{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:39Z","timestamp":1755225219959,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","funder":[{"name":"European Research Council","award":["949127"],"award-info":[{"award-number":["949127"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3733883","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"739-758","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["App-solutely Modded: Surveying Modded App Market Operators and Original App Developers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8684-8763","authenticated-orcid":false,"given":"Luis A.","family":"Saavedra","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4254-8299","authenticated-orcid":false,"given":"Hridoy S.","family":"Dutta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0818-6535","authenticated-orcid":false,"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3037-2684","authenticated-orcid":false,"given":"Alice","family":"Hutchings","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_3_2_3_2","volume-title":"Qualitative research methods for the social sciences","author":"Berg Bruce\u00a0L","year":"2006","unstructured":"Bruce\u00a0L Berg. 2006. Qualitative research methods for the social sciences. Allyn & Bacon."},{"key":"e_1_3_3_2_4_2","unstructured":"Zoe Carpou. 2015. Robots Pirates and the Rise of the Automated Takedown Regime: Using the DMCA to Fight Piracy and Protect End-Users. Colum. JL & Arts 39 (2015) 551."},{"key":"e_1_3_3_2_5_2","unstructured":"Apple Developer. 2024. Encrypting Your App\u2019s Files. https:\/\/developer.apple.com\/documentation\/uikit\/protecting_the_user_s_privacy\/encrypting_your_app_s_files"},{"key":"e_1_3_3_2_6_2","unstructured":"Apple Developer. 2024. Keychain services. https:\/\/developer.apple.com\/documentation\/security\/keychain-services"},{"key":"e_1_3_3_2_7_2","unstructured":"Apple Developer. 2024. Requesting interoperability with iOS and iPadOS in the European Union. https:\/\/developer.apple.com\/support\/ios-interoperability\/"},{"key":"e_1_3_3_2_8_2","unstructured":"Apple Developer. 2025. Assessing fraud risk. https:\/\/developer.apple.com\/documentation\/devicecheck\/assessing-fraud-risk"},{"key":"e_1_3_3_2_9_2","unstructured":"Apple Developer. 2025. DeviceCheck. https:\/\/developer.apple.com\/documentation\/devicecheck"},{"key":"e_1_3_3_2_10_2","unstructured":"Google for Developers. 2024. App Licensing. https:\/\/developer.android.com\/google\/play\/licensing"},{"key":"e_1_3_3_2_11_2","unstructured":"Google for Developers. 2024. Improved verdicts in Android 13 and later devices. https:\/\/developer.android.com\/google\/play\/integrity\/improvements"},{"key":"e_1_3_3_2_12_2","unstructured":"Google for Developers. 2024. PackageManager. https:\/\/developer.android.com\/reference\/android\/content\/pm\/PackageManager\/#getInstallSourceInfo(java.lang.String)"},{"key":"e_1_3_3_2_13_2","unstructured":"Google for Developers. 2024. Play Integrity API. https:\/\/developer.android.com\/google\/play\/integrity"},{"key":"e_1_3_3_2_14_2","unstructured":"Google for Developers. 2025. Shrink obfuscate and optimize your app. https:\/\/developer.android.com\/build\/shrink-code"},{"key":"e_1_3_3_2_15_2","unstructured":"Berkman Klein\u00a0Center for Internet & Society\u00a0at Harvard\u00a0University. 2017. Lumen. https:\/\/lumendatabase.org"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2022.37"},{"key":"e_1_3_3_2_17_2","unstructured":"Guardsquare. 2024. ProGuard. https:\/\/www.guardsquare.com\/proguard"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Alice Hutchings and Richard Clayton. 2016. Exploring the Provision of Online Booter Services. Deviant Behavior 37 10 (2016) 1163\u20131178. 10.1080\/01639625.2016.1169829 arXiv:10.1080\/01639625.2016.1169829","DOI":"10.1080\/01639625.2016.1169829"},{"key":"e_1_3_3_2_19_2","unstructured":"JetBrains. 2023. Mobile operating systems targeted by developers worldwide in 2022 and 2023 [Graph]. https:\/\/www.statista.com\/statistics\/1078678\/software-development-operating-system-mobile\/"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423346"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_3_2_22_2","unstructured":"Licel. 2024. DexProtector. https:\/\/licelus.com\/products\/dexprotector"},{"key":"e_1_3_3_2_23_2","volume-title":"Social research methods, qualitative and quantitative approaches","author":"Neuman W\u00a0Lawrence","year":"2005","unstructured":"W\u00a0Lawrence Neuman. 2005. Social research methods, qualitative and quantitative approaches. Pearson International Edition."},{"key":"e_1_3_3_2_24_2","unstructured":"AYSA OU. 2024. Apple fights legally. https:\/\/appdb.to\/news\/518"},{"key":"e_1_3_3_2_25_2","unstructured":"AYSA OU. 2024. An interoperability request has been submitted. https:\/\/appdb.to\/news\/530"},{"key":"e_1_3_3_2_26_2","unstructured":"AYSA OU. 2024. Recent updates and situation with DMA. https:\/\/appdb.to\/news\/533"},{"key":"e_1_3_3_2_27_2","unstructured":"Masarah-Cynthia Paquet-Clouston. 2021. The Role of Informal Workers in Online Economic Crime. Ph.\u00a0D. Dissertation. Arts & Social Sciences: School of Criminology."},{"key":"e_1_3_3_2_28_2","unstructured":"Jonathon\u00a0W Penney. 2019. Privacy and legal automation: the DMCA as a case study. Stan. Tech. L. Rev. 22 (2019) 412."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3528579.3529180"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime66200.2024.00018"},{"key":"e_1_3_3_2_31_2","unstructured":"Ahmed Sherif. 2025. Mobile Android version market share worldwide 2018-2025. https:\/\/www.statista.com\/statistics\/921152\/mobile-android-version-share-worldwide\/"},{"key":"e_1_3_3_2_32_2","volume-title":"Doing qualitative research: a practical handbook","author":"Silverman David","year":"1999","unstructured":"David Silverman. 1999. Doing qualitative research: a practical handbook. SAGE Publications."},{"key":"e_1_3_3_2_33_2","unstructured":"Apple Support. 2024. Secure Enclave. https:\/\/support.apple.com\/guide\/security\/sec59b0b31ff"},{"key":"e_1_3_3_2_34_2","unstructured":"TelemetryDeck. 2025. iOS Versions Market Share in 2025. https:\/\/telemetrydeck.com\/survey\/apple\/iOS\/majorSystemVersions\/"},{"key":"e_1_3_3_2_35_2","unstructured":"Riley Testut. 2024. Introducing AltStore PAL. https:\/\/rileytestut.com\/blog\/2024\/04\/17\/introducing-altstore-pal\/"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808118"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW61312.2024.00076"},{"key":"e_1_3_3_2_38_2","first-page":"289","volume-title":"29th USENIX security symposium (USENIX security 20)","author":"Weir Charles","year":"2020","unstructured":"Charles Weir, Ben Hermann, and Sascha Fahl. 2020. From needs to actions to secure apps? the effect of requirements and developer practices on app security. In 29th USENIX security symposium (USENIX security 20). 289\u2013305."}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3733883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:27:11Z","timestamp":1755070031000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3733883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":37,"alternative-id":["10.1145\/3708821.3733883","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3733883","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}