{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:19:45Z","timestamp":1777130385574,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Northeastern University Future Faculty Fellowship"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1956393, CNS-1955227, CNS-2103439, CNS-2103038, CNS-2138139, CNS-2114230, CNS-1909020, CNS-2127309"],"award-info":[{"award-number":["CNS-1956393, CNS-1955227, CNS-2103439, CNS-2103038, CNS-2138139, CNS-2114230, CNS-1909020, CNS-2127309"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Consumer Reports Innovation Lab"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624803","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"569-583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1416-4113","authenticated-orcid":false,"given":"Umar","family":"Iqbal","sequence":"first","affiliation":[{"name":"Washington University in St. Louis, St. Louis, MO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1514-2920","authenticated-orcid":false,"given":"Pouneh Nikkhah","family":"Bahrami","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9900-7506","authenticated-orcid":false,"given":"Rahmadi","family":"Trimananda","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7574-2004","authenticated-orcid":false,"given":"Hao","family":"Cui","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4462-4520","authenticated-orcid":false,"given":"Alexander","family":"Gamero-Garrido","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8115-898X","authenticated-orcid":false,"given":"Daniel J.","family":"Dubois","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7825-7226","authenticated-orcid":false,"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1803-8675","authenticated-orcid":false,"given":"Athina","family":"Markopoulou","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8735-4810","authenticated-orcid":false,"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4500-9354","authenticated-orcid":false,"given":"Zubair","family":"Shafiq","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Aaron M Spelling. 2022. Dating and Relationship Tips and advices. https:\/\/www.amazon.com\/dp\/B07YCKFCCF."},{"key":"e_1_3_2_2_2_1","unstructured":"Amazon.com Inc. 2022a. Alexa and Alexa Device FAQs. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=201602230."},{"key":"e_1_3_2_2_3_1","unstructured":"Amazon.com Inc. 2022b. Alexa and Alexa Device FAQs (archived September 2022). https:\/\/web.archive.org\/web\/20220901073936\/http:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=201602230."},{"key":"e_1_3_2_2_4_1","volume-title":"Alexa Blogs: Advertising and Alexa. https:\/\/developer.amazon.com\/blogs\/alexa\/post\/54c3a0f8-5b29-4071-acd7-2b832b860c83\/advertising-and-alexa.","year":"2022","unstructured":"Amazon.com, Inc. 2022c. Alexa Blogs: Advertising and Alexa. https:\/\/developer.amazon.com\/blogs\/alexa\/post\/54c3a0f8-5b29-4071-acd7-2b832b860c83\/advertising-and-alexa."},{"key":"e_1_3_2_2_5_1","unstructured":"Amazon.com Inc. 2022d. Alexa-hosted Skills. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/hosted-skills\/build-a-skill-end-to-end-using-an-alexa-hosted-skill.html."},{"key":"e_1_3_2_2_6_1","unstructured":"Amazon.com Inc. 2022 e. Alexa Privacy Hub. https:\/\/www.amazon.com\/Alexa-Privacy-Hub\/b?ie=UTF8&node=19149155011."},{"key":"e_1_3_2_2_7_1","unstructured":"Amazon.com Inc. 2022 f. Alexa Privacy Hub (archived October 2022). https:\/\/web.archive.org\/web\/20221010091208\/http:\/\/www.amazon.com\/b\/?node=19149155011."},{"key":"e_1_3_2_2_8_1","unstructured":"Amazon.com Inc. 2022 g. Alexa Skill Certification Requirements. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/certification-requirements-for-custom-skills.html."},{"key":"e_1_3_2_2_9_1","unstructured":"Amazon.com Inc. 2022 h. Alexa Skills Policy Testing. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/policy-testing-for-an-alexa-skill.html."},{"key":"e_1_3_2_2_10_1","unstructured":"Amazon.com Inc. 2022 i. Alexa Skills Privacy Requirements. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/security-testing-for-an-alexa-skill.html#25-privacy-requirements."},{"key":"e_1_3_2_2_11_1","volume-title":"Amazon: Request Your Data. https:\/\/www.amazon.com\/gp\/privacycentral\/dsar\/preview.html.","year":"2022","unstructured":"Amazon.com, Inc. 2022 j. Amazon: Request Your Data. https:\/\/www.amazon.com\/gp\/privacycentral\/dsar\/preview.html."},{"key":"e_1_3_2_2_12_1","unstructured":"Amazon.com Inc. 2022 k. Amazon.com Privacy Notice. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GX7NJQ4ZB8MHFRNJ."},{"key":"e_1_3_2_2_13_1","unstructured":"Amazon.com Inc. 2022 l. Audio Ads - Create audio advertising campaigns. https:\/\/advertising.amazon.com\/en-ca\/solutions\/products\/audio-ads."},{"key":"e_1_3_2_2_14_1","unstructured":"Amazon.com Inc. 2022 m. AVS Testing and Certification Process. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/alexa-voice-service\/product-testing-overview.html."},{"key":"e_1_3_2_2_15_1","unstructured":"Amazon.com Inc. 2022 n. Configure Permissions for Customer Information in Your Skill. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/configure-permissions-for-customer-information-in-your-skill.html."},{"key":"e_1_3_2_2_16_1","unstructured":"Amazon.com Inc. 2022 o. Managing advertising preferences on Alexa. https:\/\/www.amazon.com\/b\/?node=98592480011."},{"key":"e_1_3_2_2_17_1","unstructured":"Amazon.com Inc. 2022 p. Module 2: Design an Engaging Voice User Interface. https:\/\/developer.amazon.com\/en-US\/alexa\/alexa-skills-kit\/get-deeper\/tutorials-code-samples\/build-an-engaging-alexa-skill\/module-2."},{"key":"e_1_3_2_2_18_1","unstructured":"Amazon.com Inc. 2022 q. Policy Testing. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/policy-testing-for-an-alexa-skill.html#advertising."},{"key":"e_1_3_2_2_19_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, 985--1002. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/andow"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108782"},{"key":"e_1_3_2_2_21_1","volume-title":"Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Bashir Muhammad Ahmad","year":"2016","unstructured":"Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, and Christo Wilson. 2016. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, 481--496."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_2_23_1","volume-title":"Study: How Amazon uses Echo smart speaker conversations to target ads. https:\/\/theregister.com\/2022\/04\/27\/amazon_audio_data\/.","author":"Claburn Thomas","year":"2022","unstructured":"Thomas Claburn. 2022. Study: How Amazon uses Echo smart speaker conversations to target ads. https:\/\/theregister.com\/2022\/04\/27\/amazon_audio_data\/."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0005"},{"key":"e_1_3_2_2_25_1","unstructured":"Crunchbase Inc. 2022. Crunchbase. https:\/\/www.crunchbase.com\/."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0072"},{"key":"e_1_3_2_2_27_1","unstructured":"DuckDuckGo. 2022. Tracker Radar (list of entities). https:\/\/github.com\/duckduckgo\/tracker-radar\/tree\/main\/entities."},{"key":"e_1_3_2_2_28_1","unstructured":"Pierre N. Durette. 2022. gTTS (Google Text-to-Speech) a Python library and CLI tool to interface with Google Translate text-to-speech API. https:\/\/pypi.org\/project\/gTTS\/."},{"key":"e_1_3_2_2_29_1","unstructured":"Dyson Limited. 2022. Dyson. https:\/\/www.amazon.com\/dp\/B06WVN7SHC."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3129116"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_32_1","unstructured":"Geoffrey A. Fowler. 2019. Alexa has been eavesdropping on you this whole time. https:\/\/www.washingtonpost.com\/technology\/2019\/05\/06\/alexa-has-been-eavesdropping-you-this-whole-time\/."},{"key":"e_1_3_2_2_33_1","unstructured":"Garmin International. 2022. Garmin. https:\/\/www.amazon.com\/dp\/B075TRB4V5."},{"key":"e_1_3_2_2_34_1","unstructured":"Gary Horcher. 