{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:05Z","timestamp":1766442425622,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765183","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"66-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["W\n                    <scp>hisper<\/scp>\n                    T\n                    <scp>est<\/scp>\n                    : A Voice-Control-based Library for iOS UI Automation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3862-9413","authenticated-orcid":false,"given":"Zahra","family":"Moti","sequence":"first","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7918-3205","authenticated-orcid":false,"given":"Tom","family":"Janssen-Groesbeek","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2225-8400","authenticated-orcid":false,"given":"Steven","family":"Monteiro","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0329-1830","authenticated-orcid":false,"given":"Andrea","family":"Continella","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1621-8333","authenticated-orcid":false,"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"volume-title":"EarlGrey: iOS UI Automation Test Framework. https:\/\/github.com\/google\/EarlGrey","year":"2024","key":"e_1_3_2_1_1_1","unstructured":"Google. EarlGrey: iOS UI Automation Test Framework. https:\/\/github.com\/google\/EarlGrey, 2024. [Accessed: April 1, 2025]."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/developer.apple.com\/documentation\/xcuiautomation","author":"Apple Inc. XCUIAutomation | Apple Developer Documentation.","year":"2025","unstructured":"Apple Inc. XCUIAutomation | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/xcuiautomation, 2025. [Accessed: April 13, 2025]."},{"key":"e_1_3_2_1_3_1","volume-title":"Appium XCUITest Driver Documentation. https:\/\/appium.github.io\/appium-xcuitest-driver\/latest\/","author":"Contributors Appium","year":"2024","unstructured":"Appium Contributors. Appium XCUITest Driver Documentation. https:\/\/appium.github.io\/appium-xcuitest-driver\/latest\/, 2024. [Accessed: April 2, 2025]."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Koch Simon","year":"2023","unstructured":"Simon Koch, Benjamin Altpeter, and Martin Johns. The ok is not enough: A large scale study of consent dialogs in smartphone applications. In Proceedings of USENIX Security Symposium, 2023."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2025.301871"},{"volume-title":"https:\/\/www.selenium.dev","year":"2025","key":"e_1_3_2_1_6_1","unstructured":"Selenium. https:\/\/www.selenium.dev, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Tang Zhushou","year":"2020","unstructured":"Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, and Haojin Zhu. ios, your os, everybody's os: Vetting and analyzing network services of ios applications. In Proceedings of the USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICKECS56523.2022.10060106"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00121"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0033"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583534"},{"key":"e_1_3_2_1_12_1","volume-title":"The current status of accessibility in mobile apps. ACM Transactions on Accessible Computing (TACCESS), 12(1):1-31","author":"Yan Shunguo","year":"2019","unstructured":"Shunguo Yan and PG Ramachandran. The current status of accessibility in mobile apps. ACM Transactions on Accessible Computing (TACCESS), 12(1):1-31, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"Android Debug Bridge (adb). https:\/\/developer.android.com\/tools\/adb","author":"Developers Android","year":"2024","unstructured":"Android Developers. Android Debug Bridge (adb). https:\/\/developer.android.com\/tools\/adb, 2024. [Accessed: March 29, 2025]."},{"key":"e_1_3_2_1_14_1","volume-title":"Appium documentation. https:\/\/appium.io\/docs\/en\/latest\/","author":"Contributors Appium","year":"2024","unstructured":"Appium Contributors. Appium documentation. https:\/\/appium.io\/docs\/en\/latest\/, 2024. [Accessed: March 29, 2025]."