{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:09:09Z","timestamp":1743080949071,"version":"3.40.3"},"publisher-location":"Cham","reference-count":94,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031753794"},{"type":"electronic","value":"9783031753800"}],"license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75380-0_8","type":"book-chapter","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T08:29:02Z","timestamp":1730190542000},"page":"124-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Challenges of\u00a0Multilingual Program Specification and\u00a0Analysis"],"prefix":"10.1007","author":[{"given":"Carlo A.","family":"Furia","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Tiwari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abidi, M., Khomh, F.: Towards the definition of patterns and code smells for multi-language systems. In: EuroPLoP \u201920: European Conference on Pattern Languages of Programs 2020, Virtual Event, Germany, 1-4 July, 2020, pp. 37:1\u201337:13. ACM (2020)","DOI":"10.1145\/3424771.3424792"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abidi, M., Rahman, Md.S., Openja, M., Khomh, F.: Are multi-language design smells fault-prone? an empirical study. ACM Trans. Softw. Eng. Methodol. 30(3), 29:1\u201329:56 (2021)","DOI":"10.1145\/3432690"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Abidi, M., Rahman, Md.S., Openja, M., Khomh, F.: Multi-language design smells: a backstage perspective. Empir. Softw. Eng. 27(5), 116 (2022)","DOI":"10.1007\/s10664-022-10161-2"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Afonso, V.M., et al.: Going native: using a large-scale analysis of Android apps to create a practical native-code sandboxing policy. In: Network and Distributed System Security Symposium (2016)","DOI":"10.14722\/ndss.2016.23384"},{"key":"8_CR5","unstructured":"Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Pearson, 2nd edn. (2011)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.cose.2016.11.011","volume":"65","author":"S Alam","year":"2017","unstructured":"Alam, S., Zhengyang, Q., Riley, R., Chen, Y., Rastogi, V.: DroidNative: automating and optimizing detection of Android native code malware variants. Comput. Secur. 65, 230\u2013246 (2017)","journal-title":"Comput. Secur."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Amadini, R.: A survey on string constraint solving. ACM Comput. Surv. 55(2), 16:1\u201316:38 (2023)","DOI":"10.1145\/3487893"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Appel, A.W.: Modern compiler implementation, 2nd edn. Cambridge University Press (2002)","DOI":"10.1017\/CBO9780511811432"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Bae, S., Lee, S., Ryu, S.: Towards understanding and reasoning about Android interoperations. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 223\u2013233 (2019)","DOI":"10.1109\/ICSE.2019.00038"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-319-30806-7_5","volume-title":"Engineering Secure Software and Systems","author":"AD Brucker","year":"2016","unstructured":"Brucker, A.D., Herzberg, M.: On the static analysis of hybrid mobile apps. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 72\u201388. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_5"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11537328_2","volume-title":"Model Checking Software","author":"C Cadar","year":"2005","unstructured":"Cadar, C., Engler, D.: Execution generated test cases: how to make systems code crash itself. In: Godefroid, P. (ed.) SPIN 2005. LNCS, vol. 3639, pp. 2\u201323. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11537328_2"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-05149-9_9","volume-title":"Information Security Applications","author":"E Chin","year":"2014","unstructured":"Chin, E., Wagner, D.: Bifocals: analyzing webview vulnerabilities in android applications. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 138\u2013159. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_9"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-03359-9_2","volume-title":"Theorem Proving in Higher Order Logics","author":"E Cohen","year":"2009","unstructured":"Cohen, E., et al.: VCC: a practical system for verifying concurrent C. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 23\u201342. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03359-9_2"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-23506-6_13","volume-title":"Correct System Design","author":"FS de Boer","year":"2015","unstructured":"de Boer, F.S., de Gouw, S.: Being and change: reasoning about invariance. In: Meyer, R., Platzer, A., Wehrheim, H. (eds.) Correct System Design. LNCS, vol. 9360, pp. 191\u2013204. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23506-6_13"},{"key":"8_CR15","unstructured":"Felleisen, M., Findler, R.B., Flatt, M.: Semantics Engineering with PLT Redex. MIT Press (2009)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Fourtounis, G., Triantafyllou, L., Smaragdakis, Y.: Identifying Java calls in native code via binary scanning. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2020, pp. 388\u2013400 (2020). Association for Computing Machinery, New York","DOI":"10.1145\/3395363.3397368"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Fratantonio, Y., Bianchi, A., Robertson, W., Kirda, E., Kruegel, C., Vigna, G.: Triggerscope: towards detecting logic bombs in Android applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 377\u2013396, May 2016","DOI":"10.1109\/SP.2016.30"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-22110-1_1","volume-title":"Computer Aided Verification","author":"V Ganesh","year":"2011","unstructured":"Ganesh, V., Kie\u017cun, A., Artzi, S., Guo, P.J., Hooimeijer, P., Ernst, M.: HAMPI: a string solver for testing, analysis and vulnerability detection. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 1\u201319. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_1"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: Sarkar, V., Hall, M.W. (eds.) Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 213\u2013223. ACM (2005)","DOI":"10.1145\/1065010.1065036"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Haller, P., Axelsson, L.: Quantifying and explaining immutability in Scala. In: Vasconcelos, V.T., Haller, P. (eds.) Proceedings Tenth Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, PLACES@ETAPS 2017, Uppsala, Sweden, 29th April 2017, vol. 246. EPTCS, pp. 21\u201327 (2017)","DOI":"10.4204\/EPTCS.246.0"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Hidhaya, S.F., Geetha, A., Kumar, B.N., Sravanth, L.V., Habeeb, A.: Supplementary event-listener injection attack in smart phones. KSII Trans. Internet Inf. Syst. (TIIS) 9(10), 4191\u20134203 (2015)","DOI":"10.3837\/tiis.2015.10.024"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Hu, J., Wei, L., Liu, Y., Cheung, S.-C.: wTest: WebView-oriented testing for Android applications. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, pp. 992\u20131004. Association for Computing Machinery, New York (2023)","DOI":"10.1145\/3597926.3598112"},{"issue":"4","key":"8_CR23","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1109\/TSE.2024.3373239","volume":"50","author":"S Hwang","year":"2024","unstructured":"Hwang, S., Lee, S., Ryu, S.: An empirical study of JVMs\u2019 behaviors on erroneous JNI interoperations. IEEE Trans. Software Eng. 50(4), 979\u2013994 (2024)","journal-title":"IEEE Trans. Software Eng."},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-20398-5_4","volume-title":"NASA Formal Methods","author":"B Jacobs","year":"2011","unstructured":"Jacobs, B., Smans, J., Philippaerts, P., Vogels, F., Penninckx, W., Piessens, F.: VeriFast: a powerful, sound, predictable, fast verifier for C and Java. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 41\u201355. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_4"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Kreindl, J., Bonetta, D., M\u00f6ssenb\u00f6ck, H.: Towards efficient, multi-language dynamic taint analysis. In: Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, MPLR 2019, pp. 85\u201394. Association for Computing Machinery, New York (2019)","DOI":"10.1145\/3357390.3361028"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Kumar, R., Myreen, M.O., Norrish, M., Owens, S.: CakeML: a verified implementation of ML. In: The 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2014, San Diego, CA, USA, January 20-21, 2014, pp. 179\u2013192. ACM (2014)","DOI":"10.1145\/2535838.2535841"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Lancia, J.: Detecting fault injection vulnerabilities in binaries with symbolic execution. In: 14th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2022, Ploiesti, Romania, June 30 - July 1, 2022, pp. 1\u20138. IEEE (2022)","DOI":"10.1109\/ECAI54874.2022.9847500"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Lee, S., Dolby, J., Ryu, S.: HybriDroid: static analysis framework for Android hybrid applications. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2016, pp. 250\u2013261. Association for Computing Machinery, New York (2016)","DOI":"10.1145\/2970276.2970368"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Lee, S., Lee, H., Ryu, S.: Broadening horizons of multilingual static analysis: Semantic summary extraction from C code for JNI program analysis. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201920, pp. 127\u2013137. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3324884.3416558"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-3-540-24851-4_22","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"KRM Leino","year":"2004","unstructured":"Leino, K.R.M., M\u00fcller, P.: Object invariants in dynamic contexts. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol. 3086, pp. 491\u2013515. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24851-4_22"},{"key":"8_CR31","unstructured":"Li, W., Ming, J., Luo, X., Cai, H.: PolyCruise: a cross-Language dynamic information flow analysis. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 2513\u20132530, Boston, MA, August 2022. USENIX Association"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-34005-5_3","volume-title":"Rewriting Logic and Its Applications","author":"D Lucanu","year":"2012","unstructured":"Lucanu, D., \u015eerb\u0103nu\u0163\u0103, T.F., Ro\u015fu, G.: $$\\mathbb{K}$$ framework distilled. In: Dur\u00e1n, F. (ed.) WRLA 2012. LNCS, vol. 7571, pp. 31\u201353. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34005-5_3"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Luo, T., Hao, H., Du, W., Wang, Y., Yin, H.: Attacks on webview in the android system. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 343\u2013352. Association for Computing Machinery, New York (2011)","DOI":"10.1145\/2076732.2076781"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Mandal, A.K., Cortesi, A., Ferrara, P., Panarotto, F., Spoto, F.: Vulnerability analysis of Android auto infotainment apps. In: Proceedings of the 15th ACM International Conference on Computing Frontiers, pp. 183\u2013190. ACM (2018)","DOI":"10.1145\/3203217.3203278"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-030-88806-0_16","volume-title":"Static Analysis","author":"R Monat","year":"2021","unstructured":"Monat, R., Ouadjaout, A., Min\u00e9, A.: A multilanguage static analysis of python programs with native C extensions. In: Dr\u0103goi, C., Mukherjee, S., Namjoshi, K. (eds.) SAS 2021. LNCS, vol. 12913, pp. 323\u2013345. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88806-0_16"},{"key":"8_CR36","unstructured":"Mutchler, P., Doup\u00e9, A., Mitchell, J., Kruegel, C., Vigna, G.: A large-scale study of mobile web app security. In: Proceedings of the Mobile Security Technologies Workshop (MoST), vol.\u00a050 (2015)"},{"key":"8_CR37","unstructured":"Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: NDSS, vol. 5, pp. 3\u20134. Citeseer (2005)"},{"key":"8_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-13953-6_5","volume-title":"Objects, Models, Components, Patterns","author":"M Nordio","year":"2010","unstructured":"Nordio, M., Calcagno, C., Meyer, B., M\u00fcller, P., Tschannen, J.: Reasoning about function objects. In: Vitek, J. (ed.) TOOLS 2010. LNCS, vol. 6141, pp. 79\u201396. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13953-6_5"},{"key":"8_CR39","unstructured":"Odersky, M., Spoon, L., Venners, B.: Programming in Scala. Artima, 5th edn. (2021)"},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Pankratius, V., Schmidt, F., Garret\u00f3n, G.: Combining functional and imperative programming for multicore software: an empirical study evaluating Scala and Java. In: 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland, pp. 123\u2013133. IEEE Computer Society (2012)","DOI":"10.1109\/ICSE.2012.6227200"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Parkinson, M.J., Bierman, G.M.: Separation logic and abstraction. In: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005, pp. 247\u2013258. ACM (2005)","DOI":"10.1145\/1040305.1040326"},{"key":"8_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/978-3-319-06410-9_35","volume-title":"FM 2014: Formal Methods","author":"N Polikarpova","year":"2014","unstructured":"Polikarpova, N., Tschannen, J., Furia, C.A., Meyer, B.: Flexible invariants through semantic collaboration. In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol. 8442, pp. 514\u2013530. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06410-9_35"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Pradel, M., Schuh, P., Sen, K.: Typedevil: dynamic type inconsistency analysis for JavaScript. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 314\u2013324 (2015)","DOI":"10.1109\/ICSE.2015.51"},{"key":"8_CR44","unstructured":"Pradel, M., Sen, K.: The good, the bad, and the ugly: an empirical study of implicit type conversions in JavaScript. In: 29th European Conference on Object-Oriented Programming (ECOOP 2015). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2015)"},{"key":"8_CR45","unstructured":"Prakash, J., Tiwari, A., Hammer, C.: Unifying pointer analyses for polyglot inter-operations through summary specialization (2023)"},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Qian, C., Luo, X., Shao, Y., Chan, A.T.S.: On tracking information flows through JNI in Android applications. In: 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 180\u2013191 (2014)","DOI":"10.1109\/DSN.2014.30"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Rizzo, C., Cavallaro, L., Kinder, J.: BabelView: evaluating the impact of code injection attacks in mobile webviews. 11050, pp. 25\u201346 (2018)","DOI":"10.1007\/978-3-030-00470-5_2"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Rytz, L., Amin, N., Odersky, M.: A flow-insensitive, modular effect system for purity. In: Proceedings of the 15th Workshop on Formal Techniques for Java-like Programs, FTfJP 2013, Montpellier, France, July 1, 2013, pp. 4:1\u20134:7. ACM (2013)","DOI":"10.1145\/2489804.2489808"},{"key":"8_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-31057-7_13","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"L Rytz","year":"2012","unstructured":"Rytz, L., Odersky, M., Haller, P.: Lightweight polymorphic effects. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol. 7313, pp. 258\u2013282. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31057-7_13"},{"issue":"1 &2","key":"8_CR50","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0304-3975(96)00072-2","volume":"167","author":"S Sagiv","year":"1996","unstructured":"Sagiv, S., Reps, T.W., Horwitz, S.: Precise interprocedural dataflow analysis with applications to constant propagation. Theor. Comput. Sci. 167(1 &2), 131\u2013170 (1996)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR51","unstructured":"Samhi, J., et al.: A step towards Android code unification for enhanced static analysis, Jucify (2021)"},{"key":"8_CR52","doi-asserted-by":"crossref","unstructured":"Shehab, M., AlJarrah, A.: Reducing attack surface on cordova-based hybrid mobile apps. In: Proceedings of the 2Nd International Workshop on Mobile Development Lifecycle. ACM, New York (2014)","DOI":"10.1145\/2688412.2688417"},{"key":"8_CR53","doi-asserted-by":"crossref","unstructured":"Summers, A.J., Drossopoulou, S., M\u00fcller, P.: The need for flexible object invariants. In: International Workshop on Aliasing, Confinement and Ownership in object-oriented programming (IWACO) (2009)","DOI":"10.1145\/1562154.1562160"},{"key":"8_CR54","doi-asserted-by":"crossref","unstructured":"Sun, K., Ryu, S.: Analysis of JavaScript programs: challenges and research trends. ACM Comput. Surv. 50(4), August 2017","DOI":"10.1145\/3106741"},{"key":"8_CR55","doi-asserted-by":"crossref","unstructured":"Sun, M., Tan, G.: NativeGuard: protecting Android applications from third-party native libraries. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec 2014, pp. 165\u2013176. Association for Computing Machinery, New York (2014)","DOI":"10.1145\/2627393.2627396"},{"key":"8_CR56","doi-asserted-by":"crossref","unstructured":"Sun, M., Wei, T., Lui, J.C.S.: Taintart: a practical multi-level information-flow tracking system for Android runtime. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201916, pp. 331\u2013342. Association for Computing Machinery, New York (2016)","DOI":"10.1145\/2976749.2978343"},{"key":"8_CR57","unstructured":"Tan, G., Croft, J.: An empirical security study of the native code in the JDK. In: van Oorschot, P.C. (ed.) Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA, pp. 365\u2013378. USENIX Association (2008)"},{"key":"8_CR58","doi-asserted-by":"crossref","unstructured":"Tan, Y.K., Myreen, M.O., Kumar, R., Fox, A.C.J., Owens, S., Norrish, M.: The verified CakeML compiler backend. J. Funct. Program. 29, e2 (2019)","DOI":"10.1017\/S0956796818000229"},{"key":"8_CR59","doi-asserted-by":"crossref","unstructured":"Thom\u00e9, J., Shar, L.K., Bianculli, D., Briand, L.C.: Search-driven string constraint solving for vulnerability detection. In: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017, pp. 198\u2013208. IEEE\/ACM (2017)","DOI":"10.1109\/ICSE.2017.26"},{"key":"8_CR60","doi-asserted-by":"crossref","unstructured":"Tiwari, A., Prakash, J., Gro\u00df, S., Hammer, C.: LUDroid: a large scale analysis of Android-web hybridization. In: 2019 IEEE 19th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 256\u2013267. IEEE Computer Society, Los Alamitos, October 2019","DOI":"10.1109\/SCAM.2019.00036"},{"key":"8_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110775","volume":"170","author":"A Tiwari","year":"2020","unstructured":"Tiwari, A., Prakash, J., Gro\u00df, S., Hammer, C.: A large scale analysis of Android-web hybridization. J. Syst. Softw. 170, 110775 (2020)","journal-title":"J. Syst. Softw."},{"key":"8_CR62","doi-asserted-by":"crossref","unstructured":"Tiwari, A., Prakash, J., Hammer, C.: Demand-driven information flow analysis of WebView in Android hybrid apps. In: 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, Florence, Italy, October 9-12, 2023, pp. 415\u2013426. IEEE (2023)","DOI":"10.1109\/ISSRE59848.2023.00020"},{"key":"8_CR63","doi-asserted-by":"crossref","unstructured":"Tiwari, A., Prakash, J., Rahimov, A., Hammer, C.: Understanding the impact of fingerprinting in Android hybrid apps. In: 2023 IEEE\/ACM 10th International Conference on Mobile Software Engineering and Systems (MOBILESoft), pp. 28\u201339 (2023)","DOI":"10.1109\/MOBILSoft59058.2023.00011"},{"key":"8_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-642-39038-8_20","volume-title":"ECOOP 2013 \u2013 Object-Oriented Programming","author":"M Trudel","year":"2013","unstructured":"Trudel, M., Furia, C.A., Nordio, M., Meyer, B.: Really automatic scalable object-oriented reengineering. In: Castagna, G. (ed.) ECOOP 2013. LNCS, vol. 7920, pp. 477\u2013501. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39038-8_20"},{"key":"8_CR65","unstructured":"Turcotte, A., Arteca, E., Richards, G.: Reasoning about foreign function interfaces without modelling the foreign language. In: Donaldson, A.F. (ed.) 33rd European Conference on Object-Oriented Programming (ECOOP 2019), vol. 134. Leibniz International Proceedings in Informatics (LIPIcs), pp. 16:1\u201316:32, Dagstuhl, Germany (2019). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik"},{"key":"8_CR66","doi-asserted-by":"crossref","unstructured":"Wei, F., Lin, X., Ou, X., Chen, T., Zhang, X.: JN-SAF: precise and efficient NDK\/JNI-aware inter-language static analysis framework for security vetting of Android applications with native code. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, pp. 1137\u20131150. Association for Computing Machinery, New York (2018)","DOI":"10.1145\/3243734.3243835"},{"key":"8_CR67","doi-asserted-by":"crossref","unstructured":"Wolff, F., B\u00edl\u00fd, A., Matheja, C., M\u00fcller, P., Summers, A.J.: Modular specification and verification of closures in Rust. Proc. ACM Program. Lang. 5(OOPSLA), pp. 1\u201329 (2021)","DOI":"10.1145\/3485522"},{"key":"8_CR68","doi-asserted-by":"crossref","unstructured":"Yang, G., Hang, J., Gu, G., Mendoza, A.: Study and mitigation of origin stripping vulnerabilities in hybrid-postmessage enabled mobile applications. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 742\u2013755. IEEE (2018)","DOI":"10.1109\/SP.2018.00043"},{"key":"8_CR69","doi-asserted-by":"crossref","unstructured":"Youn, D., Lee, S., Ryu, S.: Declarative static analysis for multilingual programs using CodeQL. Softw. Practice Exp. 53(7), 1472\u20131495 (2023)","DOI":"10.1002\/spe.3199"},{"key":"8_CR70","unstructured":"Xiaohan Zhang, X., et al.: An empirical study of web resource manipulation in real-world mobile applications. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1183\u20131198. USENIX Association, Baltimore, August 2018"},{"key":"8_CR71","unstructured":"An example of URL reference: https:\/\/bugcounting.net"},{"key":"8_CR72","unstructured":"https:\/\/developer.android.com\/reference\/android\/webkit\/WebView"},{"key":"8_CR73","unstructured":"https:\/\/developer.android.com\/reference\/android\/webkit\/JavascriptInterface"},{"key":"8_CR74","unstructured":"Mobile Developer Survey https:\/\/ionicframework.com\/survey\/2017#trends"},{"key":"8_CR75","unstructured":"https:\/\/developer.android.com\/develop\/ui\/views\/layout\/webapps\/webview#BindingJavaScript"},{"key":"8_CR76","unstructured":"https:\/\/github.com\/gustavogenovese\/androidSamples\/blob\/036c1c6f9bc35392d2c18d6876073b13c31a47b8\/webview\/src\/main\/java\/com\/gustavogenovese\/webview\/SynchronousJavascriptInterface.java#L41"},{"key":"8_CR77","unstructured":"https:\/\/apkcombo.com\/ko\/mas-que-panes-y-peces\/com.a2stacks.apps.app57191abb7ab09\/"},{"key":"8_CR78","unstructured":"https:\/\/apkcombo.com\/zh\/sally-s-makeup-salon\/com.nuttyapps.sally.makeup.salon\/"},{"key":"8_CR79","unstructured":"https:\/\/www.9apps.com\/ar\/android-apps\/Social-network-circus\/"},{"key":"8_CR80","unstructured":"https:\/\/docs.scala-lang.org\/overviews\/collections-2.13\/conversions-between-java-and-scala-collections.html"},{"key":"8_CR81","unstructured":"https:\/\/github.com\/scala\/scala\/blob\/06a7509e3a9083793038bf4449281491a8614eb0\/src\/library\/scala\/collection\/convert\/JavaCollectionWrappers.scala#L138"},{"key":"8_CR82","unstructured":"https:\/\/www.scala-lang.org\/api\/2.12.6\/scala\/collection\/mutable\/AbstractBuffer.html"},{"key":"8_CR83","unstructured":"https:\/\/docs.oracle.com\/en\/java\/javase\/17\/docs\/api\/java.base\/java\/util\/List.html"},{"key":"8_CR84","unstructured":"https:\/\/docs.oracle.com\/en\/java\/javase\/11\/docs\/api\/java.base\/java\/util\/List.html#of(E...)"},{"key":"8_CR85","unstructured":"https:\/\/blog.jetbrains.com\/idea\/2018\/01\/fumigating-the-idea-ultimate-code-using-dataflow-analysis\/"},{"key":"8_CR86","unstructured":"https:\/\/www.jetbrains.com\/help\/idea\/analyzing-data-flow.html#analyze-stack-traces"},{"key":"8_CR87","unstructured":"https:\/\/blog.jetbrains.com\/scala\/2021\/10\/28\/dataflow-analysis-for-scala\/"},{"key":"8_CR88","unstructured":"https:\/\/blog.jetbrains.com\/scala\/2021\/10\/28\/dataflow-analysis-for-scala\/#interprocedural-analysis"},{"key":"8_CR89","unstructured":"https:\/\/github.com\/mkowsiak\/jnicookbook\/"},{"key":"8_CR90","unstructured":"https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/jni\/spec\/types.html"},{"key":"8_CR91","unstructured":"https:\/\/github.com\/arguslab\/NativeFlowBench\/tree\/master\/icc_javatonative"},{"key":"8_CR92","unstructured":"https:\/\/github.com\/arguslab\/NativeFlowBench\/tree\/master\/icc_nativetojava"},{"key":"8_CR93","unstructured":"The K Semantic Framework https:\/\/kframework.org\/"},{"key":"8_CR94","unstructured":"PLT Redex https:\/\/redex.racket-lang.org\/"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75380-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T08:51:39Z","timestamp":1730191899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75380-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"ISBN":["9783031753794","9783031753800"],"references-count":94,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75380-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"30 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isola-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}