{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:19:52Z","timestamp":1729678792483,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/ccnc.2017.7983245","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:37:59Z","timestamp":1500583079000},"page":"854-860","source":"Crossref","is-referenced-by-count":4,"title":["sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps"],"prefix":"10.1109","author":[{"given":"Jyoti","family":"Gajrani","sequence":"first","affiliation":[]},{"given":"Meenakshi","family":"Tripathi","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Laxmi","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Gaur","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1145\/2814228.2814229","article-title":"Towards secure integration of cryptographic software","author":"arzt","year":"2015","journal-title":"2015 ACM International Symposium on New Ideas New Paradigms and Reflections on Programming and Software (Onward!)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1145\/2544173.2509549","article-title":"Targeted and depth-first exploration for systematic testing of android apps","volume":"48","author":"azim","year":"0","journal-title":"ACM SIGPLAN Notices"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","article-title":"Biclique cryptanalysis of the full aes","author":"bogdanov","year":"2011","journal-title":"Advances in Cryptology - ASIACRYPT 2011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0250-0"},{"year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.22"},{"journal-title":"Android user interface testing with Robotium","year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref9"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41098-7_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"ref21","article-title":"Recommendation for block cipher modes of operation. methods and techniques","author":"dworkin","year":"2001","journal-title":"Technical report DTIC Document"},{"journal-title":"Smv-hunter Large scale automated detection of ssl\/tls man-in-the-middle vulnerabilities in android apps","year":"2014","author":"sounthiraraj","key":"ref24"},{"journal-title":"A Survivor's Guide to Java Program Analysis with Soot","year":"2008","author":"einarsson","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"}],"event":{"name":"2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2017,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2017,1,11]]}},"container-title":["2017 14th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976073\/7983067\/07983245.pdf?arnumber=7983245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:39:37Z","timestamp":1569908377000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7983245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2017.7983245","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}