},{"key":"e_1_3_2_1_15_1","first-page":"5017","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Mohamed Reham","year":"2024","unstructured":"Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, and Z Berkay Celik. Attention please! an investigation of the app tracking transparency permission. In 33rd USENIX Security Symposium (USENIX Security 24), pages 5017-5034, 2024."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_1_17_1","volume-title":"Evasion and countermeasures techniques to detect dynamic binary instrumentation frameworks. Digital Threats: Research and Practice (DTRAP), 3(2):1-28","author":"Filho Ailton Santos","year":"2022","unstructured":"Ailton Santos Filho, Ricardo J Rodr\u00edguez, and Eduardo L Feitosa. Evasion and countermeasures techniques to detect dynamic binary instrumentation frameworks. Digital Threats: Research and Practice (DTRAP), 3(2):1-28, 2022."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/apktool.org","author":"Apktool Apktool","year":"2025","unstructured":"Apktool | Apktool. https:\/\/apktool.org, 2025. [Accessed: April 13, 2025]."},{"volume-title":"June","year":"2017","key":"e_1_3_2_1_19_1","unstructured":"SensePost. objection. https:\/\/github.com\/sensepost\/objection, June 2017. [Accessed: April 13, 2025]."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_3_2_1_21_1","volume-title":"Kif - keep it functional. https:\/\/github.com\/kif-framework\/KIF","author":"Contributors KIF","year":"2024","unstructured":"KIF Contributors. Kif - keep it functional. https:\/\/github.com\/kif-framework\/KIF, 2024. [Accessed: April 1, 2025]."},{"volume-title":"idb: ios development bridge. https:\/\/github.com\/facebook\/idb","year":"2025","key":"e_1_3_2_1_22_1","unstructured":"Facebook. idb: ios development bridge. https:\/\/github.com\/facebook\/idb, 2025. [Accessed: March 30, 2025]."},{"volume-title":"Calabash - automated ui acceptance testing for mobile apps. https:\/\/github.com\/calabash\/calabash-ios. Archived, last updated","year":"2017","key":"e_1_3_2_1_23_1","unstructured":"Xamarin. Calabash - automated ui acceptance testing for mobile apps. https:\/\/github.com\/calabash\/calabash-ios. Archived, last updated in 2017. [Accessed: April 2, 2025]."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW60967.2024.00060"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVRIS.2019.00068"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2017.02.04"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBGAMES.2018.00015"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SST.2018.8564626"},{"key":"e_1_3_2_1_29_1","volume-title":"https:\/\/appium.github.io\/appium-xcuitest-driver\/4.16\/wda-custom-server","author":"Test Driver DriverAgent","year":"2025","unstructured":"WebDriverAgent - Appium XCUITest Driver. https:\/\/appium.github.io\/appium-xcuitest-driver\/4.16\/wda-custom-server, 2025. [Accessed: September 16, 2025]."},{"volume-title":"April 14","year":"2025","key":"e_1_3_2_1_30_1","unstructured":"appium-xcuitest-driver\/docs\/guides\/troubleshooting.md at master \u22c5 appium\/appium-xcuitest-driver, 2025. [Accessed: April 14, 2025]."},{"key":"e_1_3_2_1_31_1","volume-title":"November","author":"Timpany Calum","year":"2021","unstructured":"Calum Timpany. iOS tests suddenly became noticeably slower - Issues\/Bugs - Appium Discuss. https:\/\/discuss.appium.io\/t\/ios-tests-suddenly-became-noticeably-slower\/34965, November 2021. [Accessed: April 14, 2025]."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399871.3399883"},{"key":"e_1_3_2_1_33_1","volume-title":"Nosmoke: Ui automation framework for mobile apps. https:\/\/github.com\/macacajs\/NoSmoke","author":"Team Macaca","year":"2021","unstructured":"Macaca Team. Nosmoke: Ui automation framework for mobile apps. https:\/\/github.com\/macacajs\/NoSmoke, 2021. [Accessed: April 8, 2025]."},{"volume-title":"August","year":"2024","key":"e_1_3_2_1_34_1","unstructured":"pymobiledevice3. https:\/\/github.com\/doronz88\/pymobiledevice3, August 2024. [Accessed: August 7, 2024]."