2018. Woman says her Amazon device recorded private conversation sent it out to random contact. https:\/\/www.kiro7.com\/news\/local\/woman-says-her-amazon-device-recorded-private-conversation-sent-it-out-to-random-contact\/755507974\/."},{"key":"e_1_3_2_2_35_1","unstructured":"Genesis Motors USA. 2022. Genesis. https:\/\/www.amazon.com\/dp\/B01JXP09PI."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624830"},{"key":"e_1_3_2_2_37_1","unstructured":"Google Inc. 2022a. Header Bidding. https:\/\/admanager.google.com\/home\/resources\/feature-brief-open-bidding\/."},{"key":"e_1_3_2_2_38_1","unstructured":"Google Inc. 2022b. Real-time Bidding. https:\/\/developers.google.com\/authorized-buyers\/rtb\/start."},{"key":"e_1_3_2_2_39_1","unstructured":"Google Inc. 2022c. RTB - Cookie Matching. https:\/\/developers.google.com\/authorized-buyers\/rtb\/cookie-guide."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624829"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_3_2_2_42_1","unstructured":"ICM. 2022. Air Quality Report. https:\/\/www.amazon.com\/dp\/B01EOFCHMA."},{"key":"e_1_3_2_2_43_1","unstructured":"In Touch Ministries. 2022. Charles Stanley Radio. https:\/\/www.amazon.com\/dp\/B07FF2QGXW."},{"key":"e_1_3_2_2_44_1","volume-title":"FTC PrivacyCon","author":"Iqbal Umar","year":"2022","unstructured":"Umar Iqbal. 2022. Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem, FTC PrivacyCon 2022. https:\/\/www.ftc.gov\/news-events\/events\/2022\/11\/privacycon-2022."},{"key":"e_1_3_2_2_45_1","volume-title":"Khaleesi: Breaker of Advertising and Tracking Request Chains. In 31st USENIX Security Symposium. USENIX Association","author":"Iqbal Umar","year":"2022","unstructured":"Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, and Zubair Shafiq. 2022. Khaleesi: Breaker of Advertising and Tracking Request Chains. In 31st USENIX Security Symposium. USENIX Association, Boston, 2911--2928."},{"key":"e_1_3_2_2_46_1","unstructured":"iRobot. 2022. iRobot Home. https:\/\/www.amazon.com\/dp\/B06Y3PSHQ3."},{"key":"e_1_3_2_2_47_1","unstructured":"Huafeng Jin and Shuo Wang. 2018. Voice-based determination of physical and emotional characteristics of users. US Patent 10096319B1."},{"key":"e_1_3_2_2_48_1","unstructured":"Kevel. 2022. Header Bidding (HBIX) 2021 Tracker. https:\/\/www.kevel.co\/hbix\/."},{"key":"e_1_3_2_2_49_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium. Internet Society","author":"Pochat Victor Le","year":"2019","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium. Internet Society, San Diego."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23111"},{"key":"e_1_3_2_2_51_1","unstructured":"Logitech. 2022. Harmony. https:\/\/www.amazon.com\/dp\/B01M4LDPX3."},{"key":"e_1_3_2_2_52_1","unstructured":"Sapna Maheshwari. 2018. Hey Alexa What Can You Hear? And What Will You Do With It? https:\/\/www.nytimes.com\/2018\/03\/31\/business\/media\/amazon-google-privacy-digital-assistants.html."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0075"},{"key":"e_1_3_2_2_54_1","volume-title":"Characterizing Smart Home IoT Traffic in the Wild. In 2020 IEEE\/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE","author":"Hammad Mazhar M.","year":"2020","unstructured":"M. Hammad Mazhar and Zubair Shafiq. 2020. Characterizing Smart Home IoT Traffic in the Wild. In 2020 IEEE\/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, Sydney, 203--215."},{"key":"e_1_3_2_2_55_1","unstructured":"Men's Finest. 2022. Men's Finest Daily Fashion Tip. https:\/\/www.amazon.com\/dp\/B07CB3ZN6N."},{"key":"e_1_3_2_2_56_1","unstructured":"Hooman Mohajeri Moghaddam. 2022. Tracking and Behavioral Targeting on Connected TV Platforms. (2022). https:\/\/dataspace.princeton.edu\/handle\/88435\/dsp010p096b14c Doctoral Disseration."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354198"},{"key":"e_1_3_2_2_58_1","unstructured":"Tom Nardi. 2019. Uncovering the Echo Dot's Hidden USB Port. https:\/\/hackaday.com\/2019\/08\/15\/uncovering-the-echo-dots-hidden-usb-port\/."