{"id":"https://openalex.org/W2770813333","doi":"https://doi.org/10.1145/3136560.3136595","title":"A Study of Static Analysis Tools to Detect Vulnerabilities of Branchless Banking Applications in Developing Countries","display_name":"A Study of Static Analysis Tools to Detect Vulnerabilities of Branchless Banking Applications in Developing Countries","publication_year":2017,"publication_date":"2017-11-16","ids":{"openalex":"https://openalex.org/W2770813333","doi":"https://doi.org/10.1145/3136560.3136595","mag":"2770813333"},"language":"en","primary_location":{"id":"doi:10.1145/3136560.3136595","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3136560.3136595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth International Conference on Information and Communication Technologies and Development","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006576802","display_name":"Fahad Ibrar","orcid":null},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Fahad Ibrar","raw_affiliation_strings":["Information Technology University"],"affiliations":[{"raw_affiliation_string":"Information Technology University","institution_ids":["https://openalex.org/I1323252656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041862790","display_name":"Hamza Saleem","orcid":"https://orcid.org/0000-0001-5189-6861"},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Hamza Saleem","raw_affiliation_strings":["Information Technology University"],"affiliations":[{"raw_affiliation_string":"Information Technology University","institution_ids":["https://openalex.org/I1323252656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046597905","display_name":"Sam Castle","orcid":null},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sam Castle","raw_affiliation_strings":["The University of Washington"],"affiliations":[{"raw_affiliation_string":"The University of Washington","institution_ids":["https://openalex.org/I201448701"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054186434","display_name":"Muhammad Zubair Malik","orcid":"https://orcid.org/0000-0001-5574-2288"},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Zubair Malik","raw_affiliation_strings":["Information Technology University"],"affiliations":[{"raw_affiliation_string":"Information Technology University","institution_ids":["https://openalex.org/I1323252656"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006576802"],"corresponding_institution_ids":["https://openalex.org/I1323252656"],"apc_list":null,"apc_paid":null,"fwci":0.3698,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.5940109,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unbanked","display_name":"Unbanked","score":0.7111477255821228},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6849914789199829},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6137112379074097},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5421678423881531},{"id":"https://openalex.org/keywords/distributed-file-system","display_name":"Distributed File System","score":0.5262017846107483},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4946143329143524},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48295873403549194},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4533977508544922},{"id":"https://openalex.org/keywords/financial-services","display_name":"Financial services","score":0.2995162010192871},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.25306737422943115},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24974662065505981},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.200656920671463},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.16670283675193787},{"id":"https://openalex.org/keywords/financial-inclusion","display_name":"Financial inclusion","score":0.12343659996986389},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.10254654288291931}],"concepts":[{"id":"https://openalex.org/C2778430866","wikidata":"https://www.wikidata.org/wiki/Q3061848","display_name":"Unbanked","level":4,"score":0.7111477255821228},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6849914789199829},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6137112379074097},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5421678423881531},{"id":"https://openalex.org/C152043487","wikidata":"https://www.wikidata.org/wiki/Q1229600","display_name":"Distributed File System","level":2,"score":0.5262017846107483},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4946143329143524},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48295873403549194},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4533977508544922},{"id":"https://openalex.org/C139043278","wikidata":"https://www.wikidata.org/wiki/Q837171","display_name":"Financial services","level":2,"score":0.2995162010192871},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.25306737422943115},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24974662065505981},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.200656920671463},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.16670283675193787},{"id":"https://openalex.org/C2779251847","wikidata":"https://www.wikidata.org/wiki/Q60852","display_name":"Financial inclusion","level":3,"score":0.12343659996986389},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.10254654288291931},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3136560.3136595","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3136560.3136595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth International Conference on Information and Communication Technologies and Development","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337373","display_name":"Center for Information Technology","ror":"https://ror.org/03jh5a977"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1464836909","https://openalex.org/W1553894716","https://openalex.org/W1994588724","https://openalex.org/W2099607071","https://openalex.org/W2167661907","https://openalex.org/W2522234048","https://openalex.org/W2558574039","https://openalex.org/W2628359750"],"related_works":["https://openalex.org/W2791662519","https://openalex.org/W1486481742","https://openalex.org/W4389273713","https://openalex.org/W3036603968","https://openalex.org/W1761184020","https://openalex.org/W2605404816","https://openalex.org/W4299123576","https://openalex.org/W2949850718","https://openalex.org/W4394862968","https://openalex.org/W2334842536"],"abstract_inverted_index":{"The":[0],"ubiquity":[1],"of":[2,15,37,126],"smart":[3],"phones":[4],"and":[5,56,128,130],"their":[6],"prevalence":[7],"among":[8],"the":[9,13,25,31,121,124],"underprivileged":[10],"has":[11,29],"enabled":[12],"delivery":[14],"financial":[16],"services":[17],"to":[18,34,59,135],"previously":[19],"unbanked":[20],"through":[21],"digital":[22,38],"means.":[23],"At":[24],"same":[26,32],"time":[27],"it":[28],"exposed":[30],"people":[33],"security":[35,74],"vulnerabilities":[36,91,122],"infrastructure.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,104],"analyze":[44],"10":[45],"Android":[46],"Digital":[47],"Financial":[48],"Services":[49],"(DFS)":[50],"applications":[51,85,99],"using":[52],"static":[53,63,109],"analysis":[54,110],"tools":[55,111],"present":[57],"results":[58],"show":[60,82],"that":[61,83,106],"off-the-shelf":[62],"bug":[64,138],"checking":[65],"tools,":[66],"can":[67],"be":[68],"useful":[69],"in":[70,76,92,123],"finding":[71],"many":[72],"critical":[73],"bugs":[75],"DFS":[77,84,98,116],"applications.":[78],"Our":[79],"findings":[80],"also":[81],"from":[86,100],"developing":[87],"countries":[88],"have":[89,112],"more":[90],"application":[93],"specific":[94,117],"code":[95],"compared":[96],"with":[97],"developed":[101],"countries.":[102],"However,":[103],"observe":[105],"general":[107],"purpose":[108],"low":[113],"specificity":[114],"for":[115],"bugs,":[118],"such":[119],"as":[120],"use":[125],"cryptography":[127],"networking,":[129],"there":[131],"is":[132],"a":[133],"need":[134],"develop":[136],"better":[137],"detection":[139],"tools.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