},{"key":"e_1_3_2_1_35_1","volume-title":"go-ios: Golang based ios interaction tools. https:\/\/github.com\/danielpaulus\/go-ios","author":"Paulus Daniel","year":"2024","unstructured":"Daniel Paulus. go-ios: Golang based ios interaction tools. https:\/\/github.com\/danielpaulus\/go-ios, 2024. [Accessed: April 8, 2025]."},{"volume-title":"libimobiledevice: A cross-platform protocol library to communicate with ios devices. https:\/\/libimobiledevice.org","year":"2024","key":"e_1_3_2_1_36_1","unstructured":"libimobiledevice Team. libimobiledevice: A cross-platform protocol library to communicate with ios devices. https:\/\/libimobiledevice.org, 2024. [Accessed: April 8, 2025]."},{"key":"e_1_3_2_1_37_1","volume-title":"ipatool issue #284. https:\/\/github.com\/majd\/ipatool\/issues\/284","author":"Taby Majd","year":"2024","unstructured":"Majd Taby. ipatool issue #284. https:\/\/github.com\/majd\/ipatool\/issues\/284, 2024. [Accessed: Mar 16, 2025]."},{"key":"e_1_3_2_1_38_1","volume-title":"ipatool issue #357. https:\/\/github.com\/majd\/ipatool\/issues\/357","author":"Taby Majd","year":"2024","unstructured":"Majd Taby. ipatool issue #357. https:\/\/github.com\/majd\/ipatool\/issues\/357, 2024. [Accessed: Mar 25, 2025]."},{"key":"e_1_3_2_1_39_1","volume-title":"https:\/\/www.usb.org\/usb-on-the-go","author":"Go USB","year":"2025","unstructured":"USB on the Go and Embedded Host | USB-IF. https:\/\/www.usb.org\/usb-on-the-go, 2025. [Accessed: April 13, 2025]."},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/github.com\/doronz88\/pymobiledevice3\/issues\/405#issuecomment-1465104729. [Accessed","author":"Issue","year":"2025","unstructured":"pymobiledevice3 developer accessibility crash \u22c5 Issue #405 \u22c5 doronz88\/pymobiledevice3. https:\/\/github.com\/doronz88\/pymobiledevice3\/issues\/405#issuecomment-1465104729. [Accessed: April 13, 2025]."},{"key":"e_1_3_2_1_41_1","volume-title":"Use voice control on your iphone, ipad, or ipod touch. https:\/\/support.apple.com\/en-us\/111778","author":"Apple Inc.","year":"2024","unstructured":"Apple Inc. Use voice control on your iphone, ipad, or ipod touch. https:\/\/support.apple.com\/en-us\/111778, 2024. [Accessed: April 9, 2025]."},{"key":"e_1_3_2_1_42_1","volume-title":"Dios: Dynamic privacy analysis of ios applications. Technical report","author":"Kurtz Andreas","year":"2014","unstructured":"Andreas Kurtz, Andreas Weinlein, and Christoph Settgast. Dios: Dynamic privacy analysis of ios applications. Technical report, 2014."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Xiao Yue","year":"2023","unstructured":"Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, and Luyi Xing. Lalaine: Measuring and characterizing non-compliance of apple privacy labels. In Proceedings of the USENIX Security Symposium, 2023."},{"key":"e_1_3_2_1_44_1","volume-title":"https:\/\/developer.android.com\/reference\/android\/accessibilityservice\/AccessibilityService","author":"Developers Android","year":"2025","unstructured":"Android Developers. Accessibilityservice. https:\/\/developer.android.com\/reference\/android\/accessibilityservice\/AccessibilityService, 2025. [Accessed: April 8, 2025]."},{"volume-title":"ideviceinstaller. https:\/\/github.com\/libimobiledevice\/ideviceinstaller","year":"2020","key":"e_1_3_2_1_45_1","unstructured":"libimobiledevice.org. ideviceinstaller. https:\/\/github.com\/libimobiledevice\/ideviceinstaller, 2020. [Accessed: March 28, 2025]."},{"key":"e_1_3_2_1_46_1","volume-title":"Gui agents with foundation models: A comprehensive survey. arXiv preprint arXiv:2411.04890","author":"Wang Shuai","year":"2024","unstructured":"Shuai Wang, Weiwen Liu, Jingxuan Chen, Yuqi Zhou, Weinan Gan, Xingshan Zeng, Yuhan Che, Shuai Yu, Xinlong Hao, Kun Shao, et al. Gui agents with foundation models: A comprehensive survey. arXiv preprint arXiv:2411.04890, 2024."