{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:36:33Z","timestamp":1777674993678,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637636","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"785-798","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["What is in the Chrome Web Store?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7298-6783","authenticated-orcid":false,"given":"Sheryl","family":"Hsu","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5226-1856","authenticated-orcid":false,"given":"Manda","family":"Tran","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6611-4447","authenticated-orcid":false,"given":"Aurore","family":"Fass","sequence":"additional","affiliation":[{"name":"Stanford University, CISPA Helmholtz Center for Information Security, Stanford, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. Understanding Malvertising Through Ad-Injecting Browser Extensions. In WWW."},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security Symposium.","unstructured":"2019. Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. In USENIX Security Symposium."},{"key":"e_1_3_2_1_3_1","volume-title":"Most popular top-level domains worldwide as of","author":"Accessed","year":"2022","unstructured":"Accessed on 2023-04-18. Most popular top-level domains worldwide as of June 2022. https:\/\/www.statista.com\/statistics\/265677\/number-of-internet-top-level-domains-worldwide\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Accessed on 2023-04-21. Retire.js. https:\/\/github.com\/RetireJS\/retire.js\/blob\/master\/repository\/jsrepository.json."},{"key":"e_1_3_2_1_5_1","unstructured":"Accessed on 2023-07-18. Chrome extensions Manifest V3 migration status. https:\/\/chrome-stats.com\/manifest-v3-migration."},{"key":"e_1_3_2_1_6_1","unstructured":"Accessed on 2023-07-18. Compare and analyze Chrome extensions. https:\/\/chrome-stats.com."},{"key":"e_1_3_2_1_7_1","unstructured":"Accessed on 2023-07-29. ECMAScript parsing infrastructure for multipurpose analysis. https:\/\/esprima.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Accessed on 2023-07-29. Extensionizr.com! https:\/\/github.com\/altryne\/extensionizr."},{"key":"e_1_3_2_1_9_1","unstructured":"Accessed on 2023-07-29. get-urls. https:\/\/github.com\/sindresorhus\/get-urls."},{"key":"e_1_3_2_1_10_1","unstructured":"Accessed on 2023-07-29. Retire.js. https:\/\/github.com\/retirejs\/retire.js\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Accessed on 2023-07-29. Retire.js. https:\/\/retirejs.github.io\/retire.js\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Accessed on 2023-07-29. ssdeep 3.4. https:\/\/pypi.org\/project\/ssdeep."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Shubham Agarwal. 2022. Helping or Hindering ? How Browser Extensions Undermine Security. In ACM CCS.","DOI":"10.1145\/3548606.3560685"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Anupama Aggarwal Bimal Viswanath Liang Zhang Saravana Kumar Ayush Shah and Ponnurangam Kumaraguru. 2018. I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions. In Euro S&P.","DOI":"10.1109\/EuroSP.2018.00012"},{"key":"e_1_3_2_1_15_1","unstructured":"Ankit Kariryaa Gian-Luca Savino Carolin Stellmacher and Johannes Sch\u00f6ning. 2021. Understanding Users' Knowledge about the Privacy and Security of Browser Extensions. In SOUPS."},{"key":"e_1_3_2_1_16_1","unstructured":"Aurore54F. Accessed on 2023-07-28. DoubleX\/src\/unpack_extension.py. https:\/\/github.com\/Aurore54F\/DoubleX\/blob\/main\/src\/unpack_extension.py."},{"key":"e_1_3_2_1_17_1","volume-title":"VEX: Vetting Browser Extensions for Security Vulnerabilities. In USENIX Security Symposium.","author":"Bandhakavi Sruthi","year":"2010","unstructured":"Sruthi Bandhakavi, Samuel T Kingand P Madhusudan, and Marianne Winslett. 2010. VEX: Vetting Browser Extensions for Security Vulnerabilities. In USENIX Security Symposium."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"D. Bui B. Tang and K. G. Shin. 2023. Detection of Inconsistencies in Privacy Practices of Browser Extensions. In S&P.","DOI":"10.1109\/SP46215.2023.10179338"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Ahmet Salih Buyukkayhan Kaan Onarlioglu William Robertson and Engin Kirda. 2016. CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. In NDSS.","DOI":"10.14722\/ndss.2016.23149"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Stefano Calzavara Michele Bugliesi Silvia Crafa and Enrico Steffinlongo. 2015. Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions. In Programming Languages and Systems.","DOI":"10.1007\/978-3-662-46669-8_21"},{"key":"e_1_3_2_1_21_1","volume-title":"An Evaluation of the Google Chrome Extension Security Architecture. In USENIX Security Symposium.","author":"Carlini Nicholas","year":"2012","unstructured":"Nicholas Carlini, Adrienne Porter Felt, and David Wagner. 2012. An Evaluation of the Google Chrome Extension Security Architecture. In USENIX Security Symposium."},{"key":"e_1_3_2_1_22_1","volume-title":"Mystique: Uncovering Information Leakage from Browser Extensions. In ACM CCS.","author":"Chen Quan","year":"2018","unstructured":"Quan Chen and Alexandros Kapravelos. 2018. Mystique: Uncovering Information Leakage from Browser Extensions. In ACM CCS."},{"key":"e_1_3_2_1_23_1","unstructured":"chrome. Accessed on 2023-07-18. Chrome Web Store review process - The basics. https:\/\/developer.chrome.com\/docs\/webstore\/review-process\/#basics."},{"key":"e_1_3_2_1_24_1","unstructured":"chrome. Accessed on 2023-07-18. Declare permissions. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/declare_permissions\/."},{"key":"e_1_3_2_1_25_1","unstructured":"chrome. Accessed on 2023-07-18. Extensions platform vision. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/intro\/platform-vision\/."},{"key":"e_1_3_2_1_26_1","unstructured":"chrome. Accessed on 2023-07-18. Manifest file format. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/manifest\/."},{"key":"e_1_3_2_1_27_1","unstructured":"chrome. Accessed on 2023-07-18. Manifest V2 support timeline. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/mv2-sunset."},{"key":"e_1_3_2_1_28_1","unstructured":"chrome. Accessed on 2023-07-18. Program Policies. https:\/\/developer.chrome.com\/docs\/webstore\/program-policies\/."},{"key":"e_1_3_2_1_29_1","unstructured":"chrome. Accessed on 2023-07-29. Content scripts. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/content_scripts."},{"key":"e_1_3_2_1_30_1","unstructured":"chrome. Accessed on 2023-07-29. Executing arbitrary strings. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/mv3-migration\/#executing-arbitrary-strings."},{"key":"e_1_3_2_1_31_1","unstructured":"chrome. Accessed on 2023-07-29. Give users options. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/options."},{"key":"e_1_3_2_1_32_1","unstructured":"chrome. Accessed on 2023-07-29. How long will it take to review my item? https:\/\/developer.chrome.com\/docs\/webstore\/faq\/#faq-listing-108."},{"key":"e_1_3_2_1_33_1","unstructured":"chrome. Accessed on 2023-07-29. Manifest Version. https:\/\/developer.chrome.com\/docs\/apps\/manifest\/manifest_version."},{"key":"e_1_3_2_1_34_1","unstructured":"chrome. Accessed on 2023-07-29. Migrating from background pages to service workers. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/migrating_to_service_workers."},{"key":"e_1_3_2_1_35_1","unstructured":"chrome. Accessed on 2023-07-29. My extension has been removed from the Chrome Web Store. What should I do? https:\/\/developer.chrome.com\/docs\/webstore\/faq\/#faq-listing-10."},{"key":"e_1_3_2_1_36_1","unstructured":"chrome. Accessed on 2023-07-29. Welcome to Manifest V3. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/intro\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Chrome Developers. Accessed on 2023-04-28. Chrome Web Store API Reference. https:\/\/developer.chrome.com\/docs\/webstore\/api_index\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Aurore Fass Michael Backes and Ben Stock. 2019. HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. In ACM CCS.","DOI":"10.1145\/3319535.3345656"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Aurore Fass Michael Backes and Ben Stock. 2019. JStap: A Static Pre-Filter for Malicious JavaScript Detection. In ACSAC.","DOI":"10.1145\/3359789.3359813"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Aurore Fass Robert P. Krawczyk Michael Backes and Ben Stock. 2018. JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. In DIMVA.","DOI":"10.1007\/978-3-319-93411-2_14"},{"key":"e_1_3_2_1_41_1","volume-title":"Michael Backes, and Ben Stock.","author":"Fass Aurore","year":"2021","unstructured":"Aurore Fass, Doli\u00e8re Francis Som\u00e9, Michael Backes, and Ben Stock. 2021. DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. In ACM CCS."},{"key":"e_1_3_2_1_42_1","unstructured":"HyungSeok Han DongHyeon Oh and Sang Kil Cha. 2019. CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines. In NDSS."