{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:05:04Z","timestamp":1750219504575,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","funder":[{"name":"Project SERICS","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1145\/3733102.3733122","type":"proceedings-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:07Z","timestamp":1750158847000},"page":"35-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis and Detection of Android Stegomalware: the Impact of the Loading Stage"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0092-9067","authenticated-orcid":false,"given":"Diego","family":"Soi","sequence":"first","affiliation":[{"name":"University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8269-9777","authenticated-orcid":false,"given":"Silvia Lucia","family":"Sanna","sequence":"additional","affiliation":[{"name":"University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2609-6787","authenticated-orcid":false,"given":"Giacomo","family":"Benedetti","sequence":"additional","affiliation":[{"name":"National Research Council of Italy, Genova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9402-7375","authenticated-orcid":false,"given":"Angelica","family":"Liguori","sequence":"additional","affiliation":[{"name":"National Research Council of Italy, Rende, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9259-5157","authenticated-orcid":false,"given":"Leonardo","family":"Regano","sequence":"additional","affiliation":[{"name":"University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6466-3354","authenticated-orcid":false,"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"National Research Council of Italy, Genova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5759-3017","authenticated-orcid":false,"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[{"name":"University of Cagliari, Cagliari, Italy and Consorzio Interuniversitario Nazionale per l?Informatica (CINI), Roma, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Aisha Ali-Gombe Sneha Sudhakaran Ramyapandian Vijayakanthan and Golden\u00a0G. Richard. 2023. cRGB_Mem: At the Intersection of Memory Forensics and Machine Learning. Forensic Science International: Digital Investigation 45 (2023). 10.1016\/j.fsidi.2023.301564","DOI":"10.1016\/j.fsidi.2023.301564"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Mohammed\u00a0K. Alzaylaee Suleiman\u00a0Y. Yerima and Sakir Sezer. 2017. Emulator vs Real Phone: Android Malware Detection Using Machine Learning. Proceedings of the 3rd ACM International Workshop on Security and Privacy Analytics co-located with CODASPY 2017 (2017) 65 \u2013 72. 10.1145\/3041008.3041010","DOI":"10.1145\/3041008.3041010"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Simone Aonzo Gabriel\u00a0Claudiu Georgiu Luca Verderame and Alessio Merlo. 2020. Obfuscapk: An Open-Source Black-Box Obfuscation Tool for Android Apps. SoftwareX 11 (2020) 100403. 10.1016\/j.softx.2020.100403","DOI":"10.1016\/j.softx.2020.100403"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-59749-268-3.X0001-1"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Daniel Arp Michael Spreitzenbarth Malte H\u00fcbner Hugo Gascon and Konrad Rieck. 2014. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket. 21st Annual Network and Distributed System Security Symposium (2014). 10.14722\/ndss\/2014.23247","DOI":"10.14722\/ndss\/2014.23247"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Saba Arshad Munam\u00a0A. Shah Abdul Wahid Amjad Mehmood Houbing Song and Hongnian Yu. 2018. SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System. IEEE Access 6 (2018) 4321 \u2013 4339. 10.1109\/ACCESS.2018.2792941","DOI":"10.1109\/ACCESS.2018.2792941"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Shikha Badhani and Sunil\u00a0K Muttoo. 2018. Evading Android Anti-malware by Hiding Malicious Application Inside Images. International Journal of System Assurance Engineering and Management 9 (2018) 482\u2013493. 10.1007\/s13198-017-0692-7","DOI":"10.1007\/s13198-017-0692-7"},{"key":"e_1_3_3_2_9_2","volume-title":"17th International Conference on Emerging Security Information, Systems and Technologies","author":"Birnbaum Bernhard","year":"2023","unstructured":"Bernhard Birnbaum, Christian Kraetzer, and Jana Dittmann. 