1. Amann S, Nadi S, Nguyen H A, MUBench: a benchmark for API-misuse detectors[C]//Proceedings of the 13th International Conference on Mining Software Repositories. 2016: 464-467.
2. Egele M Brumley D Fratantonio Y An empirical study of cryptographic misuse in android applications[C]//Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013: 73-84.
3. Lazar D, Chen H, Wang X, Why does cryptographic software fail? A case study and open problems[C]//Proceedings of 5th Asia-Pacific Workshop on Systems. 2014: 1-7.
4. Lokhande B, Dhavale S. Overview of information flow tracking techniques based on taint analysis for android[C]//2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2014: 749-753.
5. Lazar D, Chen H, Wang X, Why does cryptographic software fail? A case study and open problems[C]//Proceedings of 5th Asia-Pacific Workshop on Systems. 2014: 1-7.