logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 7: 078102(2017) https://doi.org/10.1007/s11432-015-0825-3

Driving Android apps to trigger target API invocations based on activity and GUI filtering

More info
  • ReceivedJun 1, 2016
  • AcceptedAug 12, 2016
  • PublishedNov 9, 2016

Abstract


Funded by

Open Project Program of the State Key Laboratory of Information Security(2015-MS-04)

National Natural Science Foundation of China(61272481)

National Natural Science Foundation of China(61303239)

National Natural Science Foundation of China(61572460)

Open Project Program of the State Key Laboratory of Information Security(2015-MS-06)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572460, 61272481, 61303239) and Open Project Program of the State Key Laboratory of Information Security (Grant Nos. 2015-MS-06, 2015-MS-04).


References

[1] Amalfitano D, Fasolino A R, Tramontana P, et al. Using GUI ripping for automated testing of Android applications. In: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, Essen, 2012. 258--261. Google Scholar

[2] Machiry A, Tahiliani R, Naik M. Dynodroid: an input generation system for android apps. In: Proceedings of the 9th Joint Meeting on Foundations of Software Engineering, Saint Petersburg, 2013. 224--234. Google Scholar

[3] Bhoraskar R, Han S, Jeon J, et al. Brahmastra: Driving apps to test the security of third-party components. In: Proceedings of the 23rd USENIX Conference on Security, San Diego, 2014. 1021--1036. Google Scholar

[4] Zheng C, Zhu S, Dai S, et al. Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications. In: Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, 2012. 93--104. Google Scholar

[5] Wong M Y, Lie D. IntelliDroid: a targeted input generator for the dynamic analysis of Android malware. In: Proceedings of the 23rd Network and Distributed System Security Symposium, San Diego, 2016. Google Scholar

[6] Azim T, Neamtiu I. