Commit 832b1793 authored by Paolo Calciati's avatar Paolo Calciati
Browse files

added all papers cited in msr paper

parent 2f029ab4
......@@ -187,12 +187,12 @@
crossref = "NDSS2016",
}
@inproceedings{conf/malware/AbrahamABLT15,
@inproceedings{Abraham:2015:GGT,
author = {Abraham, A. and Andriatsimandefitra, Radoniaina and
Brunelat, A. and Lalande, Jean-François and Tong,
V. Viet Triem},
title = {GroddDroid: a gorilla for triggering malicious behaviors.},
crossref = {conf/malware/2015},
crossref = "MALWARE2015",
isbn = {978-1-5090-0319-8},
keywords = {dblp},
pages = {119-127},
......@@ -271,4 +271,142 @@
Android Application Crashes},
crossref = "ICST2016",
publisher = {IEEE},
}
\ No newline at end of file
}
@inproceedings{Mao:2016:SMA:2931037.2931054,
author = {Mao, Ke and Harman, Mark and Jia, Yue},
title = {Sapienz: Multi-objective Automated Testing for Android
Applications},
crossref = "ISSTA2016",
isbn = {978-1-4503-4390-9},
pages = {94--105},
doi = {10.1145/2931037.2931054},
publisher = {ACM},
keywords = {Android, Search-based software testing, Test generation},
}
@inproceedings{Li:2017:LSP,
author = {Li, Menghao and Wang, Wei and Wang, Pei and Wang, Shuai and Wu, Dinghao and Liu, Jian and Xue, Rui and Huo, Wei},
title = {LibD: Scalable and Precise Third-party Library Detection in Android Markets},
crossref = "ICSE2017",
isbn = {978-1-5386-3868-2},
pages = {335--346},
doi = {10.1109/ICSE.2017.38},
acmid = {3097409},
publisher = {IEEE Press},
keywords = {android, software mining, third-party library},
}
@inproceedings{Derr:2017:KUA,
author = {Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar,
Yasemin and Backes, Michael},
title = {Keep me Updated: An Empirical Study of Third-Party Library
Updatability on Android},
pages = {2187-2200},
crossref = "CCS2017",
}
@inproceedings{Zhang:2013:EMA:2501553.2501554,
author = {Zhang, Jack and Sagar, Shikhar and Shihab, Emad},
title = {The Evolution of Mobile Apps: An Exploratory Study},
crossref = "DeMobile2013",
isbn = {978-1-4503-2312-3},
pages = {1--8},
doi = {10.1145/2501553.2501554},
publisher = {ACM},
keywords = {Software evolution, mobile applica- tions, mobile software engineering},
}
@inproceedings{Grano:2017:AAU,
author = {Grano, Giovanni and Di Sorbo, Andrea and Mercaldo, Francesco and Visaggio, Corrado A. and Canfora, Gerardo and Panichella, Sebastiano},
title = {Android Apps and User Feedback: A Dataset for Software Evolution and Quality Improvement},
crossref = "WAMA2017",
isbn = {978-1-4503-5158-4},
pages = {8--11},
doi = {10.1145/3121264.3121266},
publisher = {ACM},
keywords = {App Reviews, Mobile Applications, Software Maintenance and Evolution, Software Quality},
}
@inproceedings{Hecht:2015:TSQ,
author = {Hecht, Geoffrey and Benomar, Omar and Rouvoy, Romain and Moha, Naouel and Duchien, Laurence},
title = {Tracking the Software Quality of Android Applications Along Their Evolution (T)},
crossref = "ASE2015",
isbn = {978-1-5090-0025-8},
pages = {236--247},
doi = {10.1109/ASE.2015.46},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
@inproceedings{Allix:Androzoo:MSR:2016,
author = {Allix, Kevin and Bissyand{\'e}, Tegawend{\'e} F. and Klein, Jacques and Le Traon, Yves},
title = {{AndroZoo}: Collecting Millions of Android Apps for the Research Community},
crossref = "MSR2016",
isbn = {978-1-4503-4186-8},
location = {Austin, Texas},
pages = {468--471},
numpages = 4,
url = {http://doi.acm.org/10.1145/2901739.2903508},
doi = {10.1145/2901739.2903508},
acmid = 2903508,
publisher = {ACM},
address = {New York, NY, USA},
keywords = {APK, android applications, software repository},
}
@inproceedings{Ng:2014:AAS,
author = {Ng, Yi Ying and Zhou, Hucheng and Ji, Zhiyuan and Luo, Huan
and Dong, Yuan},
title = {Which Android App Store Can Be Trusted in China?},
crossref = "COMPSAC2014",
isbn = {978-1-4799-3575-8},
pages = {509--518},
doi = {10.1109/COMPSAC.2014.95},
publisher = {IEEE Computer Society},
keywords = {Android, app store, APK, trustworthy, severity ranking},
}
@inproceedings {USENIX:Backes16,
author = {Michael Backes and Sven Bugiel and Erik Derr and Patrick