2023. Stego-Malware Attribution: Simple Signature and Content-based Features Derived and Validated from Classical Image Steganalysis on Five Exemplary Chosen Algorithms. In 17th International Conference on Emerging Security Information, Systems and Technologies."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Jorge Blasco Julio Hernandez-Castro Jos\u00e9\u00a0Mar\u00eda de Fuentes and Benjamin Ramos. 2012. A Framework for Avoiding Steganography Usage Over HTTP. Journal of Network and Computer Applications 35 1 (2012) 491\u2013501. 10.1016\/j.jnca.2011.10.003","DOI":"10.1016\/j.jnca.2011.10.003"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Ahmet\u00a0Selman Bozkir Ersan Tahillioglu Murat Aydos and Ilker Kara. 2021. Catch them Alive: A Malware Detection Approach through Memory Forensics manifold Learning and Computer Vision. Computers and Security 103 (2021). 10.1016\/j.cose.2020.102166","DOI":"10.1016\/j.cose.2020.102166"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Iker Burguera Urko Zurutuza and Simin Nadjm-Tehrani. 2011. Crowdroid: Behavior-based Malware Detection System for Android. Proceedings of the ACM Conference on Computer and Communications Security (2011) 15 \u2013 25. 10.1145\/2046614.2046619","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Nunziato Cassavia Luca Caviglione Massimo Guarascio Giuseppe Manco and Marco Zuppelli. 2022. Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning. Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications 13 3 (2022) 50\u201367. 10.22667\/JOWUA.2022.09.30.050","DOI":"10.22667\/JOWUA.2022.09.30.050"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31469-86"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Luca Caviglione and Wojciech Mazurczyk. 2022. Never Mind the Malware Here\u2019s the Stegomalware. IEEE Security & Privacy 20 5 (2022) 101\u2013106. 10.1109\/MSEC.2022.3178205","DOI":"10.1109\/MSEC.2022.3178205"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Luca Caviglione Steffen Wendzel and Wojciech Mazurczyk. 2017. The Future of Digital Forensics: Challenges and The Road Ahead. IEEE Security & Privacy 15 6 (2017) 12\u201317. 10.1109\/MSP.2017.4251117","DOI":"10.1109\/MSP.2017.4251117"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Xiao Chen Chaoran Li Derui Wang Sheng Wen Jun Zhang Surya Nepal Yang Xiang and Kui Ren. 2020. Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Transactions on Information Forensics and Security 15 (2020) 987 \u2013 1001. 10.1109\/TIFS.2019.2932228","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Danilo Dell\u2019Orco Giorgio Bernardinetti Giuseppe Bianchi Alessio Merlo and Alessandro Pellegrini. 2024. Would You Mind Hiding My Malware? Building Malicious Android Apps with Stegopack. SSRN (2024). 10.2139\/ssrn.5039499","DOI":"10.2139\/ssrn.5039499"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659641"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Parvez Faruki Rati Bhan Vinesh Jain Sajal Bhatia Nour El\u00a0Madhoun and Rajendra Pamula. 2023. A Survey and Evaluation of Android-based Malware Evasion Techniques and Detection Frameworks. Information 14 7 (2023). 10.3390\/info14070374","DOI":"10.3390\/info14070374"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Shivi Garg and Niyati Baliyan. 2021. Comparative Analysis of Android and iOS from Security Viewpoint. Computer Science Review 40 (2021) 100372. 10.1016\/j.cosrev.2021.100372","DOI":"10.1016\/j.cosrev.2021.100372"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"M. Gopinath and Sibi\u00a0Chakkaravarthy Sethuraman. 2023. A Comprehensive Survey on Deep Learning based Malware Detection Techniques. Computer Science Review 47 (2023). 10.1016\/j.cosrev.2022.100529","DOI":"10.1016\/j.cosrev.2022.100529"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Tobias Gro\u00df Marcel Busch and Tilo M\u00fcller. 2021. One Key to Rule Them All: Recovering the Master Key from RAM to Break Android\u2019s File-based Encryption. Forensic Science International: Digital Investigation 36 (2021). 10.1016\/j.fsidi.2021.301113","DOI":"10.1016\/j.fsidi.2021.301113"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544437"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Hashida Haidros Rahima\u00a0Manzil and S. Manohar\u00a0Naik. 2024. Detection Approaches for Android Malware: Taxonomy and Review Analysis. Expert Systems with Applications 238 (2024). 