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI-24","author":"Baechler Gilles","year":"2024","unstructured":"Gilles Baechler, Srinivas Sunkara, Maria Wang, Fedir Zubach, Hassan Mansoor, Vincent Etter, Victor C\u0103rbune, Jason Lin, Jindong Chen, and Abhanshu Sharma. Screenai: A vision-language model for UI and infographics understanding. In Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI-24, 2024."},{"key":"e_1_3_2_1_48_1","volume-title":"Omniparser for pure vision based gui agent. arXiv preprint arXiv:2408.00203","author":"Lu Yadong","year":"2024","unstructured":"Yadong Lu, Jianwei Yang, Yelong Shen, and Ahmed Awadallah. Omniparser for pure vision based gui agent. arXiv preprint arXiv:2408.00203, 2024."},{"key":"e_1_3_2_1_49_1","volume-title":"Widget captioning: Generating natural language description for mobile user interface elements. arXiv preprint arXiv:2010.04295","author":"Li Yang","year":"2020","unstructured":"Yang Li, Gang Li, Luheng He, Jingjie Zheng, Hong Li, and Zhiwei Guan. Widget captioning: Generating natural language description for mobile user interface elements. arXiv preprint arXiv:2010.04295, 2020."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73039-9_14"},{"key":"e_1_3_2_1_51_1","volume-title":"Set-of-mark prompting unleashes extraordinary visual grounding in gpt-4v. arXiv preprint arXiv:2310.11441","author":"Yang Jianwei","year":"2023","unstructured":"Jianwei Yang, Hao Zhang, Feng Li, Xueyan Zou, Chunyuan Li, and Jianfeng Gao. Set-of-mark prompting unleashes extraordinary visual grounding in gpt-4v. arXiv preprint arXiv:2310.11441, 2023."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Zhang Chi","year":"2025","unstructured":"Chi Zhang, Zhao Yang, Jiaxuan Liu, Yanda Li, Yucheng Han, Xin Chen, Zebiao Huang, Bin Fu, and Gang Yu. Appagent: Multimodal agents as smartphone users. In Proceedings of the CHI Conference on Human Factors in Computing Systems, 2025."},{"key":"e_1_3_2_1_53_1","volume-title":"Yunxin Liu. AutoDroid: LLM-powered Task Automation in Android. In Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, ACM MobiCom '24","author":"Wen Hao","year":"2024","unstructured":"Hao Wen, Yuanchun Li, Guohong Liu, Shanhui Zhao, Tao Yu, Toby Jia-Jun Li, Shiqi Jiang, Yunhao Liu, Yaqin Zhang, and Yunxin Liu. AutoDroid: LLM-powered Task Automation in Android. In Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, ACM MobiCom '24, New York, NY, USA, 2024. Association for Computing Machinery."},{"key":"e_1_3_2_1_54_1","volume-title":"Advances in Neural Information Processing Systems","author":"Wang Junyang","year":"2024","unstructured":"Junyang Wang, Haiyang Xu, Haitao Jia, Xi Zhang, Ming Yan, Weizhou Shen, Ji Zhang, Fei Huang, and Jitao Sang. Mobile-agent-v2: Mobile device operation assistant with effective navigation via multi-agent collaboration. Advances in Neural Information Processing Systems, 2024."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Hong Wenyi","year":"2024","unstructured":"Wenyi Hong, Weihan Wang, Qingsong Lv, Jiazheng Xu, Wenmeng Yu, Junhui Ji, Yan Wang, Zihan Wang, Yuxiao Dong, Ming Ding, and Jie Tang. Cogagent: A visual language model for gui agents. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2024."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201089"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00118"},{"volume-title":"Understanding idevice protocol layers. https:\/\/github.com\/doronz88\/pymobiledevice3\/blob\/master\/misc\/understanding_idevice_protocol_layers.md. [Accessed","year":"2025","key":"e_1_3_2_1_58_1","unstructured":"Doronz88. Understanding idevice protocol layers. https:\/\/github.com\/doronz88\/pymobiledevice3\/blob\/master\/misc\/understanding_idevice_protocol_layers.md. [Accessed: March 26, 2025]."},{"key":"e_1_3_2_1_59_1","volume-title":"ioswhispertest: Online companion repository. https:\/\/github.com\/iOSWhisperTest\/CCS-25-Online-Companion","author":"Moti Zahra","year":"2025","unstructured":"Zahra Moti, Tom Janssen-Groesbeek, Steven Monteiro, Andrea Continella, and Gunes Acar. ioswhispertest: Online companion repository. https:\/\/github.com\/iOSWhisperTest\/CCS-25-Online-Companion, 2025."