{"id":"https://openalex.org/W2070192880","doi":"https://doi.org/10.1145/2689702.2689705","title":"Multi-App Security Analysis with FUSE","display_name":"Multi-App Security Analysis with FUSE","publication_year":2014,"publication_date":"2014-12-09","ids":{"openalex":"https://openalex.org/W2070192880","doi":"https://doi.org/10.1145/2689702.2689705","mag":"2070192880"},"language":"en","primary_location":{"id":"doi:10.1145/2689702.2689705","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2689702.2689705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th Program Protection and Reverse Engineering Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035763535","display_name":"Tristan Ravitch","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tristan Ravitch","raw_affiliation_strings":["Galois, Inc"],"affiliations":[{"raw_affiliation_string":"Galois, Inc","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072018420","display_name":"E. Rogan Creswick","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"E. Rogan Creswick","raw_affiliation_strings":["Galois, Inc"],"affiliations":[{"raw_affiliation_string":"Galois, Inc","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043389542","display_name":"Aaron Tomb","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aaron Tomb","raw_affiliation_strings":["Galois, Inc"],"affiliations":[{"raw_affiliation_string":"Galois, Inc","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022822253","display_name":"Adam Foltzer","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam Foltzer","raw_affiliation_strings":["Galois, Inc"],"affiliations":[{"raw_affiliation_string":"Galois, Inc","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021186258","display_name":"Trevor Elliott","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trevor Elliott","raw_affiliation_strings":["Galois, Inc"],"affiliations":[{"raw_affiliation_string":"Galois, Inc","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009284111","display_name":"Ledah Casburn","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ledah Casburn","raw_affiliation_strings":["Galois, Inc"],"affiliations":[{"raw_affiliation_string":"Galois, Inc","institution_ids":["https://openalex.org/I4210140281"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035763535"],"corresponding_institution_ids":["https://openalex.org/I4210140281"],"apc_list":null,"apc_paid":null,"fwci":6.9876,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.97644812,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuse","display_name":"Fuse (electrical)","score":0.7777770757675171},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6104902029037476},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4711524248123169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38366252183914185},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11947673559188843},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09784072637557983}],"concepts":[{"id":"https://openalex.org/C141353440","wikidata":"https://www.wikidata.org/wiki/Q182221","display_name":"Fuse (electrical)","level":2,"score":0.7777770757675171},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6104902029037476},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4711524248123169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38366252183914185},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11947673559188843},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09784072637557983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2689702.2689705","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2689702.2689705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th Program Protection and Reverse Engineering Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1536098516","https://openalex.org/W1608142476","https://openalex.org/W1630356589","https://openalex.org/W1982205631","https://openalex.org/W1988036170","https://openalex.org/W2036157748","https://openalex.org/W2040152339","https://openalex.org/W2044228862","https://openalex.org/W2078197322","https://openalex.org/W2094835181","https://openalex.org/W2125011234","https://openalex.org/W2133824159","https://openalex.org/W2140095007","https://openalex.org/W2149237601","https://openalex.org/W2153542583","https://openalex.org/W2158126684","https://openalex.org/W2166743230","https://openalex.org/W2914982603","https://openalex.org/W6999986095"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3000097931","https://openalex.org/W2354322770","https://openalex.org/W4237547500","https://openalex.org/W1570848052","https://openalex.org/W2373192430","https://openalex.org/W4239268388","https://openalex.org/W1537496349","https://openalex.org/W2379407973","https://openalex.org/W4243305035"],"abstract_inverted_index":{"Android's":[0],"popularity":[1],"has":[2],"given":[3],"rise":[4],"to":[5,10,38,89,106],"myriad":[6],"application":[7],"analysis":[8,56],"techniques":[9,26,76],"improve":[11],"the":[12,21,68,91],"security":[13,86,113],"and":[14,102],"robustness":[15],"of":[16,48,60,66,93],"mobile":[17],"applications,":[18,35,61],"motivated":[19],"by":[20],"evolving":[22],"adversarial":[23],"landscape.":[24],"These":[25],"have":[27],"focused":[28],"on":[29],"identifying":[30],"undesirable":[31],"behaviors":[32],"in":[33],"individual":[34],"either":[36],"due":[37],"malicious":[39],"intent":[40],"or":[41],"programmer":[42],"error.":[43],"We":[44],"present":[45,78],"a":[46,52,58,63,72,80,85,97],"collection":[47],"tools":[49],"that":[50,110],"provide":[51],"static":[53,81,94],"information":[54,99,108],"flow":[55,100],"across":[57],"set":[59],"showing":[62],"holistic":[64],"view":[65],"all":[67],"applications":[69],"destined":[70],"for":[71],"particular":[73],"device.":[74],"The":[75],"we":[77],"include":[79],"binary":[82,95],"single-app":[83],"analysis,":[84,96,101],"lint":[87],"tool":[88],"mitigate":[90],"limits":[92],"multi-app":[98],"an":[103],"evaluation":[104],"engine":[105],"detect":[107],"flows":[109],"violate":[111],"specified":[112],"policies.":[114]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":17},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
