{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T09:19:16Z","timestamp":1768123156706,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Smart Networks and Services Joint Undertaking (SNS JU) under the European Union?s Horizon Europe research and innovation programme","award":["101096110"],"award-info":[{"award-number":["101096110"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["2020.04714.BD"],"award-info":[{"award-number":["2020.04714.BD"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["LA\/P\/0063\/2020"],"award-info":[{"award-number":["LA\/P\/0063\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UID\/CEC\/00326\/2020"],"award-info":[{"award-number":["UID\/CEC\/00326\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707966","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"1335-1344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On the Difficulty of NOT being Unique: Fingerprinting Users from Wi-Fi Data in Mobile Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8920-8128","authenticated-orcid":false,"given":"Mariana","family":"Cunha","sequence":"first","affiliation":[{"name":"CRACS\/INESC TEC, CISUC, and Department of Computer Science, Faculty of Sciences, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2077-7223","authenticated-orcid":false,"given":"Ricardo","family":"Mendes","sequence":"additional","affiliation":[{"name":"CISUC and Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2559-5616","authenticated-orcid":false,"given":"Yves-Alexandre","family":"de Montjoye","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5805-1351","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"CRACS\/INESC TEC, CISUC, and Department of Computer Science, Faculty of Sciences, University of Porto, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808146"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627399"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Pervasive Computing Technologies for Healthcare. Springer, 218\u2013239","author":"Ahmed Md Sabbir","year":"2021","unstructured":"Md Sabbir Ahmed and Nova Ahmed. 2021. Exploring unique app signature of the depressed and non-depressed through their fingerprints on apps. In International Conference on Pervasive Computing Technologies for Healthcare. Springer, 218\u2013239."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006125502780284"},{"key":"e_1_3_2_1_5_1","unstructured":"Android. 2024. Android 10. https:\/\/developer.android.com\/guide\/topics\/connectivity\/wifi-scan. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.030"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432699"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470474"},{"key":"e_1_3_2_1_9_1","unstructured":"Federal Trade Commission. 2016. Mobile Advertising Network InMobi Settles FTC Charges It Tracked Hundreds of Millions of Consumers' Locations Without Permission. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2016\/06\/mobile-advertising-network-inmobi-settles-ftc-charges-it-tracked-hundreds-millions-consumers. Accessed: 2024-07-17."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263700"},{"key":"e_1_3_2_1_11_1","volume-title":"A survey of privacy-preserving mechanisms for heterogeneous data types. Computer science review 41","author":"Cunha Mariana","year":"2021","unstructured":"Mariana Cunha, Ricardo Mendes, and Jo\u00e3o P Vilela. 2021. A survey of privacy-preserving mechanisms for heterogeneous data types. Computer science review 41 (2021), 100403."},{"key":"e_1_3_2_1_12_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3, 1","author":"De Montjoye Yves-Alexandre","year":"2013","unstructured":"Yves-Alexandre De Montjoye, C\u00e9sar A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3, 1 (2013), 1\u20135."},{"key":"e_1_3_2_1_13_1","unstructured":"Android Developers. 2023. Get the last known location. https:\/\/developer.android.com\/training\/location\/retrieve-current. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_14_1","unstructured":"Android Developers. 2024. Best practices for unique identifiers. https:\/\/developer.android.com\/identity\/user-data-ids. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_15_1","unstructured":"Android Developers. 2024. Package visibility filtering on Android. https:\/\/developer.android.com\/training\/package-visibility. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_16_1","unstructured":"Edvardas Mikalauskas. 2022. Android apps are asking for too many dangerous permissions. Here's how we know. https:\/\/cybernews.com\/privacy\/android-apps-are-asking-for-too-many-dangerous-permissions-heres-how-we-know\/. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_1_18_1","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_19_1","unstructured":"Lorenzo Franceschi-Bicchierai. 2015. Redditor cracks anonymous data trove to pinpoint Muslim cab drivers. https:\/\/mashable.com\/archive\/redditor-muslim-cab-drivers. Accessed: 2024-11-11."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15)","author":"Freudiger Julien","year":"2015","unstructured":"Julien Freudiger. 