{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:01:44Z","timestamp":1770289304941,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2897073.2897082","type":"proceedings-article","created":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T15:20:09Z","timestamp":1469114409000},"page":"255-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Identifying Android inter app communication vulnerabilities using static and dynamic analysis"],"prefix":"10.1145","author":[{"given":"Biniam Fisseha","family":"Demissie","sequence":"first","affiliation":[{"name":"Fondazione Bruno Kessler, Via Sommarive, Trento, Italy"}]},{"given":"Davide","family":"Ghio","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Via Sommarive, Trento, Italy"}]},{"given":"Mariano","family":"Ceccato","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Via Sommarive, Trento, Italy"}]},{"given":"Andrea","family":"Avancini","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Via Sommarive, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.77"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2662413.2662427"},{"key":"e_1_3_2_1_6_1","volume-title":"Ekoparty Security Conference","author":"Borgaonkar R.","year":"2012","unstructured":"R. Borgaonkar . Dirty use of USSD codes in cellular networks . In Ekoparty Security Conference , 2012 . R. Borgaonkar. Dirty use of USSD codes in cellular networks. In Ekoparty Security Conference, 2012."},{"key":"e_1_3_2_1_7_1","volume-title":"Demo: Dirty use of USSD codes, https:\/\/www.youtube.com\/watch?v=q2-0b04hphs. last accessed","author":"Borgaonkar R.","year":"2015","unstructured":"R. Borgaonkar . Demo: Dirty use of USSD codes, https:\/\/www.youtube.com\/watch?v=q2-0b04hphs. last accessed August 2015 . R. Borgaonkar. Demo: Dirty use of USSD codes, https:\/\/www.youtube.com\/watch?v=q2-0b04hphs. last accessed August 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_10_1","volume-title":"9th Usenix Symposium on Operating Systems Design and Implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. gon Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In 9th Usenix Symposium on Operating Systems Design and Implementation , 2010 . W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In 9th Usenix Symposium on Operating Systems Design and Implementation, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_12_1","volume-title":"20th Usenix Security Symposium","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In 20th Usenix Security Symposium , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In 20th Usenix Security Symposium, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Smartphone sales","year":"2014","unstructured":"Gartner. Smartphone sales in 2014 , http:\/\/www.gartner.com\/newsroom\/id\/2996817, last accessed August 2015. Gartner. Smartphone sales in 2014, http:\/\/www.gartner.com\/newsroom\/id\/2996817, last accessed August 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"Systematic detection of capability leaks in stock Android smartphones","author":"Grace M. C.","year":"2012","unstructured":"M. C. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock Android smartphones . In NDSS. The Internet Society , 2012 . M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock Android smartphones. In NDSS. The Internet Society, 2012."},{"key":"e_1_3_2_1_15_1","unstructured":"L. Hattersley. Samsung Galaxy S III secret USSD reset code discovered http:\/\/www.macworld.co.uk\/news\/apple\/samsung-galaxy-s-iii-secret-ussd-reset-code-discovered-3400408\/ 2012.  L. Hattersley. Samsung Galaxy S III secret USSD reset code discovered http:\/\/www.macworld.co.uk\/news\/apple\/samsung-galaxy-s-iii-secret-ussd-reset-code-discovered-3400408\/ 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2663608.2663613"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354410.2355135"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232009"},{"key":"e_1_3_2_1_23_1","first-page":"189","volume-title":"Program Flow Analysis: Theory and Applications","author":"Sharir M.","year":"1981","unstructured":"M. Sharir and A. Pnueli . Program Flow Analysis: Theory and Applications , chapter Two approaches to interprocedural data flow analysis, pages 189 -- 233 . Prentice Hall , 1981 . M. Sharir and A. Pnueli. Program Flow Analysis: Theory and Applications, chapter Two approaches to interprocedural data flow analysis, pages 189--233. Prentice Hall, 1981."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542486"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_26_1","volume-title":"Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications","author":"Zhang M.","year":"2014","unstructured":"M. Zhang and H. Yin . Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications . 2014 . M. Zhang and H. Yin. Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications. 2014."}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\DATC IEEE Computer Society","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the International Conference on Mobile Software Engineering and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897073.2897082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897073.2897082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:47Z","timestamp":1750221527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897073.2897082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":26,"alternative-id":["10.1145\/2897073.2897082","10.1145\/2897073"],"URL":"https:\/\/doi.org\/10.1145\/2897073.2897082","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}