},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on Software Engineering (ICSE).","author":"Hata Hideaki","year":"2019","unstructured":"Hideaki Hata, Christoph Treude, Raula Gaikovina Kula, and Takashi Ishio. 2019. 9.6 million links in source code comments: Purpose, evolution, and decay. In International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Security Symposium.","author":"Jagpal Nav","year":"2015","unstructured":"Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, and Kurt Thomas. 2015. Trends and Lessons from Three Years Fighting Malicious Extensions. In USENIX Security Symposium."},{"key":"e_1_3_2_1_45_1","volume-title":"Hulk: Eliciting Malicious Behavior in Browser Extensions. In USENIX Security Symposium.","author":"Kapravelos Alexandros","year":"2014","unstructured":"Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, and Vern Paxson. 2014. Hulk: Eliciting Malicious Behavior in Browser Extensions. In USENIX Security Symposium."},{"key":"e_1_3_2_1_46_1","volume-title":"Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In NDSS.","author":"Karami Soroush","year":"2020","unstructured":"Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, and Jason Polakis. 2020. Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In NDSS."},{"key":"e_1_3_2_1_47_1","volume-title":"Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. In USENIX Security Symposium.","author":"Karami Soroush","year":"2022","unstructured":"Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doup\u00e9, and Jason Polakis. 2022. Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. In USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","unstructured":"Debbie Kim. Accessed on 2023-07-29. Find great extensions with new Chrome Web Store badges."},{"key":"e_1_3_2_1_49_1","volume-title":"Mininode: Reducing the Attack Surface of Node.js Applications. In RAID.","author":"Koishybayev Igibek","year":"2020","unstructured":"Igibek Koishybayev and Alexandros Kapravelos. 2020. Mininode: Reducing the Attack Surface of Node.js Applications. In RAID."},{"key":"e_1_3_2_1_50_1","volume-title":"USENIX Security Symposium.","author":"Laperdrix Pierre","year":"2021","unstructured":"Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, and Nick Nikiforakis. 2021. Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets. In USENIX Security Symposium."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Tobias Lauinger Abdelberi Chaabane Sajjad Arshad William Robertson Christo Wilson and Engin Kirda. 2017. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. In NDSS.","DOI":"10.14722\/ndss.2017.23414"},{"key":"e_1_3_2_1_52_1","volume-title":"Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. In USENIX Security Symposium.","author":"Lee Suyoung","year":"2020","unstructured":"Suyoung Lee, HyungSeok Han, Sang Kil Cha, and Sooel Son. 2020. Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. In USENIX Security Symposium."},{"key":"e_1_3_2_1_53_1","unstructured":"Giedrius Majauskas. Accessed on 2023-07-29. Newtab Viruses - How to remove. https:\/\/www.2-viruses.com\/remove-newtab-virus."},{"key":"e_1_3_2_1_54_1","unstructured":"McAfee. Accessed on 2023-07-29. Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users. https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Marvin Moog Markus Demmel Michael Backes and Aurore Fass. 2021. Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild. In Dependable Systems and Networks (DSN).","DOI":"10.1109\/DSN48987.2021.00065"},{"key":"e_1_3_2_1_56_1","unstructured":"Mozilla Developer Network. Accessed on 2023-07-29. Browser Extensions. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Add-ons\/WebExtensions."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Nikolaos Pantelaios Nick Nikiforakis and Alexandros Kapravelos. 2020. You've Changed: Detecting Malicious Browser Extensions through Their Update Deltas. In ACM CCS.","DOI":"10.1145\/3372297.3423343"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Hammond Pearce Baleegh Ahmad Benjamin Tan Brendan Dolan-Gavitt and Ramesh Karri. 2022. Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. In S&P.","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"e_1_3_2_1_59_1","volume-title":"Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies. In USENIX Security Symposium.","author":"S\u00e1nchez-Rola Iskander","year":"2017","unstructured":"Iskander S\u00e1nchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies. In USENIX Security Symposium."