{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:15Z","timestamp":1750221075686,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T00:00:00Z","timestamp":1536019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,4]]},"DOI":"10.1145\/3243218.3243225","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AppSeer: discovering flawed interactions among Android components"],"prefix":"10.1145","author":[{"given":"Vincenzo","family":"Chiaramida","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, USA"}]},{"given":"Francesco","family":"Pinci","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, USA"}]},{"given":"Ugo","family":"Buy","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, USA"}]},{"given":"Rigel","family":"Gjomemo","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,9,4]]},"reference":[{"volume-title":"Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/cve\/. Online","year":"2018","key":"e_1_3_2_1_1_1","unstructured":"2018. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/cve\/. Online ; accessed 2 July 2018 . 2018. Distribution Dashboard. https:\/\/developer.android.com\/about\/dashboards\/. Online; accessed on 5 July 2018. 2018. Google Bughunter University . https:\/\/sites.google.com\/site\/ bughunteruniversity\/. Online; accessed on 2 July 2018. 2018. Kotlin Language Documentation. https:\/\/kotlinlang.org\/docs\/kotlin-docs. pdf. {Online; accessed July-2018}. 2018. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/cve\/. Online; accessed 2 July 2018. 2018. Distribution Dashboard. https:\/\/developer.android.com\/about\/dashboards\/. Online; accessed on 5 July 2018. 2018. Google Bughunter University. https:\/\/sites.google.com\/site\/ bughunteruniversity\/. Online; accessed on 2 July 2018. 2018. Kotlin Language Documentation. https:\/\/kotlinlang.org\/docs\/kotlin-docs. pdf. {Online; accessed July-2018}."},{"key":"e_1_3_2_1_2_1","volume-title":"NaClDroid: Native Code Isolation for Android Applications. In European Symposium on Research in Computer Security. Springer, 422\u2013439","author":"Athanasopoulos Elias","year":"2016","unstructured":"Elias Athanasopoulos , Vasileios P Kemerlis , Georgios Portokalidis , and Angelos D Keromytis . 2016 . NaClDroid: Native Code Isolation for Android Applications. In European Symposium on Research in Computer Security. Springer, 422\u2013439 . Elias Athanasopoulos, Vasileios P Kemerlis, Georgios Portokalidis, and Angelos D Keromytis. 2016. NaClDroid: Native Code Isolation for Android Applications. In European Symposium on Research in Computer Security. Springer, 422\u2013439."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 25th USENIX Security Symposium. USENIX Association","author":"Backes Michael","year":"2016","unstructured":"Michael Backes , Sven Bugiel , Derr Erik , Patrick McDaniel , Damien Octeau , and Sebastian ( 2016 ) Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis . In Proceedings of the 25th USENIX Security Symposium. USENIX Association , Berkeley, CA, 1101\u20131118. Michael Backes, Sven Bugiel, Derr Erik, Patrick McDaniel, Damien Octeau, and Sebastian (2016) Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In Proceedings of the 25th USENIX Security Symposium. USENIX Association, Berkeley, CA, 1101\u20131118."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_1_6_1","volume-title":"Apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. https:\/\/ibotpeaches.github. io\/Apktool\/. {Online","author":"Ryszard Wisniewski","year":"2018","unstructured":"Wisniewski Ryszard and Tumbleson Connor . 2012. Apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. https:\/\/ibotpeaches.github. io\/Apktool\/. {Online ; accessed March- 2018 }. Wisniewski Ryszard and Tumbleson Connor. 2012. Apktool - A tool for reverse engineering 3rd party, closed, binary Android apps. https:\/\/ibotpeaches.github. io\/Apktool\/. {Online; accessed March-2018}."},{"volume-title":"Jadx - Dex to Java decompiler. https:\/\/ibotpeaches.github.io\/ Apktool\/. {Online","year":"2018","key":"e_1_3_2_1_7_1","unstructured":"Skylot. 2013. Jadx - Dex to Java decompiler. https:\/\/ibotpeaches.github.io\/ Apktool\/. {Online ; accessed March- 2018 }. Skylot. 2013. Jadx - Dex to Java decompiler. https:\/\/ibotpeaches.github.io\/ Apktool\/. {Online; accessed March-2018}."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978342"},{"volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Yan Lok Kwong","key":"e_1_3_2_1_9_1","unstructured":"Lok Kwong Yan and Heng Yin . 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) . USENIX , Bellevue, WA , 569\u2013584. https:\/\/www.usenix.org\/conference\/ usenixsecurity12\/technical-sessions\/presentation\/yan Lok Kwong Yan and Heng Yin. 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). USENIX, Bellevue, WA, 569\u2013584. https:\/\/www.usenix.org\/conference\/ usenixsecurity12\/technical-sessions\/presentation\/yan"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Montpellier France","acronym":"ASE '18"},"container-title":["Proceedings of the 1st International Workshop on Advances in Mobile App Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243218.3243225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243218.3243225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:31Z","timestamp":1750208251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243218.3243225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,4]]},"references-count":9,"alternative-id":["10.1145\/3243218.3243225","10.1145\/3243218"],"URL":"https:\/\/doi.org\/10.1145\/3243218.3243225","relation":{},"subject":[],"published":{"date-parts":[[2018,9,4]]},"assertion":[{"value":"2018-09-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}