{"id":"https://openalex.org/W7138923344","doi":"https://doi.org/10.1186/s42400-026-00560-z","title":"Exploring the android TLS certificate ecosystem in China","display_name":"Exploring the android TLS certificate ecosystem in China","publication_year":2026,"publication_date":"2026-03-18","ids":{"openalex":"https://openalex.org/W7138923344","doi":"https://doi.org/10.1186/s42400-026-00560-z"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-026-00560-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00560-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00560-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00560-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101848344","display_name":"Peng Yuan","orcid":"https://orcid.org/0000-0001-9906-9275"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Yuan","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shuhui Chen","orcid":"https://orcid.org/0000-0001-7413-8174"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuhui Chen","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072186998","display_name":"Ziling Wei","orcid":"https://orcid.org/0000-0002-7858-1445"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziling Wei","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129790763","display_name":"Fei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Wang","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130199792","display_name":"Zhenhao Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhao Luo","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, No. 137 Yanwachi Street, Changsha, 410073, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62300242,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.6876999735832214,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.6876999735832214,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.09369999915361404,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.02239999920129776,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.7372000217437744},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.6309000253677368},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5860999822616577},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.5188000202178955},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.4945000112056732},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4487000107765198},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.42419999837875366},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4065999984741211}],"concepts":[{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.7372000217437744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6546000242233276},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.6309000253677368},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5860999822616577},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5705000162124634},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.5188000202178955},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.4945000112056732},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4487000107765198},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.42419999837875366},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4065999984741211},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.40230000019073486},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.40230000019073486},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34549999237060547},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3443000018596649},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33869999647140503},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.31869998574256897},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3061000108718872},{"id":"https://openalex.org/C2778304055","wikidata":"https://www.wikidata.org/wiki/Q657474","display_name":"Beijing","level":3,"score":0.2824000120162964},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C67405866","wikidata":"https://www.wikidata.org/wiki/Q6007261","display_name":"Implicit certificate","level":5,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-026-00560-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00560-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00560-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:04408970ad4243f0bb3a21d921c89d33","is_oa":true,"landing_page_url":"https://doaj.org/article/04408970ad4243f0bb3a21d921c89d33","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-026-00560-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00560-z","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00560-z.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1642476318","display_name":null,"funder_award_id":"BE2023004-4","funder_id":"https://openalex.org/F4320327777","funder_display_name":"Jiangsu Provincial Key Research and Development Program"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3253723913","display_name":null,"funder_award_id":"U22B200","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5557834587","display_name":null,"funder_award_id":"No. 62202486","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6577305832","display_name":null,"funder_award_id":"2023004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6760061280","display_name":null,"funder_award_id":"U22B2005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6801379600","display_name":null,"funder_award_id":"No. 2024RC3139","funder_id":"https://openalex.org/F4320335801","funder_display_name":"Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province"},{"id":"https://openalex.org/G8024645891","display_name":null,"funder_award_id":"62202486","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G841229755","display_name":null,"funder_award_id":"No. BE2023004-4","funder_id":"https://openalex.org/F4320327777","funder_display_name":"Jiangsu Provincial Key Research and Development Program"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320327777","display_name":"Jiangsu Provincial Key Research and Development Program","ror":null},{"id":"https://openalex.org/F4320335801","display_name":"Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7138923344.pdf","grobid_xml":"https://content.openalex.org/works/W7138923344.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1656731780","https://openalex.org/W1733713784","https://openalex.org/W2056494114","https://openalex.org/W2103239853","https://openalex.org/W2103370348","https://openalex.org/W2104899073","https://openalex.org/W2122538967","https://openalex.org/W2129426180","https://openalex.org/W2130867912","https://openalex.org/W2291547752","https://openalex.org/W2398528487","https://openalex.org/W2545514071","https://openalex.org/W2550748725","https://openalex.org/W2915352631","https://openalex.org/W3044048717","https://openalex.org/W3091867980","https://openalex.org/W3094128402","https://openalex.org/W3172154247","https://openalex.org/W3194090151","https://openalex.org/W4289783241","https://openalex.org/W4298051233"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1],"HTTPS":[2],"certificate":[3,15,47,69,160],"ecosystem":[4,48],"has":[5,27],"long":[6],"been":[7],"a":[8,138],"key":[9],"topic":[10],"in":[11,37,61,156,163],"cybersecurity,":[12],"yet":[13],"the":[14,30,44,62,153,157],"landscape":[16],"of":[17,32,127,165],"Android":[18,46,159],"applications":[19,60],"remains":[20,49],"insufficiently":[21],"studied.":[22],"In":[23,51],"particular,":[24],"while":[25],"China":[26],"actively":[28],"promoted":[29],"adoption":[31],"China\u2019s":[33,106],"national":[34,107],"cryptographic":[35,108],"algorithms":[36,109],"recent":[38],"years,":[39],"their":[40,99],"actual":[41],"deployment":[42,118],"within":[43,113],"Chinese":[45,158],"unclear.":[50],"this":[52],"study,":[53],"we":[54,77],"analyzed":[55],"TLS":[56],"traffic":[57],"from":[58],"19,980":[59],"Huawei":[63],"App":[64],"Market":[65],"and":[66,167,170],"extracted":[67],"131,933":[68],"chains.":[70],"While":[71],"most":[72],"certificates":[73,80,91,104,129],"are":[74],"properly":[75],"configured,":[76],"identified":[78],"530":[79],"with":[81],"security":[82,100,166],"risks,":[83],"affecting":[84],"2043":[85],"applications.":[86],"Notably,":[87],"three":[88],"SDK-related":[89],"risk":[90],"were":[92,110],"propagated":[93],"across":[94],"1462":[95],"applications,":[96,116],"substantially":[97],"widening":[98],"impact.":[101],"Only":[102],"94":[103],"using":[105],"found,":[111],"all":[112],"89":[114],"financial":[115],"indicating":[117],"driven":[119],"mainly":[120],"by":[121],"regulatory":[122],"compliance.":[123],"Furthermore,":[124],"nearly":[125],"99%":[126],"leaf":[128],"chain":[130],"back":[131],"to":[132],"foreign":[133],"root":[134],"Certificate":[135],"Authorities,":[136],"underscoring":[137],"strong":[139],"dependency":[140],"that":[141],"may":[142],"pose":[143],"digital":[144,168],"sovereignty":[145],"risks":[146],"under":[147],"geopolitical":[148],"uncertainty.":[149],"This":[150],"study":[151],"highlights":[152],"existing":[154],"challenges":[155],"ecosystem,":[161],"particularly":[162],"terms":[164],"sovereignty,":[169],"offers":[171],"relevant":[172],"recommendations":[173],"for":[174],"improvement.":[175]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-03-20T00:00:00"}
