scan Our Messages and Photos. Retrieved 2023-09-11 from https:\/\/www.eff.org\/de\/deeplinks\/2023\/04\/earn-it-bill-back-again-seeking-scan-our-messages-and-photos"},{"key":"e_1_3_3_3_44_1","unstructured":"Jennifer Langston. 2018. How PhotoDNA for Video Is Being Used to Fight Online Child Exploitation \u2013 On the Issues. Retrieved 2023-09-12 from https:\/\/news.microsoft.com\/on-the-issues\/2018\/09\/12\/how-photodna-for-video-is-being-used-to-fight-online-child-exploitation\/"},{"key":"e_1_3_3_3_45_1","unstructured":"Chance Miller. 2021. In Internal Memo Apple Addresses Concerns around New Photo Scanning Features Doubles down on the Need to Protect Children. Retrieved 2023-09-12 from https:\/\/9to5mac.com\/2021\/08\/06\/apple-internal-memo-icloud-photo-scanning-concerns\/"},{"key":"e_1_3_3_3_46_1","unstructured":"Joe Mullin. 2022. Google\u2019s Scans of Private Photos Led to False Accusations of Child Abuse. Retrieved 2023-09-12 from https:\/\/www.eff.org\/deeplinks\/2022\/08\/googles-scans-private-photos-led-false-accusations-child-abuse"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pedhc.2020.11.010"},{"key":"e_1_3_3_3_48_1","unstructured":"Lily\u00a0Hay Newman. 2022. Apple Kills Its Plan to Scan Your Photos for CSAM. Here\u2019s What\u2019s Next. Retrieved 2023-09-12 from https:\/\/www.wired.com\/story\/apple-photo-scanning-csam-communication-safety-messages\/"},{"key":"e_1_3_3_3_49_1","unstructured":"Riana Pfefferkorn. 2019. William Barr and Winnie the Pooh. Retrieved 2023-09-12 from https:\/\/cyberlaw.stanford.edu\/blog\/2019\/10\/william-barr-and-winnie-pooh"},{"key":"e_1_3_3_3_50_1","unstructured":"Erica Portnoy. 2019. Why Adding Client-Side Scanning Breaks End-To-End Encryption. Retrieved 2023-09-12 from https:\/\/www.eff.org\/deeplinks\/2019\/11\/why-adding-client-side-scanning-breaks-end-end-encryption"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313427"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7356"},{"key":"e_1_3_3_3_53_1","unstructured":"Rosa Golijan. 2013. Is your cloud drive really private? Not according to fine print. Retrieved 2023-09-11 from https:\/\/www.nbcnews.com\/technolog\/your-cloud-drive-really-private-not-according-fine-print-1c8881731"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2021.1967707"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_3_3_56_1","volume-title":"Risk and the First Amendment: Unraveling the Chilling Effect. 58 Boston University Law Review 685-732 (1978) (Jan","author":"Schauer Frederick","year":"1978","unstructured":"Frederick Schauer. 1978. Fear, Risk and the First Amendment: Unraveling the Chilling Effect. 58 Boston University Law Review 685-732 (1978) (Jan. 1978). Retrieved 2023-09-12 from https:\/\/scholarship.law.wm.edu\/facpubs\/879"},{"key":"e_1_3_3_3_57_1","volume-title":"Andi Wilson Thompson","author":"Franklin Sharon Bradford","year":"2019","unstructured":"Sharon Bradford Franklin, Andi Wilson Thompson. 2019. Open Letter to GCHQ on the Threats Posed by the Ghost Proposal. Retrieved 2023-09-11 from https:\/\/www.lawfaremedia.org\/article\/open-letter-gchq-threats-posed-ghost-proposal"},{"key":"e_1_3_3_3_58_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops. 11\u201318","author":"Singh Priyanka","year":"2019","unstructured":"Priyanka Singh and Hany Farid. 2019. Robust Homomorphic Image Hashing. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops. 11\u201318. Retrieved 2023-09-12 from https:\/\/openaccess.thecvf.com\/content_CVPRW_2019\/html\/Media_Forensics\/Singh_Robust_Homomorphic_Image_Hashing_CVPRW_2019_paper.html"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533073"},{"key":"e_1_3_3_3_60_1","unstructured":"Kurt Thomas Sarah Meiklejohn Michael\u00a0A. Specter Xiang Wang Xavier Llor\u00e0 Stephan Somogyi and David Kleidermacher. 2023. Robust Privacy-Preserving Transparent and Auditable on-Device Blocklisting. arxiv:2304.02810\u00a0[cs] Retrieved 2023-09-12 from http:\/\/arxiv.org\/abs\/2304.02810"},{"key":"e_1_3_3_3_61_1","unstructured":"Zack Whittaker. 2021. Apple Delays Plans to Roll out CSAM Detection in iOS 15 after Privacy Backlash. Retrieved 2023-09-12 from https:\/\/techcrunch.com\/2021\/09\/03\/apple-csam-detection-delayed\/"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7342"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:24Z","timestamp":1750290264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":62,"alternative-id":["10.1145\/3613904.3642310","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642310","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}