{"id":"https://openalex.org/W2585010938","doi":"https://doi.org/10.1145/3029806.3029814","title":"Ripple","display_name":"Ripple","publication_year":2017,"publication_date":"2017-03-20","ids":{"openalex":"https://openalex.org/W2585010938","doi":"https://doi.org/10.1145/3029806.3029814","mag":"2585010938"},"language":"en","primary_location":{"id":"doi:10.1145/3029806.3029814","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100386936","display_name":"Yifei Zhang","orcid":"https://orcid.org/0000-0002-5177-0465"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yifei Zhang","raw_affiliation_strings":["University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007391734","display_name":"Tian Tan","orcid":"https://orcid.org/0009-0009-3792-1237"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tian Tan","raw_affiliation_strings":["University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051325364","display_name":"Yue Li","orcid":"https://orcid.org/0000-0002-5304-9188"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yue Li","raw_affiliation_strings":["University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024664385","display_name":"Jingling Xue","orcid":"https://orcid.org/0000-0003-0380-3506"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jingling Xue","raw_affiliation_strings":["University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100386936"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":2.0342,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.8765611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"281","last_page":"288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8053285479545593},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7800637483596802},{"id":"https://openalex.org/keywords/ripple","display_name":"Ripple","score":0.5646675229072571},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5315494537353516},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.511076807975769},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5088430047035217},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4195060431957245},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection (computer programming)","score":0.41304194927215576},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19050845503807068},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14127260446548462},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11770617961883545},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08433187007904053}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8053285479545593},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7800637483596802},{"id":"https://openalex.org/C2779599953","wikidata":"https://www.wikidata.org/wiki/Q1776117","display_name":"Ripple","level":3,"score":0.5646675229072571},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5315494537353516},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.511076807975769},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5088430047035217},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4195060431957245},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.41304194927215576},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19050845503807068},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14127260446548462},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11770617961883545},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08433187007904053},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3029806.3029814","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W198969604","https://openalex.org/W1810163311","https://openalex.org/W1837958857","https://openalex.org/W1986480799","https://openalex.org/W2017025011","https://openalex.org/W2020224119","https://openalex.org/W2112936713","https://openalex.org/W2126667017","https://openalex.org/W2132481916","https://openalex.org/W2132685964","https://openalex.org/W2133497528","https://openalex.org/W2133824159","https://openalex.org/W2135389226","https://openalex.org/W2148397566","https://openalex.org/W2164539435","https://openalex.org/W2166743230","https://openalex.org/W2241404614","https://openalex.org/W2277576447","https://openalex.org/W2377819450","https://openalex.org/W2470899015","https://openalex.org/W2508295954","https://openalex.org/W2518060702","https://openalex.org/W2556634892","https://openalex.org/W2577540292","https://openalex.org/W2585010938","https://openalex.org/W3177391265","https://openalex.org/W4243644740","https://openalex.org/W4251478049"],"related_works":["https://openalex.org/W2791662519","https://openalex.org/W4389273713","https://openalex.org/W3036603968","https://openalex.org/W2334842536","https://openalex.org/W2521930763","https://openalex.org/W2380031640","https://openalex.org/W2295858576","https://openalex.org/W2058305829","https://openalex.org/W2392272505","https://openalex.org/W2941677765"],"abstract_inverted_index":{"Despite":[0],"its":[1],"widespread":[2],"use":[3],"in":[4,24,98],"Android":[5,43,73,88],"apps,":[6,44],"reflection":[7,70],"poses":[8],"graving":[9],"problems":[10],"for":[11,42,57,72],"static":[12,52,69],"security":[13,27],"analysis.":[14],"Currently,":[15],"string":[16,82],"inference":[17],"is":[18],"applied":[19],"to":[20,114],"handle":[21],"reflection,":[22],"resulting":[23],"significantly":[25],"missed":[26],"vulnerabilities.":[28],"In":[29],"this":[30],"paper,":[31],"we":[32],"bring":[33],"forward":[34],"the":[35,55,66,94],"ubiquity":[36],"of":[37,96,117],"incomplete":[38],"information":[39],"environments":[40],"(IIEs)":[41],"where":[45],"some":[46],"critical":[47],"data-flows":[48],"are":[49],"missing":[50],"during":[51],"analysis,":[53],"and":[54],"need":[56],"resolving":[58],"reflective":[59,77,100],"calls":[60,78],"under":[61],"IIEs.":[62],"We":[63],"present":[64],"Ripple,":[65],"first":[67],"IIE-aware":[68],"analysis":[71],"apps":[74,89],"that":[75,121],"resolves":[76],"more":[79],"soundly":[80],"than":[81],"inference.":[83],"Validation":[84],"with":[85,102],"17":[86],"popular":[87],"from":[90],"Google":[91],"Play":[92],"demonstrates":[93],"effectiveness":[95],"Ripple":[97,111],"discovering":[99],"targets":[101],"a":[103,109],"low":[104],"false":[105],"positive":[106],"rate.":[107],"As":[108],"result,":[110],"enables":[112],"FlowDroid":[113],"find":[115],"hundreds":[116],"sensitive":[118],"data":[119],"leakages":[120],"would":[122],"otherwise":[123],"be":[124],"missed.":[125]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-02-10T00:00:00"}
