{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:10Z","timestamp":1750221310831,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T00:00:00Z","timestamp":1510790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Information Technology University, Lahore, Pakistan"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,16]]},"DOI":"10.1145\/3136560.3136595","type":"proceedings-article","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T14:02:08Z","timestamp":1510927328000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Study of Static Analysis Tools to Detect Vulnerabilities of Branchless Banking Applications in Developing Countries"],"prefix":"10.1145","author":[{"given":"Fahad","family":"Ibrar","sequence":"first","affiliation":[{"name":"Information Technology University"}]},{"given":"Hamza","family":"Saleem","sequence":"additional","affiliation":[{"name":"Information Technology University"}]},{"given":"Sam","family":"Castle","sequence":"additional","affiliation":[{"name":"The University of Washington"}]},{"given":"Muhammad Zubair","family":"Malik","sequence":"additional","affiliation":[{"name":"Information Technology University"}]}],"member":"320","published-online":{"date-parts":[[2017,11,16]]},"reference":[{"volume-title":"Improving the Security of Android Inter-Component Communication. In IFIP\/IEEE International Symposium on Integrated Network Management.","author":"Cozzette S. Matsumoto O.","key":"e_1_3_2_1_1_1","unstructured":"S. Matsumoto O. Ortlieb J. Alexander J. Betser L. Florer G. Kuenning J. Nilles A. Cozzette, K. Lingel and P. Reiher. 2013. Improving the Security of Android Inter-Component Communication. In IFIP\/IEEE International Symposium on Integrated Network Management."},{"key":"e_1_3_2_1_2_1","unstructured":"ADB backup 2013. Stealing application data using ADB backup. (2013). http:\/\/www.securityfocus.com\/archive\/1\/530288\/30\/0\/threaded"},{"key":"e_1_3_2_1_3_1","unstructured":"addJavascriptInterface 2017. addJavascriptInterface method. (2017). https:\/\/www.securecoding.cert.org\/confluence\/pages\/viewpage.action?pageId=129859614"},{"key":"e_1_3_2_1_4_1","volume-title":"Mass-Market Consumer Fraud: Who is Most Susceptible to Becoming a Victim?","author":"Anderson Keith","year":"2016","unstructured":"Keith Anderson. 2016. Mass-Market Consumer Fraud: Who is Most Susceptible to Becoming a Victim? (2016)."},{"key":"e_1_3_2_1_5_1","unstructured":"Androbugs 2015. Androbugs Framework Project. (2015). https:\/\/github.com\/AndroBugs\/AndroBugs_Framework"},{"key":"e_1_3_2_1_6_1","unstructured":"androidSecurity 2016. Android best security practises. (2016). https:\/\/developer.android.com\/training\/best-security.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Sam Castle Fahad Pervaiz Galen Weld Franziska Roesner and Richard Anderson. 2016. Let's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World (ACM DEV '16). 10.1145\/3001913.3001919","DOI":"10.1145\/3001913.3001919"},{"key":"e_1_3_2_1_8_1","unstructured":"cert 2015. CERT secure android coding standards. (2015). https:\/\/www.securecoding.cert.org\/confluence\/display\/android\/Android+Secure+Coding+Standard"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_10_1","unstructured":"Cryptography algorithms 2016. Cryptography algorithms in Android. (2016). https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/StandardNames.html#Cipher"},{"key":"e_1_3_2_1_11_1","unstructured":"Cryptography tips 2016. Android cryptography security tips. (2016). https:\/\/developer.android.com\/training\/articles\/security-tips.html#Crypto"},{"key":"e_1_3_2_1_12_1","unstructured":"cve 2017. Security vulnerability data source. (2017). http:\/\/www.cvedetails.com\/"},{"volume-title":"The Impact of Copy&Paste on Android Application Security. In IEEE Symposium on Security and Privacy (SP).","author":"Fischer H. Xiao C.","key":"e_1_3_2_1_13_1","unstructured":"H. Xiao C. Stransky Y. Acar M. Backes F. Fischer, K. B\u00c3\u0171ttinger and S. Fahl. 2017. Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_14_1","unstructured":"IPC tips 2016. Android cryptography security tips. (2016). https:\/\/developer.android.com\/training\/articles\/security-tips.html#IPC"},{"key":"e_1_3_2_1_15_1","unstructured":"javadecompilers 2017. Android app decompiler. (2017). http:\/\/www.javadecompilers.com\/apk"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"e_1_3_2_1_17_1","unstructured":"MarketShare 2017. Global Mobile\/Tablet Operating System Market Share. (2017). https:\/\/www.netmarketshare.com"},{"key":"e_1_3_2_1_18_1","unstructured":"MobSF 2017. Mobile Security Framework(MobSF) Project. (2017). https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/555142"},{"key":"e_1_3_2_1_20_1","unstructured":"owasp 2016. OWASP top 10 mobile vulnerabilities. (2016). https:\/\/www.owasp.org\/index.php\/Mobile_Top_10_2016-Top_10"},{"key":"e_1_3_2_1_21_1","unstructured":"QARK 2017. Quick Android Review Kit Project(QARK). (2017). https:\/\/github.com\/linkedin\/qark"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831145"},{"key":"e_1_3_2_1_23_1","unstructured":"SamePolicy 2014. Same Origin Policy Flaws. (2014). http:\/\/securityaffairs.co\/wordpress\/28381\/hacking\/android-flaw-same-origin-policy.html"},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/www.securecoding.cert.org\/confluence\/pages\/viewpage.action?pageId=134807561","author":"TLS","year":"2015","unstructured":"SSL\/TLS Implementation 2015. SSL\/TLS Implementation practises. (2015). https:\/\/www.securecoding.cert.org\/confluence\/pages\/viewpage.action?pageId=134807561"},{"key":"e_1_3_2_1_25_1","unstructured":"veracode 2017. Veracode mobile top 10 list. (2017). https:\/\/www.veracode.com\/directory\/mobileapp-top-10"},{"key":"e_1_3_2_1_26_1","unstructured":"WebViewFileAcess 2016. Android cryptography security tips. (2016). https:\/\/www.securecoding.cert.org\/confluence\/display\/android\/DRD02-J.+Do+not+allow+WebView+to+access+sensitive+local+resource+through+file+scheme"}],"event":{"name":"ICTD '17: Ninth International Conference on Information and Communication Technologies and Development","acronym":"ICTD '17","location":"Lahore Pakistan"},"container-title":["Proceedings of the Ninth International Conference on Information and Communication Technologies and Development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136560.3136595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136560.3136595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:37Z","timestamp":1750212817000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136560.3136595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,16]]},"references-count":26,"alternative-id":["10.1145\/3136560.3136595","10.1145\/3136560"],"URL":"https:\/\/doi.org\/10.1145\/3136560.3136595","relation":{},"subject":[],"published":{"date-parts":[[2017,11,16]]},"assertion":[{"value":"2017-11-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}