When program analysis meets mobile security: an industrial study of misusing Android internet sockets. Bu, W., Xue, M., Xu, L., Zhou, Y., Tang, Z., & Xie, T. In Bodden, E., Schäfer, W., van Deursen, A., & Zisman, A., editors, Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017, pages 842–847, 2017. ACM.
Paper doi bibtex @inproceedings{DBLP:conf/sigsoft/BuXXZTX17,
author = {Wenqi Bu and
Minhui Xue and
Lihua Xu and
Yajin Zhou and
Zhushou Tang and
Tao Xie},
editor = {Eric Bodden and
Wilhelm Sch{\"{a}}fer and
Arie van Deursen and
Andrea Zisman},
title = {When program analysis meets mobile security: an industrial study of
misusing Android internet sockets},
booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
pages = {842--847},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3106237.3117764},
doi = {10.1145/3106237.3117764},
timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sigsoft/BuXXZTX17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"R2XXMvCxsASd7HAaC","bibbaseid":"bu-xue-xu-zhou-tang-xie-whenprogramanalysismeetsmobilesecurityanindustrialstudyofmisusingandroidinternetsockets-2017","authorIDs":[],"author_short":["Bu, W.","Xue, M.","Xu, L.","Zhou, Y.","Tang, Z.","Xie, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Wenqi"],"propositions":[],"lastnames":["Bu"],"suffixes":[]},{"firstnames":["Minhui"],"propositions":[],"lastnames":["Xue"],"suffixes":[]},{"firstnames":["Lihua"],"propositions":[],"lastnames":["Xu"],"suffixes":[]},{"firstnames":["Yajin"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Zhushou"],"propositions":[],"lastnames":["Tang"],"suffixes":[]},{"firstnames":["Tao"],"propositions":[],"lastnames":["Xie"],"suffixes":[]}],"editor":[{"firstnames":["Eric"],"propositions":[],"lastnames":["Bodden"],"suffixes":[]},{"firstnames":["Wilhelm"],"propositions":[],"lastnames":["Schäfer"],"suffixes":[]},{"firstnames":["Arie"],"propositions":["van"],"lastnames":["Deursen"],"suffixes":[]},{"firstnames":["Andrea"],"propositions":[],"lastnames":["Zisman"],"suffixes":[]}],"title":"When program analysis meets mobile security: an industrial study of misusing Android internet sockets","booktitle":"Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017","pages":"842–847","publisher":"ACM","year":"2017","url":"https://doi.org/10.1145/3106237.3117764","doi":"10.1145/3106237.3117764","timestamp":"Sat, 19 Oct 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/sigsoft/BuXXZTX17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/sigsoft/BuXXZTX17,\n author = {Wenqi Bu and\n Minhui Xue and\n Lihua Xu and\n Yajin Zhou and\n Zhushou Tang and\n Tao Xie},\n editor = {Eric Bodden and\n Wilhelm Sch{\\\"{a}}fer and\n Arie van Deursen and\n Andrea Zisman},\n title = {When program analysis meets mobile security: an industrial study of\n misusing Android internet sockets},\n booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software\n Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},\n pages = {842--847},\n publisher = {{ACM}},\n year = {2017},\n url = {https://doi.org/10.1145/3106237.3117764},\n doi = {10.1145/3106237.3117764},\n timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/sigsoft/BuXXZTX17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bu, W.","Xue, M.","Xu, L.","Zhou, Y.","Tang, Z.","Xie, T."],"editor_short":["Bodden, E.","Schäfer, W.","van Deursen, A.","Zisman, A."],"key":"DBLP:conf/sigsoft/BuXXZTX17","id":"DBLP:conf/sigsoft/BuXXZTX17","bibbaseid":"bu-xue-xu-zhou-tang-xie-whenprogramanalysismeetsmobilesecurityanindustrialstudyofmisusingandroidinternetsockets-2017","role":"author","urls":{"Paper":"https://doi.org/10.1145/3106237.3117764"},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/15/7381.bib","creationDate":"2021-02-20T16:08:33.024Z","downloads":0,"keywords":[],"search_terms":["program","analysis","meets","mobile","security","industrial","study","misusing","android","internet","sockets","bu","xue","xu","zhou","tang","xie"],"title":"When program analysis meets mobile security: an industrial study of misusing Android internet sockets","year":2017,"dataSources":["WYRfQiCuXBDXYTBZn"]}