{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:07:36Z","timestamp":1769911656106,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196538","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"133-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Source Attribution of Cryptographic API Misuse in Android Applications"],"prefix":"10.1145","author":[{"given":"Ildar","family":"Muslukhov","sequence":"first","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Yazan","family":"Boshmaf","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, Doha, Qatar"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.52"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60641-5"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS '15)","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the Impact of Touch ID on iPhone Passcodes . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS '15) . 20. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the Impact of Touch ID on iPhone Passcodes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS '15). 20."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of Black Hat Abu Dhabi","author":"Desnos Anthony","year":"2011","unstructured":"Anthony Desnos and Geoffroy Gueguen . 2011 . Android: From reversing to decompilation . Proceedings of Black Hat Abu Dhabi (2011), 77--101. Anthony Desnos and Geoffroy Gueguen. 2011. Android: From reversing to decompilation. Proceedings of Black Hat Abu Dhabi (2011), 77--101."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795291562"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX security symposium","author":"Enck William","unstructured":"William Enck , Damien Octeau , Patrick McDaniel , and Swarat Chaudhuri . 2011. A Study of Android Application Security .. In USENIX security symposium , Vol. Vol. 2 . 2. William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. 2011. A Study of Android Application Security.. In USENIX security symposium, Vol. Vol. 2. 2."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_11_1","volume-title":"Weaknesses in the Key Scheduling Algorithm of RC4. Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography (SAC '01)","author":"Fluhrer Scott R.","unstructured":"Scott R. Fluhrer , Itsik Mantin , and Adi Shamir . 2001. Weaknesses in the Key Scheduling Algorithm of RC4. Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography (SAC '01) . Springer-Verlag , London, UK , UK, 1--24. http:\/\/dl.acm.org\/citation.cfm?id=646557.694759 Scott R. Fluhrer, Itsik Mantin, and Adi Shamir. 2001. Weaknesses in the Key Scheduling Algorithm of RC4. Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography (SAC '01). Springer-Verlag, London, UK, UK, 1--24. http:\/\/dl.acm.org\/citation.cfm?id=646557.694759"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"B. Kaliski. 2000. PKCS #5: Password-Based Cryptography Specification Version 2.0. (2000).  B. Kaliski. 2000. PKCS #5: Password-Based Cryptography Specification Version 2.0. (2000).","DOI":"10.17487\/rfc2898"},{"key":"e_1_3_2_1_13_1","volume-title":"The Soot framework for Java program analysis: a retrospective Cetus Users and Compiler Infastructure Workshop (CETUS","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam , Eric Bodden , Ondrej Lhot\u00e1k , and Laurie Hendren . 2011. The Soot framework for Java program analysis: a retrospective Cetus Users and Compiler Infastructure Workshop (CETUS 2011 ), Vol. Vol. 15 . 35. Patrick Lam, Eric Bodden, Ondrej Lhot\u00e1k, and Laurie Hendren. 2011. The Soot framework for Java program analysis: a retrospective Cetus Users and Compiler Infastructure Workshop (CETUS 2011), Vol. Vol. 15. 35."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637237"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_1_17_1","volume-title":"RFC7465 - Prohibiting RC4 Cipher Suites. (Feb","author":"Popov A.","year":"2015","unstructured":"A. Popov . 2015. RFC7465 - Prohibiting RC4 Cipher Suites. (Feb . 2015 ). https:\/\/tools.ietf.org\/html\/rfc7465 A. Popov. 2015. RFC7465 - Prohibiting RC4 Cipher Suites. (Feb. 2015). https:\/\/tools.ietf.org\/html\/rfc7465"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.22"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196538","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":19,"alternative-id":["10.1145\/3196494.3196538","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196538","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}