{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:03:17Z","timestamp":1778346197940,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2021YFB3101500"],"award-info":[{"award-number":["2021YFB3101500"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["2023RC69"],"award-info":[{"award-number":["2023RC69"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3634708","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"364-373","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3310-926X","authenticated-orcid":false,"given":"Guosheng","family":"Xu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4668-3120","authenticated-orcid":false,"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5000-0551","authenticated-orcid":false,"given":"Cheng","family":"Yu","sequence":"additional","affiliation":[{"name":"China Unicom Digital Technology Co. Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0823-8117","authenticated-orcid":false,"given":"Haoran","family":"Zhao","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0051-3397","authenticated-orcid":false,"given":"Yanhui","family":"Guo","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6409-9736","authenticated-orcid":false,"given":"Jinghong","family":"Guo","sequence":"additional","affiliation":[{"name":"State Grid Smart Grid Research Institute Co. Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6527-2897","authenticated-orcid":false,"given":"Chenyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"464","volume":"2016","author":"Amann S","unstructured":"Amann S, Nadi S, Nguyen H A, MUBench: a benchmark for API-misuse detectors[C]\/\/Proceedings of the 13th International Conference on Mining Software Repositories. 2016: 464-467.","journal-title":"Mining Software Repositories."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Egele M Brumley D Fratantonio Y An empirical study of cryptographic misuse in android applications[C]\/\/Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013: 73-84.","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume":"2014","author":"Lazar D","unstructured":"Lazar D, Chen H, Wang X, Why does cryptographic software fail? A case study and open problems[C]\/\/Proceedings of 5th Asia-Pacific Workshop on Systems. 2014: 1-7.","journal-title":"Systems."},{"key":"e_1_3_2_1_4_1","volume-title":"Overview of information flow tracking techniques based on taint analysis for android[C]\/\/2014 International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Lokhande B","year":"2014","unstructured":"Lokhande B, Dhavale S. Overview of information flow tracking techniques based on taint analysis for android[C]\/\/2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2014: 749-753."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume":"2014","author":"Lazar D","unstructured":"Lazar D, Chen H, Wang X, Why does cryptographic software fail? A case study and open problems[C]\/\/Proceedings of 5th Asia-Pacific Workshop on Systems. 2014: 1-7.","journal-title":"Systems."},{"key":"e_1_3_2_1_6_1","volume-title":"Comparing the usability of cryptographic apis[C]\/\/2017 IEEE Symposium on Security and Privacy (SP)","author":"Acar Y","year":"2017","unstructured":"Acar Y, Backes M, Fahl S, Comparing the usability of cryptographic apis[C]\/\/2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 154-171."},{"key":"e_1_3_2_1_7_1","volume-title":"Modelling analysis and auto-detection of cryptographic misuse in android applications[C]\/\/2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing","author":"Shuai S","year":"2014","unstructured":"Shuai S, Guowei D, Tao G, Modelling analysis and auto-detection of cryptographic misuse in android applications[C]\/\/2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing. IEEE, 2014: 75-80."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"IEEE Transactions on Software Engineering","author":"Kruger S","year":"2019","unstructured":"Kruger S, Spath J, Ali K, CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs[J]. IEEE Transactions on Software Engineering, 2019, PP (99):1-1."},{"key":"e_1_3_2_1_9_1","first-page":"133","volume":"2018","author":"Muslukhov I","unstructured":"Muslukhov I, Boshmaf Y, Beznosov K. Source attribution of cryptographic API misuse in android applications[C]\/\/Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 2018: 133-146.","journal-title":"Communications Security."},{"key":"e_1_3_2_1_10_1","volume-title":"Afrose S","author":"Rahaman S","year":"2019","unstructured":"Rahaman S, Xiao Y, Afrose S, Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects[C]\/\/Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019: 2455-2472."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Fahl S Harbach M Muders T Why Eve and Mallory love Android: An analysis of Android SSL (in) security[C]\/\/Proceedings of the 2012 ACM conference on Computer and communications security. 2012: 50-61.","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_12_1","volume-title":"Carloni L P","author":"Piccolboni L","year":"2021","unstructured":"Piccolboni L, Di Guglielmo G, Carloni L P, Crylogger: Detecting crypto misuses dynamically[C]\/\/2021 IEEE Symposium on Security and Privacy (SP). IEEE, 2021: 1972-1989."}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","location":"Wuhan China","acronym":"AAIA 2023"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3634708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3634708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:33:54Z","timestamp":1755891234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3634708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":12,"alternative-id":["10.1145\/3603273.3634708","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3634708","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}