{"id":"https://openalex.org/W4416549433","doi":"https://doi.org/10.1145/3719027.3765183","title":"W <scp>hisper</scp> T <scp>est</scp> : A Voice-Control-based Library for iOS UI Automation","display_name":"W <scp>hisper</scp> T <scp>est</scp> : A Voice-Control-based Library for iOS UI Automation","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549433","doi":"https://doi.org/10.1145/3719027.3765183"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765183","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765183","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3719027.3765183","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092796569","display_name":"Zahra Moti","orcid":"https://orcid.org/0009-0002-3862-9413"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Zahra Moti","raw_affiliation_strings":["Radboud University, Nijmegen, Netherlands"],"raw_orcid":"https://orcid.org/0009-0002-3862-9413","affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093452686","display_name":"Tom Janssen-Groesbeek","orcid":"https://orcid.org/0009-0004-7918-3205"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tom Janssen-Groesbeek","raw_affiliation_strings":["Radboud University, Nijmegen, Netherlands"],"raw_orcid":"https://orcid.org/0009-0004-7918-3205","affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109350875","display_name":"Steven Monteiro","orcid":"https://orcid.org/0009-0002-2225-8400"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Steven Monteiro","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"raw_orcid":"https://orcid.org/0009-0002-2225-8400","affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071672404","display_name":"Andrea Continella","orcid":"https://orcid.org/0000-0002-0329-1830"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Andrea Continella","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-0329-1830","affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011677863","display_name":"G\u00fcne\u015f Acar","orcid":"https://orcid.org/0000-0002-1621-8333"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Gunes Acar","raw_affiliation_strings":["Radboud University, Nijmegen, Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-1621-8333","affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092796569"],"corresponding_institution_ids":["https://openalex.org/I145872427"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4173962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"66","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8393999934196472,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8393999934196472,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.037700001150369644,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.013899999670684338,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6685000061988831},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.47760000824928284},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4745999872684479},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.41280001401901245},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.3982999920845032},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.36309999227523804},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.3425999879837036},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.3424000144004822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7856000065803528},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6685000061988831},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5231999754905701},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.47760000824928284},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4745999872684479},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.41280001401901245},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.3982999920845032},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.36309999227523804},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.31769999861717224},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2992999851703644},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.27889999747276306},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3719027.3765183","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765183","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/326039","is_oa":true,"landing_page_url":"https://hdl.handle.net/2066/326039","pdf_url":"https://repository.ubn.ru.nl//bitstream/handle/2066/326039/326039.pdf","source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article in monograph or in proceedings"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765183","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765183","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320319880","display_name":"Government of Canada","ror":"https://ror.org/010q4q527"},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2004429690","https://openalex.org/W2535603283","https://openalex.org/W2753393364","https://openalex.org/W2796498984","https://openalex.org/W2797171593","https://openalex.org/W2904211511","https://openalex.org/W2911315807","https://openalex.org/W2994405257","https://openalex.org/W3000190958","https://openalex.org/W3040088823","https://openalex.org/W4221005961","https://openalex.org/W4327780924","https://openalex.org/W4367047317","https://openalex.org/W4384345727","https://openalex.org/W4386221199","https://openalex.org/W4387880730","https://openalex.org/W4396735172","https://openalex.org/W4402264089","https://openalex.org/W4402571174","https://openalex.org/W4403888362","https://openalex.org/W4408773834"],"related_works":[],"abstract_inverted_index":{"Dynamic":[0],"analysis":[1,134,177,204],"and":[2,14,35,101,107,130,162,172,192,215],"UI":[3,59,104,149],"automation":[4,60],"are":[5,33],"essential":[6],"for":[7,30],"scalable":[8,202],"detection":[9],"of":[10,27,123,135,144,178,184,189,205],"privacy":[11,128],"leaks,":[12],"vulnerabilities,":[13],"malicious":[15],"code":[16,43],"in":[17,98],"mobile":[18,218],"apps.":[19,139],"While":[20],"the":[21,40,46,94,103,142],"Android":[22],"ecosystem":[23],"offers":[24],"a":[25,70,120,126,131,213],"variety":[26],"tools,":[28],"options":[29],"iOS":[31,58,138,206],"apps":[32,146,180],"limited":[34,187],"require":[36],"either":[37],"access":[38],"to":[39,81,110,158,212],"app":[41,84,112],"source":[42],"or":[44,85],"jailbreaking":[45],"test":[47],"device.":[48],"To":[49,140],"address":[50],"this":[51],"gap,":[52],"we":[53,197],"introduce":[54],"WhisperTest,":[55],"an":[56],"open-source":[57],"library":[61],"that":[62,74,199],"operates":[63],"without":[64],"jailbreaking.":[65],"WhisperTest":[66,92,151,200],"is":[67],"based":[68],"on":[69],"newly":[71],"designed":[72],"approach":[73],"leverages":[75],"Apple's":[76],"Voice":[77],"Control":[78],"accessibility":[79,108],"feature":[80],"interact":[82,163],"with":[83,147,164],"system":[86,96,165],"UIs":[87],"via":[88,105],"text-to-speech.":[89],"During":[90],"interactions,":[91],"monitors":[93],"device":[95],"logs":[97],"real":[99],"time":[100],"scrapes":[102],"screenshots":[106],"audits":[109],"recover":[111],"state":[113],"changes.":[114],"We":[115],"demonstrate":[116],"WhisperTest's":[117],"capabilities":[118],"through":[119],"diverse":[121,148,209],"set":[122],"tasks,":[124,210],"including":[125],"web":[127],"measurement":[129],"fully-automated":[132],"dynamic":[133,203],"200":[136],"child-directed":[137],"overcome":[141],"challenges":[143],"automating":[145],"designs,":[150],"optionally":[152],"integrates":[153],"multimodal":[154],"large":[155],"language":[156],"models":[157],"reason":[159],"about":[160],"context":[161],"permission":[166],"prompts,":[167,171],"consent":[168],"dialogs,":[169],"subscription":[170],"age":[173],"gates.":[174],"Our":[175],"exploratory":[176],"children's":[179],"uncovers":[181],"widespread":[182],"use":[183],"third-party":[185],"tracking,":[186],"recognition":[188],"user":[190],"consent,":[191],"unencrypted":[193],"HTTP":[194],"requests.":[195],"Overall,":[196],"show":[198],"enables":[201],"applications":[207],"across":[208],"contributing":[211],"safer":[214],"more":[216],"transparent":[217],"ecosystem.":[219]},"counts_by_year":[],"updated_date":"2025-11-28T17:07:49.509335","created_date":"2025-11-23T00:00:00"}