McDaniel and Damien Octeau and Sebastian Weisgerber},
title = {On Demystifying the Android Application Framework:
Re-Visiting Android Permission Specification
Analysis},
crossref = "USENIXSec2016",
isbn = {978-1-931971-32-4},
pages = {1101--1118},
publisher = {{USENIX} Association},
}
@article{DBLP:journals/ese/AllixBJKST16,
author = {Kevin Allix and
Tegawend{\'{e}} F. Bissyand{\'{e}} and
Quentin J{\'{e}}rome and
Jacques Klein and
Radu State and
Yves Le Traon},
title = {Empirical assessment of machine learning-based malware detectors for
Android - Measuring the gap between in-the-lab and in-the-wild validation
scenarios},
journal = JEmpiricalSE,
volume = {21},
number = {1},
pages = {183--211},
year = {2016},
doi = {10.1007/s10664-014-9352-6},
}
@inproceedings{Bartel:2012:ASP:2351676.2351722,
author = {Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and
Monperrus, Martin},
title = {Automatically Securing Permission-based Software by Reducing
the Attack Surface: An Application to Android},
crossref = {ASE2012},
isbn = {978-1-4503-1204-2},
pages = {274--277},
doi = {10.1145/2351676.2351722},
publisher = {ACM},
keywords = {Android, Permissions, Soot, call-graph, permission-based
software, security, static analysis},
}
......@@ -811,6 +811,13 @@
address = "Vienna, Austria",
month = oct,
}
@Proceedings{CCS2017,
title = "CCS 2017: Proceedings of the 24th ACM Conference on Computer and Communications Security",
booktitle = "CCS 2017: Proceedings of the 24th ACM Conference on Computer and Communications Security",
year = 2017,
address = "Dallas, TX, USA",
month = oct,
}
@Proceedings{ASIACCS2017,
title = "ASIACCS 2017: Proceedings of the ACM Asia Conference on Computer and Communications Security",
......@@ -939,6 +946,15 @@
month = mar,
}
@Proceedings{COMPSAC2014,
title = "COMPSAC 2014: Proceedings of the 38th Annual International Computers, Software \& Applications Conference",
booktitle = "COMPSAC 2014: Proceedings of thehe 38th Annual International Computers, Software \& Applications Conference",
year = 2014,
address = "V{\aa}ster{\aa}s, Sweden",
month = jul,
}
% The "S" didn't start standing for "and Systems" until 1998
@Proceedings{COOTS97,
title = "COOTS '97: Proceedings of the Third USENIX Conference on Object-Oriented Technologies",
......@@ -1056,6 +1072,14 @@
month = jul,
}
@Proceedings{DeMobile2013,
title = "DeMobile 2013: 1st international Workshop on Software Development Lifecycle for Mobile",
booktitle = "DeMobile 2013: 1st international Workshop on Software Development Lifecycle for Mobile",
year = 2013,
address = "Saint Petersburg, Russia",
month = aug,
}
@Proceedings{RDL2004,
title = "RDL 2004: Workshop on Revival of Dynamic Languages",
booktitle = "RDL 2004: Workshop on Revival of Dynamic Languages",
......@@ -3469,6 +3493,13 @@
address = "Florence, Italy",
month = may,
}
@Proceedings{MSR2016,
title = "MSR 2016: 13th Working Conference on Mining Software Repositories",
booktitle = "MSR 2016: 13th Working Conference on Mining Software Repositories",
year = 2016,
address = "Austin, TX, USA",
month = may,
}
@Proceedings{MSR2017,
title = "MSR 2017: 14th International Conference on Mining
Software Repositories",
......@@ -6105,6 +6136,13 @@
address = "Washington, DC, USA",
month = aug,
}
@Proceedings{USENIXSec2016,
title = "USENIX Security: 25th USENIX Security Symposium",
booktitle = "USENIX Security: 25th USENIX Security Symposium",
year = 2016,
address = "Austin, TX, USA",
month = aug,
}
@Proceedings{VaMoS2012,
title = "VaMoS 2012: Proceedings of the Sixth International Workshop on Variability Modeling of Software-Intensive Systems",
......@@ -6240,6 +6278,13 @@
month = jul,
}
@Proceedings{WAMA2017,
title = "WAMA 2017: Proceedings of the 2nd International Workshop on App Market Analytics",
booktitle = "WAMA 2017: Proceedings of the 2nd International Workshop on App Market Analytics",
year = 2017,
address = "Paderborn, Germany",
month = sep,
}
@Proceedings{W2SP2011,
title = "W2SP: Web 2.0 Security and Privacy Workshop",
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment