{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:27:44Z","timestamp":1730294864144,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/scam.2017.24","type":"proceedings-article","created":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:49:21Z","timestamp":1509670161000},"page":"121-130","source":"Crossref","is-referenced-by-count":35,"title":["Security Smells in Android"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Ghafari","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Gadient","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Nierstrasz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786816"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983981"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052990"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994474"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978297"},{"key":"ref30","first-page":"1","article-title":"A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software","author":"sadeghi","year":"2016","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.23"},{"key":"ref36","first-page":"559","article-title":"Jekyll on ios: When benign apps become evil","author":"wang","year":"2013","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516727"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.494"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_30"},{"key":"ref40","article-title":"Seccomp: Towards practically defending against component hijacking in android applications","author":"wu","year":"2016","journal-title":"CoRR abs\/1609 03322"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23082"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818042"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714638"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660275"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.06.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2814228.2814229"},{"key":"ref27","first-page":"1","article-title":"Danger is my middle name: Experimenting with ssl vulnerabilities in android apps","volume":"15","author":"onwuzurike","year":"2015","journal-title":"Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks WiSec ' ‘15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref7","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale","author":"chen","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.52"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"year":"0","key":"ref1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23049"},{"key":"ref45","first-page":"401","author":"zhang","year":"2016","journal-title":"Hey You Get Off of My Image Detecting Data Residue in Android Images"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590313"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2685387"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23061"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.60"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2011.6070393"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631949"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2963145"},{"key":"ref26","article-title":"To pin or not to pin-helping app developers bullet proof their tls connections","author":"oltrogge","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref43","article-title":"Techniques and tools for analyzing and understanding android applications","author":"xu","year":"2013","journal-title":"Dissertation"},{"key":"ref25","article-title":"You are not your developer, either:A research agenda for usable security and privacy research beyond end users","author":"nd","year":"0","journal-title":"IEEE SecDev 2016 2016"}],"event":{"name":"2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2017,9,17]]},"location":"Shanghai","end":{"date-parts":[[2017,9,18]]}},"container-title":["2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8089459\/8090123\/08090145.pdf?arnumber=8090145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T16:50:41Z","timestamp":1513615841000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8090145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/scam.2017.24","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}