{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:11:42Z","timestamp":1775470302903,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1145\/3663529.3663824","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:43:13Z","timestamp":1720640593000},"page":"21-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Automated End-to-End Dynamic Taint Analysis for WhatsApp"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1396-1049","authenticated-orcid":false,"given":"Sopot","family":"Cela","sequence":"first","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2990-6366","authenticated-orcid":false,"given":"Andrea","family":"Ciancone","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0682-5056","authenticated-orcid":false,"given":"Per","family":"Gustafsson","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8001-8865","authenticated-orcid":false,"given":"\u00c1kos","family":"Hajdu","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2871-2285","authenticated-orcid":false,"given":"Yue","family":"Jia","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8261-9650","authenticated-orcid":false,"given":"Timotej","family":"Kapus","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4316-316X","authenticated-orcid":false,"given":"Maksym","family":"Koshtenko","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7615-5709","authenticated-orcid":false,"given":"Will","family":"Lewis","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3956-9184","authenticated-orcid":false,"given":"Ke","family":"Mao","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1797-4645","authenticated-orcid":false,"given":"Dragos","family":"Martac","sequence":"additional","affiliation":[{"name":"Meta, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616330"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639729"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613889"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437801.3441613"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546186.3549929"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181797"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181313"},{"key":"e_1_3_2_1_9_1","volume-title":"Zoncolan: How Facebook uses static analysis to detect and prevent security issues. https:\/\/engineering.fb.com\/2019\/08\/15\/security\/zoncolan\/","author":"Logozzo Francesco","year":"2019","unstructured":"Francesco Logozzo, Manuel Fahndrich, Ibrahim Mosaad, and Pieter Hooimeijer. 2019. Zoncolan: How Facebook uses static analysis to detect and prevent security issues. https:\/\/engineering.fb.com\/2019\/08\/15\/security\/zoncolan\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00034"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639742"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00036"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468550"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1621995.1622041"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00050"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542486"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417059"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240465"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468532"},{"key":"e_1_3_2_1_23_1","volume-title":"Bellovin","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In Proceedings of the 23rd USENIX Conference on Security Symposium. USENIX Association, 1\u201316."}],"event":{"name":"FSE '24: 32nd ACM International Conference on the Foundations of Software Engineering","location":"Porto de Galinhas Brazil","acronym":"FSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663529.3663824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:21Z","timestamp":1750290261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":23,"alternative-id":["10.1145\/3663529.3663824","10.1145\/3663529"],"URL":"https:\/\/doi.org\/10.1145\/3663529.3663824","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"2024-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}