BIBLIOGRAPHY 79
[19]
S. Pouryousef, M. Rezaiee, and A. Chizari. Let me Join Two Worlds! Analyzing
the Integration of Web and Native Technologies in Hybrid Mobile Apps. In 2018
17th IEEE International Conference On Trust, Security And Privacy In Computing
And Communications/ 12th IEEE International Conference On Big Data Science
And Engineering (TrustCom/BigDataSE), pages 1814–1819, Aug 2018.
[20]
G. Richards, C. Hammer, B. Burg, and J. Vitek. The Eval That Men Do. In
Mira Mezini, editor, ECOOP 2011 – Object-Oriented Programming, pages 52–78,
Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
[21]
C. Rizzo, L. Cavallaro, and J. Kinder. BabelView: Evaluating the Impact of Code
Injection Attacks in Mobile Webviews. In Michael Bailey, Thorsten Holz, Manolis
Stamatogiannakis, and Sotiris Ioannidis, editors, Research in Attacks, Intrusions,
and Defenses, pages 25–46, Cham, 2018. Springer International Publishing.
[22]
W. Song, Q. Huang, and J. Huang. Understanding JavaScript Vulnerabilities in
Large Real-World Android Applications. IEEE Transactions on Dependable and
Secure Computing, pages 1–1, 2018.
[23]
L. Weichselbaum, M. Spagnuolo, S. Lekies, and A. Janc. CSP Is Dead, Long
Live CSP! On the Insecurity of Whitelists and the Future of Content Security
Policy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, CCS ’16, page 1376–1387, New York, NY, USA, 2016.
Association for Computing Machinery.
[24]
M. Willocx, J. Vossaert, and V. Naessens. Security Analysis of Cordova Appli-
cations in Google Play. In Proceedings of the 12th International Conference
on Availability, Reliability and Security, ARES ’17, New York, NY, USA, 2017.
Association for Computing Machinery.
[25]
World Wide Web Consortium. Content Security Policy Level 3 (Working
Draft).
https://www.w3.org/TR/2018/WD-CSP3-20181015/
. Ac-
cessed: 2019-12-13.
[26]
G. Yang, A. Mendoza, J. Zhang, and G. Gu. Precisely and Scalably Vetting
JavaScript Bridge in Android Hybrid Apps. In Marc Dacier, Michael Bailey,
Michalis Polychronakis, and Manos Antonakakis, editors, Research in Attacks,
Intrusions, and Defenses, pages 143–166, Cham, 2017. Springer International
Publishing.
[27]
L. Yang, X. Cui, C. Wang, S. Guo, and X. Xu. Risk Analysis of Exposed Methods
to JavaScript in Hybrid Apps. In 2016 IEEE Trustcom/BigDataSE/ISPA, pages
458–464, Aug 2016.