10.1016\/j.eswa.2023.122255","DOI":"10.1016\/j.eswa.2023.122255"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Andri Heriyanto Craig Valli and Peter Hannay. 2015. Comparison of Live Response Linux Memory Extractor (LiME) and Mem Tool for Acquiring Android\u2019s Volatile Memory in the Malware Incident. Australian Digital Forensics Conference (2015) 5 \u2013 14. 10.4225\/75\/57b3f143fb884","DOI":"10.4225\/75\/57b3f143fb884"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600194"},{"key":"e_1_3_3_2_28_2","unstructured":"Kaspersky Lab. 2025. Trojan-Downloader.AndroidOS.Agent. https:\/\/threats.kaspersky.com\/en\/threat\/Trojan-Downloader.AndroidOS.Agent\/."},{"key":"e_1_3_3_2_29_2","unstructured":"Kaspersky Lab. 2025. Trojan-Dropper.AndroidOS.Agent. https:\/\/threats.kaspersky.com\/en\/threat\/Trojan-Dropper.AndroidOS.Agent\/."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"David\u00a0Sean Keyes Beiqi Li Gurdip Kaur Arash\u00a0Habibi Lashkari Francois Gagnon and Frederic Massicotte. 2021. EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics. 2021 Reconciling Data Analytics Automation Privacy and Security: A Big Data Challenge (2021). 10.1109\/RDAAPS48126.2021.9452002","DOI":"10.1109\/RDAAPS48126.2021.9452002"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Saneeha Khalid and Faisal\u00a0Bashir Hussain. 2024. VolMemDroid\u2014Investigating Android Malware Insights with Volatile Memory Artifacts. Expert Systems with Applications 253 (2024). 10.1016\/j.eswa.2024.124347","DOI":"10.1016\/j.eswa.2024.124347"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659659"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.92"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-62700-211"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Davide Maiorca Davide Ariu Igino Corona Marco Aresu and Giorgio Giacinto. 2015. Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware. Computers & Security 51 (2015) 16\u201331. 10.1016\/j.cose.2015.02.007","DOI":"10.1016\/j.cose.2015.02.007"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"Steve Mansfield-Devine. 2017. Fileless Attacks: Compromising Targets without Malware. Network Security 2017 4 (2017) 7 \u2013 11. 10.1016\/S1353-4858(17)30037-5","DOI":"10.1016\/S1353-4858(17)30037-5"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Jeferson Mart\u00ednez and Javier\u00a0M Dur\u00e1n. 2021. Software Supply Chain Attacks a Threat to Global Cybersecurity: SolarWinds\u2019 Case Study. International Journal of Safety and Security Engineering 11 5 (2021) 537\u2013545. 10.18280\/ijsse.110505","DOI":"10.18280\/ijsse.110505"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Ren\u00e9 Mayrhofer Jeffrey\u00a0Vander Stoep Chad Brubaker and Nick Kralevich. 2021. The Android Platform Security Model. ACM Transactions on Privacy and Security 24 3 Article 19 (April 2021) 35\u00a0pages. 10.1145\/3448609","DOI":"10.1145\/3448609"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Wojciech Mazurczyk and Luca Caviglione. 2015. Information Hiding as a Challenge for Malware Detection. IEEE Security & Privacy 13 2 (2015) 89\u201393. 10.1109\/MSP.2015.33","DOI":"10.1109\/MSP.2015.33"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/EIT48999.2020.9208339"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"Tilo M\u00fcller and Michael Spreitzenbarth. 2013. FROST: Forensic Recovery of Scrambled Telephones. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7954 (2013) 373 \u2013 388. 10.1007\/978-3-642-38980-123","DOI":"10.1007\/978-3-642-38980-123"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Hamad Naeem Shi Dong Olorunjube\u00a0James Falana and Farhan Ullah. 2023. Development of a Deep Stacked Ensemble with Process based Volatile Memory Forensics for Platform Independent Malware Detection and Classification. Expert Systems with Applications 223 (2023). 10.1016\/j.eswa.2023.119952","DOI":"10.1016\/j.eswa.2023.119952"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103311"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","unstructured":"Ya Pan Xiuting Ge Chunrong Fang and Yong Fan. 2020. A Systematic Literature Review of Android Malware Detection Using Static Analysis. IEEE Access 8 (2020) 116363 \u2013 116379. 