{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:32Z","timestamp":1750306232316,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Research Council","award":["DP150102109","DP170103956"],"award-info":[{"award-number":["DP150102109","DP170103956"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029814","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T12:34:59Z","timestamp":1490013299000},"page":"281-288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Ripple"],"prefix":"10.1145","author":[{"given":"Yifei","family":"Zhang","sequence":"first","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Tian","family":"Tan","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Virusshare project. http:\/\/virusshare.com\/.  Virusshare project. http:\/\/virusshare.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884816"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_4_1","first-page":"669","volume":"15","author":"Barros P.","unstructured":"P. Barros , R. Just , S. Millstein , P. Vines , W. Dietl , M. D. Ernst , Static analysis of implicit control flow: Resolving Java reflection and Android intents. In ASE ' 15 , pages 669 -- 679 . P. Barros, R. Just, S. Millstein, P. Vines, W. Dietl, M. D. Ernst, et al. Static analysis of implicit control flow: Resolving Java reflection and Android intents. In ASE '15, pages 669--679.","journal-title":"In ASE '"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676977"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"e_1_3_2_1_7_1","first-page":"377","volume-title":"S&P '16","author":"Fratantonio Y.","unstructured":"Y. Fratantonio , A. Bianchi , W. Robertson , E. Kirda , C. Kruegel , and G. Vigna . Triggerscope: Towards detecting logic bombs in Android applications . In S&P '16 , pages 377 -- 396 . Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel, and G. Vigna. Triggerscope: Towards detecting logic bombs in Android applications. In S&P '16, pages 377--396."},{"volume-title":"NDSS '15","author":"Gordon M. I.","key":"e_1_3_2_1_8_1","unstructured":"M. I. Gordon , D. Kim , J. H. Perkins , L. Gilham , N. Nguyen , and M. C. Rinard . Information flow analysis of Android applications in DroidSafe . In NDSS '15 . M. I. Gordon, D. Kim, J. H. Perkins, L. Gilham, N. Nguyen, and M. C. Rinard. Information flow analysis of Android applications in DroidSafe. In NDSS '15."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44202-9_2"},{"key":"e_1_3_2_1_11_1","first-page":"162","volume-title":"SAS '15","author":"Li Y.","unstructured":"Y. Li , T. Tan , and J. Xue . Effective soundness-guided reflection analysis . In SAS '15 , pages 162 -- 180 . Y. Li, T. Tan, and J. Xue. Effective soundness-guided reflection analysis. In SAS '15, pages 162--180."},{"volume-title":"ECOOP '16","author":"Li Y.","key":"e_1_3_2_1_12_1","unstructured":"Y. Li , T. Tan , Y. Zhang , and J. Xue . Program tailoring: slicing by sequential criteria . In ECOOP '16 . Y. Li, T. Tan, Y. Zhang, and J. Xue. Program tailoring: slicing by sequential criteria. In ECOOP '16."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_11"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37051-9_4"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"ISSTA '12","author":"Milanova A.","unstructured":"A. Milanova , A. Rountev , and B. G. Ryder . Parameterized object sensitivity for points-to and side-effect analyses for Java . ISSTA '12 , pages 1 -- 11 . A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to and side-effect analyses for Java. ISSTA '12, pages 1--11."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837661"},{"key":"e_1_3_2_1_17_1","first-page":"77","volume-title":"ICSE '15","author":"Octeau D.","unstructured":"D. Octeau , D. Luchaup , M. Dering , S. Jha , and P. McDaniel . Composite constant propagation: Application to Android inter-component communication analysis . In ICSE '15 , pages 77 -- 88 . D. Octeau, D. Luchaup, M. Dering, S. Jha, and P. McDaniel. Composite constant propagation: Application to Android inter-component communication analysis. In ICSE '15, pages 77--88."},{"volume-title":"NDSS '16","author":"Rasthofer S.","key":"e_1_3_2_1_18_1","unstructured":"S. Rasthofer , S. Arzt , M. Miltenberger , and E. Bodden . Harvesting runtime values in Android applications that feature anti-analysis techniques . In NDSS '16 . S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden. Harvesting runtime values in Android applications that feature anti-analysis techniques. In NDSS '16."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_20_1","volume-title":"McAfee Labs Website","author":"Ruiz F.","year":"2012","unstructured":"F. Ruiz . \"fakeisntaller\" leads the attack on Android phones . McAfee Labs Website , Oct , 2012 . F. Ruiz. \"fakeisntaller\" leads the attack on Android phones. McAfee Labs Website, Oct, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259050"},{"key":"e_1_3_2_1_22_1","first-page":"485","volume-title":"APLAS '15","author":"Smaragdakis Y.","unstructured":"Y. Smaragdakis , G. Balatsouras , G. Kastrinis , and M. Bravenboer . More sound static handling of Java reflection . In APLAS '15 , pages 485 -- 503 . Y. Smaragdakis, G. Balatsouras, G. Kastrinis, and M. Bravenboer. More sound static handling of Java reflection. In APLAS '15, pages 485--503."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134027"},{"key":"e_1_3_2_1_25_1","first-page":"489","volume-title":"SAS '16","author":"Tan T.","unstructured":"T. Tan , Y. Li , and J. Xue . Making k-object-sensitive pointer analysis more precise with still k-limiting . SAS '16 , pages 489 -- 510 . T. Tan, Y. Li, and J. Xue. Making k-object-sensitive pointer analysis more precise with still k-limiting. SAS '16, pages 489--510."},{"key":"e_1_3_2_1_26_1","volume-title":"Technical Analysis Paper","author":"Tinaztepe E.","year":"2013","unstructured":"E. Tinaztepe , D. Kurt , and A. G\u00fcle\u00e7 . Android obad . Technical Analysis Paper , 2013 . E. Tinaztepe, D. Kurt, and A. G\u00fcle\u00e7. Android obad. Technical Analysis Paper, 2013."},{"key":"e_1_3_2_1_27_1","first-page":"89","volume-title":"ICSE '15","author":"Yang S.","unstructured":"S. Yang , D. Yan , H. Wu , Y. Wang , and A. Rountev . Static control-flow analysis of user-driven callbacks in Android applications . In ICSE '15 , pages 89 -- 99 . S. Yang, D. Yan, H. Wu, Y. Wang, and A. Rountev. Static control-flow analysis of user-driven callbacks in Android applications. In ICSE '15, pages 89--99."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029814"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699105"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:14Z","timestamp":1750220594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029814"}},"subtitle":["Reflection Analysis for Android Apps in Incomplete Information Environments"],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":29,"alternative-id":["10.1145\/3029806.3029814","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029814","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}