{"id":"https://openalex.org/W2737015327","doi":"https://doi.org/10.1109/ccnc.2017.7983245","title":"sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps","display_name":"sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2737015327","doi":"https://doi.org/10.1109/ccnc.2017.7983245","mag":"2737015327"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2017.7983245","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2017.7983245","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016619024","display_name":"Jyoti Gajrani","orcid":"https://orcid.org/0000-0002-8223-5975"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Jyoti Gajrani","raw_affiliation_strings":["MNIT, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"MNIT, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074885448","display_name":"Meenakshi Tripathi","orcid":"https://orcid.org/0000-0002-6559-5151"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Meenakshi Tripathi","raw_affiliation_strings":["MNIT, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"MNIT, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087820056","display_name":"Vijay Laxmi","orcid":"https://orcid.org/0000-0002-3662-8487"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vijay Laxmi","raw_affiliation_strings":["MNIT, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"MNIT, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028420263","display_name":"Manoj Singh Gaur","orcid":"https://orcid.org/0000-0002-0497-721X"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. S. Gaur","raw_affiliation_strings":["MNIT, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"MNIT, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063847107","display_name":"Mauro Conti","orcid":"https://orcid.org/0000-0002-3612-1934"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Conti","raw_affiliation_strings":["Universi-ty of Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Universi-ty of Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059640195","display_name":"Muttukrishnan Rajarajan","orcid":"https://orcid.org/0000-0001-5814-9922"},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muttukrishnan Rajarajan","raw_affiliation_strings":["City University, London"],"affiliations":[{"raw_affiliation_string":"City University, London","institution_ids":["https://openalex.org/I180825142"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016619024"],"corresponding_institution_ids":["https://openalex.org/I83205935"],"apc_list":null,"apc_paid":null,"fwci":0.9246,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.7531222,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"48","issue":null,"first_page":"854","last_page":"860"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8803964257240295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7867740392684937},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7640154361724854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6018467545509338},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5753056406974792},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4854060113430023},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.4388406276702881},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.4100942015647888},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3623310923576355},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26670852303504944},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20822975039482117}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8803964257240295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7867740392684937},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7640154361724854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6018467545509338},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5753056406974792},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4854060113430023},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.4388406276702881},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.4100942015647888},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3623310923576355},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26670852303504944},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20822975039482117},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ccnc.2017.7983245","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2017.7983245","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:openaccess.city.ac.uk:18627","is_oa":false,"landing_page_url":"https://openaccess.city.ac.uk/view/creators_id/m=2Erajarajan.html>view","pdf_url":null,"source":{"id":"https://openalex.org/S4306401940","display_name":"City Research Online (City University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I180825142","host_organization_name":"City, University of London","host_organization_lineage":["https://openalex.org/I180825142"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:www.research.unipd.it:11577/3211920","is_oa":false,"landing_page_url":"http://hdl.handle.net/11577/3211920","pdf_url":null,"source":{"id":"https://openalex.org/S4306402547","display_name":"Padua Research Archive (University of Padova)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W112964067","https://openalex.org/W1515595447","https://openalex.org/W1643398921","https://openalex.org/W1997833177","https://openalex.org/W2008810193","https://openalex.org/W2013856010","https://openalex.org/W2016321105","https://openalex.org/W2045057497","https://openalex.org/W2084864601","https://openalex.org/W2164170598","https://openalex.org/W2164539435","https://openalex.org/W2619725017","https://openalex.org/W2998501028","https://openalex.org/W4250318009","https://openalex.org/W7014719297"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2141019415","https://openalex.org/W4308361275","https://openalex.org/W3034338022"],"abstract_inverted_index":{"The":[0,110],"majority":[1],"of":[2,36,61,81,112,137,159,164],"Android":[3,47,85,152],"applications":[4],"(apps)":[5],"deals":[6],"with":[7],"user's":[8],"personal":[9],"data.":[10,22,37],"Users":[11],"trust":[12],"these":[13],"apps":[14,57,86,124,146,160],"and":[15,94,107],"allow":[16],"them":[17],"to":[18,33,65,98,122],"access":[19],"all":[20],"sensitive":[21],"Cryptography,":[23],"when":[24],"employed":[25],"in":[26,84,96],"an":[27,74,172],"appropriate":[28],"way,":[29],"can":[30],"be":[31,52],"used":[32],"prevent":[34],"misuse":[35],"Unfortunately,":[38],"cryptographic":[39,44,53,66,82,165],"libraries":[40],"also":[41],"include":[42],"vulnerable":[43],"services.":[45],"Since":[46],"app":[48,153],"developers":[49],"may":[50],"not":[51],"experts,":[54],"this":[55,69],"makes":[56,119],"become":[58],"the":[59,135],"target":[60],"various":[62],"attacks":[63],"due":[64],"vulnerabilities.":[67,166],"In":[68],"work,":[70],"we":[71],"present":[72],"sPECTRA:":[73],"automated":[75],"framework":[76],"for":[77],"analyzing":[78],"wide":[79],"range":[80],"vulnerabilities":[83],"at":[87,125],"large":[88,126],"scale.":[89,127],"sPECTRA":[90,120,129,143,169],"is":[91],"more":[92],"precise":[93],"accurate":[95],"comparison":[97],"state-of-the-art":[99],"approaches":[100],"as":[101,171],"it":[102],"reduces":[103],"both":[104],"false":[105,108],"negatives":[106],"positives.":[109],"inclusion":[111],"Intelligent":[113],"UI":[114],"exploration":[115],"during":[116],"dynamic":[117],"analysis":[118],"deployable":[121],"analyze":[123],"Moreover,":[128],"works":[130],"on":[131,144],"apk":[132],"files":[133],"without":[134],"need":[136],"any":[138],"source":[139],"code.":[140],"We":[141,167],"evaluate":[142],"7,000":[145],"collected":[147],"from":[148],"7":[149],"most":[150],"popular":[151],"stores.":[154],"Results":[155],"indicate":[156],"that":[157],"90%":[158],"are":[161],"exploitable":[162],"because":[163],"made":[168],"available":[170],"open":[173],"source.":[174]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
