{"id":"https://openalex.org/W2626975894","doi":"https://doi.org/10.1145/3103111.3104040","title":"Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper","display_name":"Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper","publication_year":2017,"publication_date":"2017-06-18","ids":{"openalex":"https://openalex.org/W2626975894","doi":"https://doi.org/10.1145/3103111.3104040","mag":"2626975894"},"language":"en","primary_location":{"id":"mag:2626975894","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1706.04741","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},"type":"article","indexed_in":[],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/abs/1706.04741","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073795268","display_name":"Irina M\u0103riuca As\u0103voae","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Irina M\u0103riuca As\u0103voae","raw_affiliation_strings":["Inria, Paris,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Inria, Paris,France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003269957","display_name":"Hoang Nga Nguyen","orcid":"https://orcid.org/0000-0003-0260-1697"},"institutions":[{"id":"https://openalex.org/I73417466","display_name":"Coventry University","ror":"https://ror.org/01tgmhj36","country_code":"GB","type":"education","lineage":["https://openalex.org/I73417466"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hoang Nga Nguyen","raw_affiliation_strings":["Coventry University, Coventry UK"],"raw_orcid":"https://orcid.org/0000-0003-0260-1697","affiliations":[{"raw_affiliation_string":"Coventry University, Coventry UK","institution_ids":["https://openalex.org/I73417466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089343934","display_name":"Markus Roggenbach","orcid":"https://orcid.org/0000-0002-3819-2787"},"institutions":[{"id":"https://openalex.org/I39586589","display_name":"Swansea University","ror":"https://ror.org/053fq8t95","country_code":"GB","type":"education","lineage":["https://openalex.org/I39586589"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Markus Roggenbach","raw_affiliation_strings":["SWANSEA University, SWANSEA, UK"],"raw_orcid":"https://orcid.org/0000-0002-3819-2787","affiliations":[{"raw_affiliation_string":"SWANSEA University, SWANSEA, UK","institution_ids":["https://openalex.org/I39586589"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033988441","display_name":"Siraj Ahmed Shaikh","orcid":"https://orcid.org/0000-0002-0726-3319"},"institutions":[{"id":"https://openalex.org/I73417466","display_name":"Coventry University","ror":"https://ror.org/01tgmhj36","country_code":"GB","type":"education","lineage":["https://openalex.org/I73417466"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Siraj Ahmed Shaikh","raw_affiliation_strings":["Coventry University, Coventry UK"],"raw_orcid":"https://orcid.org/0000-0002-0726-3319","affiliations":[{"raw_affiliation_string":"Coventry University, Coventry UK","institution_ids":["https://openalex.org/I73417466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073795268"],"corresponding_institution_ids":["https://openalex.org/I1326498283"],"apc_list":null,"apc_paid":null,"fwci":0.3728,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56175027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8433513641357422},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7991881966590881},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6750694513320923},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5181785821914673},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.45372676849365234},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.4452887773513794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4451081156730652},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.43720299005508423},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3329234719276428},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2676670253276825}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8433513641357422},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7991881966590881},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6750694513320923},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5181785821914673},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.45372676849365234},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.4452887773513794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4451081156730652},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.43720299005508423},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3329234719276428},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2676670253276825},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"mag:2626975894","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1706.04741","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:pure.atira.dk:publications/2daf8f7e-0bca-442b-84c1-01d1181160be","is_oa":false,"landing_page_url":"https://pureportal.coventry.ac.uk/en/publications/software-model-checking-a-promising-approach-to-verify-mobile-app-security-a-position-paper(2daf8f7e-0bca-442b-84c1-01d1181160be).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402411","display_name":"Pure (Coventry University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I73417466","host_organization_name":"Coventry University","host_organization_lineage":["https://openalex.org/I73417466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"As\u0103voae, I, Nguyen, H N, Roggenbach, M & Shaikh, S 2017, Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper. in Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs : Barcelona, Spain \u2014 June 18 - 23, 2017., 1, Association for Computing Machinery (ACM), 19th Workshop on Formal Techniques for Java-like Programs, Barcelona, Spain, 18/06/17. https://doi.org/10.1145/3103111.3104040","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"mag:2626975894","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1706.04741","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1554539787","https://openalex.org/W1565879960","https://openalex.org/W1603721515","https://openalex.org/W2023035194","https://openalex.org/W2048417351","https://openalex.org/W2082036516","https://openalex.org/W2166743230","https://openalex.org/W2325375141","https://openalex.org/W2519758513"],"related_works":["https://openalex.org/W1558325204","https://openalex.org/W2926425366","https://openalex.org/W2886601854","https://openalex.org/W3168494253","https://openalex.org/W2901588446","https://openalex.org/W2140808664","https://openalex.org/W2397510858","https://openalex.org/W2113867182","https://openalex.org/W2523154313","https://openalex.org/W3124426559","https://openalex.org/W2981406792","https://openalex.org/W2051264696","https://openalex.org/W2355982795","https://openalex.org/W2566713145","https://openalex.org/W2913980405","https://openalex.org/W3102559360","https://openalex.org/W3105307035","https://openalex.org/W3105606635","https://openalex.org/W2134245564","https://openalex.org/W26753364"],"abstract_inverted_index":{"In":[0,68],"this":[1,69],"position":[2],"paper":[3],"we":[4,27,71,108],"advocate":[5],"software":[6,92],"model":[7,93],"checking":[8,94],"as":[9,119,121],"a":[10,49],"technique":[11],"suitable":[12],"for":[13,91],"security":[14,117],"analysis":[15],"of":[16,36,80,95],"mobile":[17,123],"apps.":[18],"Our":[19],"recommendation":[20],"is":[21,45,104],"based":[22],"on":[23,29,65],"promising":[24],"results":[25],"that":[26],"achieved":[28],"analysing":[30],"app":[31,43],"collusion":[32,44],"in":[33,47],"the":[34,37,73,81,86,110],"context":[35],"Android":[38,96],"operating":[39,124],"system.":[40],"Broadly":[41],"speaking,":[42],"when,":[46],"performing":[48],"threat,":[50],"several":[51],"apps":[52],"are":[53],"working":[54],"together,":[55],"i.e.,":[56],"they":[57,61],"exchange":[58],"information":[59],"which":[60,76],"could":[62],"not":[63],"obtain":[64],"their":[66],"own.":[67],"context,":[70],"developed":[72],"K-Android":[74,89],"tool,":[75],"provides":[77],"an":[78],"encoding":[79],"Android/Smali":[82],"code":[83],"semantics":[84],"within":[85],"K":[87],"framework.":[88],"allows":[90],"APK":[97],"files.":[98],"Though":[99],"our":[100],"experience":[101],"so":[102],"far":[103],"limited":[105],"to":[106,112,115],"collusion,":[107],"believe":[109],"approach":[111],"be":[113],"applicable":[114],"further":[116],"properties":[118],"well":[120],"other":[122],"systems.":[125]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2022-10-01T00:00:00"}
