{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:47Z","timestamp":1775912807614,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Technology Commission of Shanghai Municipality Grant","award":["18511103802"],"award-info":[{"award-number":["18511103802"]}]},{"name":"NTU Research Grant","award":["NGF-2017-03-033"],"award-info":[{"award-number":["NGF-2017-03-033"]}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["CRDCG2017-S04"],"award-info":[{"award-number":["CRDCG2017-S04"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502170,61572197,61632005"],"award-info":[{"award-number":["61502170,61572197,61632005"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3275523","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"797-802","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Are mobile banking apps secure? what can be improved?"],"prefix":"10.1145","author":[{"given":"Sen","family":"Chen","sequence":"first","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Ting","family":"Su","sequence":"additional","affiliation":[{"name":"East China Normal University, China \/ Nanyang Technological University, Singapore"}]},{"given":"Lingling","family":"Fan","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China \/ Nanyang Technological University, Singapore"}]},{"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"Macquarie University, Australia"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Lihua","family":"Xu","sequence":"additional","affiliation":[{"name":"East China Normal University, China \/ New York University Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Sen Chen Guozhu Meng Ting Su Lingling Fan Yinxing Xue Yang Liu Lihua Xu Minhui Xue Bo Li and Shuang Hao. 2018.  Sen Chen Guozhu Meng Ting Su Lingling Fan Yinxing Xue Yang Liu Lihua Xu Minhui Xue Bo Li and Shuang Hao. 2018."},{"key":"e_1_3_2_1_2_1","unstructured":"AUSERA\n\n  \n  : Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. arXiv preprint arXiv:1805.05236 (2018).  AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. arXiv preprint arXiv:1805.05236 (2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238170"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180222"},{"key":"e_1_3_2_1_5_1","unstructured":"Bradley Reaves Nolen Scaife Adam M Bates Patrick Traynor and Kevin RB Butler. 2015. Mo (bile) Money Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World. In USENIX Security. 17\u201332.   Bradley Reaves Nolen Scaife Adam M Bates Patrick Traynor and Kevin RB Butler. 2015. Mo (bile) Money Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World. In USENIX Security. 17\u201332."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"key":"e_1_3_2_1_7_1","unstructured":"Lei Xue Xiapu Luo Le Yu Shuai Wang and Dinghao Wu. 2017.  Lei Xue Xiapu Luo Le Yu Shuai Wang and Dinghao Wu. 2017."}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3275523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3275523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:40Z","timestamp":1750207420000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3275523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":7,"alternative-id":["10.1145\/3236024.3275523","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3275523","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}