2015. How talkative is your mobile device? an experimental study of Wi-Fi probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15). ACM, Article 8, 6 pages."},{"key":"e_1_3_2_1_21_1","volume-title":"Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild","author":"Gamba Julien","year":"2023","unstructured":"Julien Gamba, \u00c1lvaro Feal, Eduardo Blazquez, Vinuri Bandara, Abbas Razaghpanah, Juan Tapiador, and Narseo Vallina-Rodriguez. 2023. Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild. IEEE Transactions on Dependable and Secure Computing (2023), 1\u201318."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_23_1","unstructured":"haxrob. 2023. Discovering that your car battery monitor is siphoning up your location data. https:\/\/haxrob.net\/discovering-that-your-bluetooth-car-battery-monitor-is-siphoning-up-your-location-data\/. Accessed: 2024-11-11."},{"key":"e_1_3_2_1_24_1","unstructured":"Misha Rykov Jen Caltrider and Zo\u00eb MacDonald. 2023. Discovering that your car battery monitor is siphoning up your location data. https:\/\/foundation.mozilla.org\/en\/privacynotincluded\/articles\/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy\/. Accessed: 2024-11-11."},{"key":"e_1_3_2_1_25_1","unstructured":"Kathryn Zickuhr. 2013. Main Report. https:\/\/www.pewresearch.org\/internet\/2013\/09\/12\/location-based-services-2\/. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3163176"},{"key":"e_1_3_2_1_27_1","volume-title":"12th Symposium on Usable Privacy and Security (SOUPS). 27\u201341","author":"Liu Bin","year":"2016","unstructured":"Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In 12th Symposium on Usable Privacy and Security (SOUPS). 27\u201341."},{"key":"e_1_3_2_1_28_1","volume-title":"Usenix Security Symposium.","author":"Lyons Allan","year":"2023","unstructured":"Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez, et al. 2023. Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem. In Usenix Security Symposium."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom53586.2022.9762379"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_8"},{"key":"e_1_3_2_1_31_1","volume-title":"30th annual Network and Distributed System Security Symposium.","author":"Meng Mark Huasong","unstructured":"Mark Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai, Zhi Liu, Sin G Teo, and Jin Song Dong. 2023. Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers. In 30th annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2013.6927176"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057164"},{"key":"e_1_3_2_1_36_1","unstructured":"The Associated Press. 2021. Priest outed via Grindr app highlights rampant data tracking. https:\/\/www.nbcnews.com\/tech\/security\/priest-outed-grindr-app-highlights-rampant-data-tracking-rcna1493. Accessed: 2024-07-05."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Abbas Razaghpanah Rishab Nithyanand Narseo Vallina-Rodriguez Srikanth Sundaresan Mark Allman Christian Kreibich Phillipa Gill et al. 2018. Apps trackers privacy and regulators: A global study of the mobile tracking ecosystem. In The 25th annual Network and Distributed System Security Symposium (NDSS).","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_1_38_1","volume-title":"Narseo Vallina-Rodriguez, and Serge Egelman.","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system. In 28th USENIX security symposium (USENIX security 19). USENIX Association, Santa Clara, CA, 603\u2013620."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2019.8904968"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_1_42_1","volume-title":"Temporal and cultural limits of privacy in smartphone app usage. Scientific reports 11, 1","author":"Sekara Vedran","year":"2021","unstructured":"Vedran Sekara, Laura Alessandretti, Enys Mones, and H\u00e5kan Jonsson. 2021. Temporal and cultural limits of privacy in smartphone app usage. Scientific reports 11, 1 (2021), 1\u20139."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00822-2"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467824"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2018.07.006"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264948"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00655-x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897883"},{"key":"e_1_3_2_1_49_1","volume-title":"Internet and Distributed Computing Systems","author":"Verga Gabriella","unstructured":"Gabriella Verga, Salvatore Calcagno, Andrea Fornaia, and Emiliano Tramontana. 2019. Smart Cities and Open WiFis: When Android OS Permissions Cease to Protect Privacy. In Internet and Distributed Computing Systems. Springer International Publishing, Cham, 457\u2013467."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-021-00299-2"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:37Z","timestamp":1750298257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":51,"alternative-id":["10.1145\/3672608.3707966","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707966","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}