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23270"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131397"},{"key":"e_1_3_2_2_61_1","unstructured":"Picovoice Inc. 2022. Porcupine Wake Word Detection & Keyword Spotting. https:\/\/picovoice.ai\/platform\/porcupine\/."},{"key":"e_1_3_2_2_62_1","unstructured":"Prebid.org Inc. 2022. Prebid. https:\/\/prebid.org\/."},{"key":"e_1_3_2_2_63_1","unstructured":"Raspberry Pi. 2021. Setting up a Bridged Wireless Access Point. https:\/\/github.com\/raspberrypi\/documentation\/blob\/develop\/documentation\/asciidoc\/computers\/configuration\/access-point-bridged.adoc."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_2_65_1","unstructured":"Rhasspy. 2022. Rhasspy Voice Assistant. https:\/\/rhasspy.readthedocs.io\/."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423650"},{"key":"e_1_3_2_2_67_1","unstructured":"Hamza Shaban. 2018. Amazon Alexa user receives 1 700 audio recordings of a stranger through `human error'. https:\/\/www.washingtonpost.com\/technology\/2018\/12\/20\/amazon-alexa-user-receives-audio-recordings-stranger-through-human-error\/."},{"key":"e_1_3_2_2_68_1","volume-title":"Profiling humans from their voice","author":"Singh Rita","unstructured":"Rita Singh. 2019. Profiling humans from their voice. Springer."},{"key":"e_1_3_2_2_69_1","unstructured":"Software Freedom Conservancy. 2022. Selenium. https:\/\/www.selenium.dev\/."},{"key":"e_1_3_2_2_70_1","unstructured":"Sonos Inc. 2022. Sonos. https:\/\/www.amazon.com\/dp\/B072ML3N6K."},{"key":"e_1_3_2_2_71_1","volume-title":"Number of households with smart home products and services in use worldwide from 2015 to","year":"2025","unstructured":"Statista. 2022. Number of households with smart home products and services in use worldwide from 2015 to 2025. https:\/\/www.statista.com\/statistics\/1252975\/smart-home-households-worldwide\/."},{"key":"e_1_3_2_2_72_1","volume-title":"Smart speaker devices installed base in the United States from 2017 to","year":"2020","unstructured":"Statista. 2022. Smart speaker devices installed base in the United States from 2017 to 2020. https:\/\/www.statista.com\/statistics\/794480\/us-amazon-echo-google-home-installed-base\/."},{"key":"e_1_3_2_2_73_1","volume-title":"OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, 3789--3806."},{"key":"e_1_3_2_2_74_1","unstructured":"ttm. 2022. Essential Oil Benefits. https:\/\/www.amazon.com\/dp\/B074CNX3G9."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0021"},{"key":"e_1_3_2_2_76_1","unstructured":"VCA INC. 2022. VCA Animal Hospital. https:\/\/amazon.com\/dp\/B07KYS1Y1X."},{"key":"e_1_3_2_2_77_1","unstructured":"WaLLy3K. 2022. Pi-hole Blocklist. https:\/\/firebog.net\/."},{"key":"e_1_3_2_2_78_1","unstructured":"Max Willens. 2021. Amid post-cookie confusion Amazon plans to launch an identifier of its own. https:\/\/digiday.com\/marketing\/amid-post-cookie-confusion-amazon-explores-launching-an-identifier-of-its-own\/amp\/."},{"key":"e_1_3_2_2_79_1","unstructured":"Xeline Development. 2022. Makeup of the Day. https:\/\/amazon.com\/dp\/B072N6BNB1."},{"key":"e_1_3_2_2_80_1","volume-title":"SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Young Jeffrey","year":"2022","unstructured":"Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, and Huixing Deng. 2022. SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, 1113--1130."},{"key":"e_1_3_2_2_81_1","unstructured":"YouVersion. 2022. YouVersion Bible. https:\/\/www.amazon.com\/dp\/B017RXFNKY."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445459"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23062"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624803","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:16:18Z","timestamp":1755868578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624803"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":83,"alternative-id":["10.1145\/3618257.3624803","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624803","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}