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Alexander Sj\u00f6sten Steven Acker and Andrei Sabelfeld. 2017. Discovering Browser Extensions via Web Accessible Resources. In CODASPY.","DOI":"10.1145\/3029806.3029820"},{"key":"e_1_3_2_1_61_1","volume-title":"Pablo Picazo-Sanchez, and Andrei Sabelfeld.","author":"Sjosten Alexander","year":"2019","unstructured":"Alexander Sjosten, Steven Van Acker, Pablo Picazo-Sanchez, and Andrei Sabelfeld. 2019. Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks. In NDSS."},{"key":"e_1_3_2_1_62_1","volume-title":"USENIX Security Symposium.","author":"Solomos Konstantinos","year":"2022","unstructured":"Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, and Jason Polakis. 2022. The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. In USENIX Security Symposium."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Konstantinos Solomos Panagiotis Ilia Nick Nikiforakis and Jason Polakis. 2022. Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. In ACM CCS.","DOI":"10.1145\/3548606.3560576"},{"key":"e_1_3_2_1_64_1","unstructured":"Doli\u00e8re Francis Som\u00e9. 2019. EmPoWeb: Empowering Web Applications with Browser Extensions. In S&P."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Pratik Soni Enrico Budianto and Prateek Saxena. 2015. The Sicilian Defense: Signature-Based Whitelisting of Web JavaScript. In CCS.","DOI":"10.1145\/2810103.2813710"},{"key":"e_1_3_2_1_66_1","volume-title":"SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS. In NDSS.","author":"Staicu Cristian-Alexandru","year":"2018","unstructured":"Cristian-Alexandru Staicu, Michael Pradel, and Benjamin Livshits. 2018. SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS. In NDSS."},{"key":"e_1_3_2_1_67_1","volume-title":"Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat. In WWW.","author":"Starov Oleksii","year":"2019","unstructured":"Oleksii Starov, Pierre Laperdrix, Alexandros Kapravelos, and Nick Nikiforakis. 2019. Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat. In WWW."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Oleksii Starov and Nick Nikiforakis. 2017. Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions. In WWW.","DOI":"10.1145\/3038912.3052596"},{"key":"e_1_3_2_1_69_1","volume-title":"XHOUND: Quantifying the Fingerprintability of Browser Extensions. In S&P.","author":"Starov Oleksii","year":"2017","unstructured":"Oleksii Starov and Nick Nikiforakis. 2017. XHOUND: Quantifying the Fingerprintability of Browser Extensions. In S&P."},{"key":"e_1_3_2_1_70_1","unstructured":"statcounter. Accessed on 2023-04-28. Desktop Browser Market Share Worldwide. https:\/\/gs.statcounter.com\/browser-market-share\/desktop\/worldwide."},{"key":"e_1_3_2_1_71_1","volume-title":"An Empirical Study of Dangerous Behaviors in Firefox Extensions. In International Conference on Information Security (ISC).","author":"Wang Jiangang","year":"2012","unstructured":"Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, and Zhiyong Feng. 2012. An Empirical Study of Dangerous Behaviors in Firefox Extensions. In International Conference on Information Security (ISC)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Michael Weissbacher Enrico Mariconti Guillermo Suarez-Tangil Gianluca Stringhini William Robertson and Engin Kirda. 2017. Ex-Ray: Detection of History-Leaking Browser Extensions. In ACSAC.","DOI":"10.1145\/3134600.3134632"},{"key":"e_1_3_2_1_73_1","unstructured":"Alex Wolkov. Accessed on 2023-07-29. Extensionizr. https:\/\/extensionizr.com\/."},{"key":"e_1_3_2_1_74_1","unstructured":"Jianjia Yu Song Li Junmin Zhu and Yinzhi Cao. 2023. CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided Concurrent Abstract Interpretation. In ACM CCS."},{"key":"e_1_3_2_1_75_1","volume-title":"USENIX Security Symposium.","author":"Zimmermann Markus","year":"2019","unstructured":"Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, and Michael Pradel. 2019. Small World with High Risks: A Study of Security Threats in the npm Ecosystem. In USENIX Security Symposium."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:05Z","timestamp":1750290245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":75,"alternative-id":["10.1145\/3634737.3637636","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637636","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}