10.1109\/ACCESS.2020.3002842","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409187"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","unstructured":"Siegfried Rasthofer Steven Arzt Marc Miltenberger and Eric Bodden. 2016. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. 23rd Annual Network and Distributed System Security Symposium (2016). 10.14722\/ndss.2016.23066","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Zahoor-Ur Rehman Sidra\u00a0Nasim Khan Khan Muhammad Jong\u00a0Weon Lee Zhihan Lv Sung\u00a0Wook Baik Peer\u00a0Azmat Shah Khalid Awan and Irfan Mehmood. 2018. Machine Learning-Assisted Signature and Heuristic-based Detection of Malwares in Android Devices. Computers and Electrical Engineering 69 (2018) 828 \u2013 841. 10.1016\/j.compeleceng.2017.11.028","DOI":"10.1016\/j.compeleceng.2017.11.028"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA230489"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Andrea Saracino Daniele Sgandurra Gianluca Dini and Fabio Martinelli. 2018. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. IEEE Transactions on Dependable and Secure Computing 15 1 (2018) 83 \u2013 97. 10.1109\/TDSC.2016.2536605","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Andreas Schaffhauser Wojciech Mazurczyk Luca Caviglione Marco Zuppelli and Julio Hernandez-Castro. 2022. Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images. Security and Communication Networks 2022 1 (2022) 4477317. 10.1155\/2022\/4477317","DOI":"10.1155\/2022\/4477317"},{"key":"e_1_3_3_2_51_2","unstructured":"Diego Soi Silvia\u00a0Lucia Sanna Angelica Liguori Marco Zuppelli Leonardo Regano Davide Maiorca Luca Caviglione Giuseppe Manco and Giorgio Giacinto. 2025. On the Feasibility of Android Stegomalware: A Detection Study. Italian Conference on CyberSecurity (2025). To appear."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670886"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Guillermo Suarez-Tangil Santanu\u00a0Kumar Dash Mansour Ahmadi Johannes Kinder Giorgio Giacinto and Lorenzo Cavallaro. 2017. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (2017) 309 \u2013 320. 10.1145\/3029806.3029825","DOI":"10.1145\/3029806.3029825"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16745-927"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Sudhakar and Sushil Kumar. 2020. An Emerging Threat Fileless Malware: a Survey and Research Challenges. Cybersecurity 3 1 (2020). 10.1186\/s42400-019-0043-x","DOI":"10.1186\/s42400-019-0043-x"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","unstructured":"Fatma Taher Omar AlFandi Mousa Al-kfairy Hussam Al\u00a0Hamadi and Saed Alrabaee. 2023. DroidDetectMW: A Hybrid Intelligent Model for Android Malware Detection. Applied Sciences 13 13 (2023). 10.3390\/app13137720","DOI":"10.3390\/app13137720"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Simon Tanner Ilian Vogels and Roger Wattenhofer. 2020. Protecting Android Apps from Repackaging Using Native Code. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12056 (2020) 189 \u2013 204. 10.1007\/978-3-030-45371-812","DOI":"10.1007\/978-3-030-45371-812"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","unstructured":"Danish Vasan Mamoun Alazab Sobia Wassan Hamad Naeem Babak Safaei and Qin Zheng. 2020. IMCFN: Image-based Malware Classification Using Fine-tuned Convolutional Neural Network Architecture. Computer Networks 171 (2020). 10.1016\/j.comnet.2020.107138","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","unstructured":"Laurie Williams Giacomo Benedetti Sivana Hamer Ranindya Paramitha Imranur Rahman Mahzabin Tamanna Greg Tystahl Nusrat Zahan Patrick Morrison Yasemin Acar et\u00a0al. 2024. Research Directions in Software Supply Chain Security. ACM Transactions on Software Engineering and Methodology (2024). 10.1145\/3714464","DOI":"10.1145\/3714464"}],"event":{"name":"IH&MMSEC '25: ACM Workshop on Information Hiding and Multimedia Security","location":"San Jose USA","acronym":"IH&MMSEC '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:16:17Z","timestamp":1750158977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733102.3733122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":58,"alternative-id":["10.1145\/3733102.3733122","10.1145\/3733102"],"URL":"https:\/\/doi.org\/10.1145\/3733102.3733122","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}