},{"key":"e_1_3_2_1_60_1","volume-title":"Piper: A fast, local neural text to speech system. https:\/\/github.com\/rhasspy\/piper","author":"Contributors Rhasspy","year":"2023","unstructured":"Rhasspy Contributors. Piper: A fast, local neural text to speech system. https:\/\/github.com\/rhasspy\/piper, 2023. [Accessed: March 26, 2025]."},{"key":"e_1_3_2_1_61_1","volume-title":"Piper TTS - en_US Amy. https:\/\/huggingface.co\/rhasspy\/piper-voices\/tree\/v1.0.0\/en\/en_US\/amy\/medium","author":"Project Rhasspy","year":"2023","unstructured":"Rhasspy Project. Piper TTS - en_US Amy. https:\/\/huggingface.co\/rhasspy\/piper-voices\/tree\/v1.0.0\/en\/en_US\/amy\/medium, 2023. [Accessed: March 28, 2025]."},{"key":"e_1_3_2_1_62_1","volume-title":"playsound: Pure python, cross platform, single function module with no dependencies for playing sounds. https:\/\/pypi.org\/project\/playsound\/","author":"Taylor Bill","year":"2023","unstructured":"Bill Taylor. playsound: Pure python, cross platform, single function module with no dependencies for playing sounds. https:\/\/pypi.org\/project\/playsound\/, 2023. [Accessed: April 13, 2025]."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1136\/archdischild-2023-325960"},{"key":"e_1_3_2_1_64_1","volume-title":"October","author":"Semi-Annual Piper Sandler","year":"2023","unstructured":"Piper Sandler Completes 46th Semi-Annual Generation Z Survey of 9,193 U.S. Teens | Piper Sandler. https:\/\/www.pipersandler.com\/news\/piper-sandler-completes-46th-semi-annual-generation-z-survey-9193-us-teens, October 2023. [Accessed: April 13, 2025]."},{"key":"e_1_3_2_1_65_1","volume-title":"Imagehash: perceptual image hashing in python. https:\/\/github.com\/JohannesBuchner\/imagehash","author":"Buchner Johannes","year":"2013","unstructured":"Johannes Buchner. Imagehash: perceptual image hashing in python. https:\/\/github.com\/JohannesBuchner\/imagehash, 2013. [Accessed: March 28, 2025]."},{"key":"e_1_3_2_1_66_1","volume-title":"Children's Online Privacy Protection Rule (''COPPA''). https:\/\/www.ftc.gov\/node\/60175","author":"FTC.","year":"2023","unstructured":"FTC. Children's Online Privacy Protection Rule (''COPPA''). https:\/\/www.ftc.gov\/node\/60175, 2023. [Accessed: February 28, 2023]."},{"key":"e_1_3_2_1_67_1","volume-title":"Qwen2.5-vl technical report. arXiv preprint arXiv:2502.13923","author":"Bai Shuai","year":"2025","unstructured":"Shuai Bai, Keqin Chen, Xuejing Liu, Jialin Wang, Wenbin Ge, Sibo Song, Kai Dang, Peng Wang, Shijie Wang, Jun Tang, et al. Qwen2.5-vl technical report. arXiv preprint arXiv:2502.13923, 2025."},{"key":"e_1_3_2_1_68_1","first-page":"24824","volume-title":"Advances in Neural Information Processing Systems","volume":"35","author":"Wei Jason","year":"2022","unstructured":"Jason Wei, Xuezhi Wang, Dale Schuurmans, Maarten Bosma, brian ichter, Fei Xia, Ed Chi, Quoc V Le, and Denny Zhou. Chain-of-thought prompting elicits reasoning in large language models. In Advances in Neural Information Processing Systems, volume 35, pages 24824-24837, 2022."},{"key":"e_1_3_2_1_69_1","first-page":"1877","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel Ziegler, Jeffrey Wu, Clemens Winter, Chris Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya Sutskever, and Dario Amodei. Language models are few-shot learners. In Advances in Neural Information Processing Systems, volume 33, pages 1877-1901, 2020."},{"key":"e_1_3_2_1_70_1","volume-title":"App Store Scraper. https:\/\/github.com\/facundoolano\/app-store-scraper\/tree\/master. [Accessed","author":"Olano Facundo","year":"2025","unstructured":"Facundo Olano. App Store Scraper. https:\/\/github.com\/facundoolano\/app-store-scraper\/tree\/master. [Accessed: March 24, 2025]."},{"volume-title":"Google Ads Keyword Planner. https:\/\/ads.google.com\/home\/tools\/keyword-planner\/. [Accessed","year":"2025","key":"e_1_3_2_1_71_1","unstructured":"Google. Google Ads Keyword Planner. https:\/\/ads.google.com\/home\/tools\/keyword-planner\/. [Accessed: March 24, 2025]."