{"id":"https://openalex.org/W2886583026","doi":"https://doi.org/10.1145/3232755.3232779","title":"Studying TLS Usage in Android Apps","display_name":"Studying TLS Usage in Android Apps","publication_year":2018,"publication_date":"2018-07-16","ids":{"openalex":"https://openalex.org/W2886583026","doi":"https://doi.org/10.1145/3232755.3232779","mag":"2886583026"},"language":"en","primary_location":{"id":"doi:10.1145/3232755.3232779","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3232755.3232779","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3232755.3232779","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Applied Networking Research Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3232755.3232779","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084849425","display_name":"Abbas Razaghpanah","orcid":"https://orcid.org/0000-0002-0320-8611"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abbas Razaghpanah","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088105701","display_name":"Arian Akhavan Niaki","orcid":"https://orcid.org/0000-0002-4050-7012"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arian Akhavan Niaki","raw_affiliation_strings":["UMass-Amherst"],"affiliations":[{"raw_affiliation_string":"UMass-Amherst","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016569835","display_name":"Narseo Vallina-Rodr\u00edguez","orcid":"https://orcid.org/0000-0002-5420-6835"},"institutions":[{"id":"https://openalex.org/I2802499160","display_name":"IMDEA Networks","ror":"https://ror.org/04mm9fg30","country_code":"ES","type":"facility","lineage":["https://openalex.org/I105140100","https://openalex.org/I2802499160"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Narseo Vallina-Rodriguez","raw_affiliation_strings":["IMDEA Networks Institute/ICSI"],"affiliations":[{"raw_affiliation_string":"IMDEA Networks Institute/ICSI","institution_ids":["https://openalex.org/I2802499160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078189600","display_name":"Srikanth Sundaresan","orcid":null},"institutions":[{"id":"https://openalex.org/I2252078561","display_name":"Meta (Israel)","ror":"https://ror.org/02388em19","country_code":"IL","type":"company","lineage":["https://openalex.org/I2252078561","https://openalex.org/I4210114444"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Srikanth Sundaresan","raw_affiliation_strings":["Facebook"],"affiliations":[{"raw_affiliation_string":"Facebook","institution_ids":["https://openalex.org/I2252078561"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059280292","display_name":"Johanna Amann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Johanna Amann","raw_affiliation_strings":["ICSI/Corelight"],"affiliations":[{"raw_affiliation_string":"ICSI/Corelight","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009381297","display_name":"Philippa Gill","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Philippa Gill","raw_affiliation_strings":["UMass-Amherst"],"affiliations":[{"raw_affiliation_string":"UMass-Amherst","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084849425"],"corresponding_institution_ids":["https://openalex.org/I59553526"],"apc_list":null,"apc_paid":null,"fwci":1.4863,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.83458198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"5","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7888888120651245},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7397388815879822},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.7156103253364563},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.5516022443771362},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5082573294639587},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4875125586986542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48222339153289795},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.4762539863586426},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.4661102890968323},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.45174548029899597},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42161041498184204},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28616225719451904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7888888120651245},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7397388815879822},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.7156103253364563},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.5516022443771362},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5082573294639587},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4875125586986542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48222339153289795},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.4762539863586426},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.4661102890968323},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.45174548029899597},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42161041498184204},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28616225719451904},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3232755.3232779","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3232755.3232779","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3232755.3232779","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Applied Networking Research Workshop","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3232755.3232779","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3232755.3232779","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3232755.3232779","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Applied Networking Research Workshop","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6256700500","display_name":null,"funder_award_id":"CNS-1564329","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2886583026.pdf","grobid_xml":"https://content.openalex.org/works/W2886583026.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4296873577","https://openalex.org/W4295681914","https://openalex.org/W2503991861","https://openalex.org/W2516734788","https://openalex.org/W2612638001","https://openalex.org/W2347296673","https://openalex.org/W1971902782","https://openalex.org/W4319159013","https://openalex.org/W2337566776","https://openalex.org/W2605662324"],"abstract_inverted_index":{"First":[0],"standardized":[1,161],"by":[2,63,76,86,124,150,162],"the":[3,6,10,16,47,52,77,90,100,119,125,129,151,163,168,177,184],"IETF":[4],"in":[5,51,89,183],"1990's,":[7],"SSL/TLS":[8],"is":[9,187],"most":[11],"widely-used":[12],"encryption":[13],"protocol":[14],"on":[15,46],"Internet.":[17],"This":[18],"makes":[19],"it":[20],"imperative":[21],"to":[22,31,82,98,179],"study":[23],"its":[24],"usage":[25,34,48,62,85],"across":[26],"different":[27],"platforms":[28],"and":[29,35,39,94,103,108,128,144,170],"applications":[30],"ensure":[32],"proper":[33],"robustness":[36],"against":[37],"attacks":[38],"vulnerabilities.":[40],"While":[41],"previous":[42],"efforts":[43],"have":[44,56],"focused":[45],"of":[49,60,116,156,172],"TLS":[50,61,84,101,121,134,142,153,181],"desktop":[53],"ecosystem,":[54],"there":[55],"been":[57],"no":[58],"studies":[59],"mobile":[64,79,185],"apps":[65,88,106,117,131],"at":[66],"scale.":[67],"In":[68],"our":[69],"study,":[70],"we":[71],"use":[72,118,132],"anonymized":[73],"data":[74],"collected":[75],"Lumen":[78],"measurement":[80],"app":[81],"analyze":[83,93],"Android":[87,152],"wild.":[91],"We":[92,112],"fingerprint":[95],"handshake":[96],"messages":[97],"characterize":[99],"APIs":[102],"libraries":[104,122,135],"that":[105,114,146,176],"use,":[107],"evaluate":[109],"their":[110],"weaknesses.":[111],"find":[113],"84%":[115],"default":[120],"provided":[123],"operating":[126],"system,":[127],"remaining":[130],"other":[133],"for":[136],"various":[137],"reasons":[138],"such":[139],"as":[140],"using":[141],"extensions":[143],"features":[145],"are":[147,158],"not":[148,160,188],"supported":[149],"libraries,":[154],"some":[155],"which":[157],"also":[159],"IETF.":[164],"Our":[165],"analysis":[166],"reveals":[167],"strengths":[169],"weaknesses":[171],"each":[173],"approach,":[174],"demonstrating":[175],"path":[178],"improving":[180],"security":[182],"platform":[186],"straightforward.":[189]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
