Mobile app security analysis with the MAVeriC static analysis. Armando, A., Bocci, G., Chiarelli, G., Costa, G., De Maglie, G., Mammoliti, R., & Merlo, A. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(4):103-119, 2014.
Paper bibtex @ARTICLE{Armando2014103,
author={Armando, A., Bocci, G., Chiarelli, G., Costa, G., De Maglie, G., Mammoliti, R., Merlo, A.},
title={Mobile app security analysis with the MAVeriC static analysis},
journal={Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications},
year={2014},
volume={5},
number={4},
pages={103-119},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84920192515&partnerID=40&md5=d5ccf21836b9eecf61c2e489aef498cd},
document_type={Article},
source={Scopus},
}
Downloads: 0
{"_id":"kAcmk6muDtNWgrCHj","bibbaseid":"armando-bocci-chiarelli-costa-demaglie-mammoliti-merlo-mobileappsecurityanalysiswiththemavericstaticanalysis-2014","downloads":0,"creationDate":"2016-08-26T10:31:53.371Z","title":"Mobile app security analysis with the MAVeriC static analysis","author_short":["Armando, A.","Bocci, G.","Chiarelli, G.","Costa, G.","De Maglie, G.","Mammoliti, R.","Merlo, A."],"year":2014,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/BiblioLab.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Bocci"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Chiarelli"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Costa"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["De","Maglie"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Mammoliti"],"firstnames":["R."],"suffixes":[]},{"propositions":[],"lastnames":["Merlo"],"firstnames":["A."],"suffixes":[]}],"title":"Mobile app security analysis with the MAVeriC static analysis","journal":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","year":"2014","volume":"5","number":"4","pages":"103-119","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84920192515&partnerID=40&md5=d5ccf21836b9eecf61c2e489aef498cd","document_type":"Article","source":"Scopus","bibtex":"@ARTICLE{Armando2014103,\nauthor={Armando, A., Bocci, G., Chiarelli, G., Costa, G., De Maglie, G., Mammoliti, R., Merlo, A.},\ntitle={Mobile app security analysis with the MAVeriC static analysis},\njournal={Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications},\nyear={2014},\nvolume={5},\nnumber={4},\npages={103-119},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84920192515&partnerID=40&md5=d5ccf21836b9eecf61c2e489aef498cd},\ndocument_type={Article},\nsource={Scopus},\n}\n\n","author_short":["Armando, A.","Bocci, G.","Chiarelli, G.","Costa, G.","De Maglie, G.","Mammoliti, R.","Merlo, A."],"key":"Armando2014103","id":"Armando2014103","bibbaseid":"armando-bocci-chiarelli-costa-demaglie-mammoliti-merlo-mobileappsecurityanalysiswiththemavericstaticanalysis-2014","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84920192515&partnerID=40&md5=d5ccf21836b9eecf61c2e489aef498cd"},"downloads":0},"search_terms":["mobile","app","security","analysis","maveric","static","analysis","armando","bocci","chiarelli","costa","de maglie","mammoliti","merlo"],"keywords":[],"authorIDs":["57c00b7c5abfdd4d540000cb"],"dataSources":["EQov9rEvkmMf5P4ah"]}