},{"key":"e_1_3_2_1_72_1","volume-title":"ipatool: Command-line tool for downloading ios apps from the app store. https:\/\/github.com\/majd\/ipatool. [Accessed","author":"Taby Majd","year":"2025","unstructured":"Majd Taby. ipatool: Command-line tool for downloading ios apps from the app store. https:\/\/github.com\/majd\/ipatool. [Accessed: March 25, 2025]."},{"volume-title":"Duckduckgo tracker radar. https:\/\/github.com\/duckduckgo\/tracker-radar","year":"2020","key":"e_1_3_2_1_73_1","unstructured":"DuckDuckGo. Duckduckgo tracker radar. https:\/\/github.com\/duckduckgo\/tracker-radar, 2020. [Accessed: September 16, 2025]."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_75_1","volume-title":"Financial products and services policy. https:\/\/support.google.com\/adspolicy\/answer\/3466017","author":"Ads Google","year":"2024","unstructured":"Google Ads. Financial products and services policy. https:\/\/support.google.com\/adspolicy\/answer\/3466017, 2024. [Accessed: March 30, 2025]."},{"key":"e_1_3_2_1_76_1","volume-title":"September","author":"PREDATOR IN THE","year":"2023","unstructured":"PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions - The Citizen Lab. https:\/\/citizenlab.ca\/2023\/09\/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions, September 2023. [Accessed: April 15, 2025]."},{"key":"e_1_3_2_1_77_1","volume-title":"https:\/\/support.apple.com\/en-us\/105120","author":"Apple Support About Lockdown","year":"2025","unstructured":"About Lockdown Mode - Apple Support. https:\/\/support.apple.com\/en-us\/105120, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_78_1","volume-title":"https:\/\/playwright.dev\/python","author":"Playwright Python Fast","year":"2025","unstructured":"Fast and reliable end-to-end testing for modern web apps | Playwright Python. https:\/\/playwright.dev\/python, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_79_1","volume-title":"We value your privacy... now take some cookies: Measuring the GDPR's impact on web privacy. arXiv preprint arXiv:1808.05096","author":"Degeling Martin","year":"2018","unstructured":"Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. We value your privacy... now take some cookies: Measuring the GDPR's impact on web privacy. arXiv preprint arXiv:1808.05096, 2018."},{"key":"e_1_3_2_1_80_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Laperdrix Pierre","year":"2021","unstructured":"Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, and Nick Nikiforakis. Fingerprinting in style: Detecting browser extensions via injected style sheets. In Proceedings of the USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_81_1","first-page":"135","volume-title":"DIMVA 2020, Lisbon, 2020, Proceedings 17","author":"Azad Babak Amin","year":"2020","unstructured":"Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, and Nick Nikiforakis. Web runner 2049: Evaluating third-party anti-bot services. In Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, 2020, Proceedings 17, pages 135-159. Springer, 2020."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_83_1","volume-title":"https:\/\/developer.apple.com\/documentation\/safari-developer-tools\/inspecting-ios","author":"Apple Developer Documentation Inspecting","year":"2025","unstructured":"Inspecting iOS and iPadOS | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/safari-developer-tools\/inspecting-ios, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_84_1","volume-title":"October","author":"Murphy Glen","year":"2008","unstructured":"Glen Murphy. Content, not 'Chrome'. https:\/\/blog.chromium.org\/2008\/10\/content-not-chrome.html, October 2008. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_85_1","volume-title":"https:\/\/support.apple.com\/guide\/iphone\/browse-the-web-privately-iphb01fc3c85\/ios","author":"Apple Support Browse","year":"2025","unstructured":"Browse the web privately in Safari on iPhone - Apple Support. https:\/\/support.apple.com\/guide\/iphone\/browse-the-web-privately-iphb01fc3c85\/ios, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_86_1","volume-title":"https:\/\/support.apple.com\/guide\/iphone\/verify-website-encryption-iphc23ad3473\/ios","author":"Phone Check","year":"2025","unstructured":"Check whether a website is encrypted in Safari on iPhone. https:\/\/support.apple.com\/guide\/iphone\/verify-website-encryption-iphc23ad3473\/ios, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_87_1","volume-title":"July","author":"Graves Russell","year":"2022","unstructured":"Russell Graves. Analyzing iOS 16 Lockdown Mode: Browser Features and Performance. Syonyk's Project Blog, July 2022."},{"key":"e_1_3_2_1_88_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"18","author":"Hanley Hans WA","year":"2024","unstructured":"Hans WA Hanley and Zakir Durumeric. Machine-made media: Monitoring the mobilization of machine-generated articles on misinformation and mainstream news websites. In Proceedings of the International AAAI Conference on Web and Social Media, volume 18, 2024."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645493"},{"key":"e_1_3_2_1_90_1","first-page":"1","volume-title":"Workshop on Technology and Consumer Protection","author":"Zeng Eric","year":"2020","unstructured":"Eric Zeng, Tadayoshi Kohno, and Franziska Roesner. Bad news: Clickbait and deceptive ads on news and misinformation websites. In Workshop on Technology and Consumer Protection, pages 1-11, 2020."},{"key":"e_1_3_2_1_91_1","volume-title":"https:\/\/docs.fontawesome.com\/web\/add-icons\/how-to#add-icons-to-html","author":"Add Icons How To","year":"2025","unstructured":"How To Add Icons. https:\/\/docs.fontawesome.com\/web\/add-icons\/how-to#add-icons-to-html, 2025. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_92_1","volume-title":"September","author":"Apple Developer","year":"2023","unstructured":"Apple Developer Forums user. Detect if user is running voice control. https:\/\/developer.apple.com\/forums\/thread\/738581, September 2023. [Accessed: April 15, 2025]."},{"key":"e_1_3_2_1_93_1","volume-title":"Eia: Environmental injection attack on generalist web agents for privacy leakage. arXiv preprint arXiv:2409.11295","author":"Liao Zeyi","year":"2024","unstructured":"Zeyi Liao, Lingbo Mo, Chejian Xu, Mintong Kang, Jiawei Zhang, Chaowei Xiao, Yuan Tian, Bo Li, and Huan Sun. Eia: Environmental injection attack on generalist web agents for privacy leakage. arXiv preprint arXiv:2409.11295, 2024."},{"key":"e_1_3_2_1_94_1","volume-title":"October","author":"Jung Myung Kyo","year":"2024","unstructured":"Myung Kyo Jung. FEATURE REQUEST: Implementing Tunnel Creation without sudo \u22c5 Issue #1260 \u22c5 doronz88\/pymobiledevice3, October 2024. [Accessed: April 12, 2025]."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624830"},{"key":"e_1_3_2_1_96_1","volume-title":"Mobile-bench: An evaluation benchmark for llm-based mobile agents. arXiv preprint arXiv:2407.00993","author":"Deng Shihan","year":"2024","unstructured":"Shihan Deng, Weikai Xu, Hongda Sun, Wei Liu, Tao Tan, Jianfeng Liu, Ang Li, Jian Luan, Bin Wang, Rui Yan, and Shuo Shang. Mobile-bench: An evaluation benchmark for llm-based mobile agents. arXiv preprint arXiv:2407.00993, 2024."},{"key":"e_1_3_2_1_97_1","volume-title":"Proceedings of the Annual ACM Symposium on User Interface Software and Technology, UIST '17","author":"Deka Biplab","year":"2017","unstructured":"Biplab Deka, Zifeng Huang, Chad Franzen, Joshua Hibschman, Daniel Afergan, Yang Li, Jeffrey Nichols, and Ranjitha Kumar. Rico: A mobile app dataset for building data-driven design applications. In Proceedings of the Annual ACM Symposium on User Interface Software and Technology, UIST '17, New York, NY, USA, 2017. Association for Computing Machinery."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:23:00Z","timestamp":1766442180000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":97,"alternative-id":["10.1145\/3719027.3765183","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765183","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}