{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:25:56Z","timestamp":1725719156404},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocom.2016.7841785","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T15:56:26Z","timestamp":1486482986000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps"],"prefix":"10.1109","author":[{"given":"Xuetao","family":"Wei","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Kyu Hyung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Ming-Chun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"System quality requirements engineering (square): Case study on asset management system","author":"chen","year":"2004","journal-title":"Technical Report"},{"key":"ref11","article-title":"System quality requirements engineering (square): Case study on asset management system, phase ii","author":"gordon","year":"2005","journal-title":"Technical Report"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1137627.1137634"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"year":"2015","key":"ref15","article-title":"HTTPS Everywhere"},{"year":"0","key":"ref16"},{"key":"ref17","article-title":"Vulnerabilities as blind spots in developers heuristic-based decision-making processes","author":"cappos","year":"2014","journal-title":"ACM NSPW"},{"year":"0","key":"ref18","article-title":"OpenSSL"},{"key":"ref19","article-title":"A tangled mess: The android root certificate stores","author":"vallina-rodriguez","year":"2014","journal-title":"ACM CoNeXT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref3","article-title":"A study of android application security","author":"enck","year":"2011","journal-title":"Usenix Security"},{"key":"ref6","article-title":"The most dangerous code in the world: Validating ssl certificates in non-browser software","author":"anubhai","year":"2012","journal-title":"ACM CCS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516655"},{"key":"ref8","article-title":"An application package configuration approach to mitigating android ssl vulnerabilities","author":"tendulkar","year":"2014","journal-title":"Most"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23205"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"year":"0","key":"ref9"},{"journal-title":"PMD 5 2 1","year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"journal-title":"PMD-Eclipse","year":"0","key":"ref21"},{"journal-title":"Stack Overflow SSL-Untrusted Certificate Error","year":"0","key":"ref23"}],"event":{"name":"GLOBECOM 2016 - 2016 IEEE Global Communications Conference","start":{"date-parts":[[2016,12,4]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840067\/7841475\/07841785.pdf?arnumber=7841785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:28:02Z","timestamp":1488389282000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7841785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/glocom.2016.7841785","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}