{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:06Z","timestamp":1750306086428,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502170"],"award-info":[{"award-number":["61502170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Pujiang Program","award":["16PJ1430800"],"award-info":[{"award-number":["16PJ1430800"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3117764","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"842-847","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["When program analysis meets mobile security: an industrial study of misusing Android internet sockets"],"prefix":"10.1145","author":[{"given":"Wenqi","family":"Bu","sequence":"first","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"New York University Shanghai, China \/ East China Normal University, China"}]},{"given":"Lihua","family":"Xu","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"n.n., n.n."}]},{"given":"Zhushou","family":"Tang","sequence":"additional","affiliation":[{"name":"Pwnzen Infotech, China"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"unstructured":"2015. Baidu Wormhole Vulnerability. (2015).  2015. Baidu Wormhole Vulnerability. (2015).","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"2017 from http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/setting-therecord-straight-on-moplus-sdk-and-the-wormhole-vulnerability\/","author":"Retrieved May","year":"2016","unstructured":"Retrieved May 10 , 2017 from http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/setting-therecord-straight-on-moplus-sdk-and-the-wormhole-vulnerability\/ 2016 . PANGU Wormable Browser. (2016). Retrieved May 7, 2017 from http: \/\/blog.pangu.io\/wormable-browser\/ 2016. QuestMobile Top Chinese Apps Rankings. (2016). Retrieved May 7, 2017 from http:\/\/www.questmobile.com.cn\/blog\/en\/blog_64.html 2017. Androguard. (2017). Retrieved May 7, 2017 from https:\/\/github.com\/ androguard\/androguard 2017. Janus. (2017). Retrieved May 10, 2017 from http:\/\/cloud.appscan.io\/ 2017. NanoHTTPD. (2017). Retrieved May 7, 2017 from https:\/\/github.com\/ NanoHttpd\/nanohttpd Retrieved May 10, 2017 from http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/setting-therecord-straight-on-moplus-sdk-and-the-wormhole-vulnerability\/ 2016. PANGU Wormable Browser. (2016). Retrieved May 7, 2017 from http: \/\/blog.pangu.io\/wormable-browser\/ 2016. QuestMobile Top Chinese Apps Rankings. (2016). Retrieved May 7, 2017 from http:\/\/www.questmobile.com.cn\/blog\/en\/blog_64.html 2017. Androguard. (2017). Retrieved May 7, 2017 from https:\/\/github.com\/ androguard\/androguard 2017. Janus. (2017). Retrieved May 10, 2017 from http:\/\/cloud.appscan.io\/ 2017. NanoHTTPD. (2017). Retrieved May 7, 2017 from https:\/\/github.com\/ NanoHttpd\/nanohttpd"},{"key":"e_1_3_2_1_3_1","volume-title":"Damien Octeau, and Patrick McDaniel.","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt , Siegfried Rasthofer , Christian Fritz , Eric Bodden , Alexandre Bartel , Jacques Klein , Yves Le Traon , Damien Octeau, and Patrick McDaniel. 2014 . Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2594291.2594299"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_6_1","volume-title":"Landon P. Cox, Jaeyeon Jung, Patrick Mcdaniel, and Anmol N. Sheth.","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Seungyeop Han , Vasant Tendulkar , Byung Gon Chun , Landon P. Cox, Jaeyeon Jung, Patrick Mcdaniel, and Anmol N. Sheth. 2010 . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. OSDI. 393\u2013407. William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick Mcdaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. OSDI. 393\u2013407."},{"key":"e_1_3_2_1_7_1","volume-title":"Yikai Lin, Chao Kong, and Z. Morley Mao.","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia , Qi Alfred Chen , Yikai Lin, Chao Kong, and Z. Morley Mao. 2017 . Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications. In Proc. EuroS &amp;P. Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, and Z. Morley Mao. 2017. Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications. In Proc. EuroS&amp;P."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/2818754.2818791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2976749.2978297"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2660267.2660357"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ESEC\/FSE'17","name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3117764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3117764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:17Z","timestamp":1750217417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3117764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":10,"alternative-id":["10.1145\/3106237.3117764","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3117764","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}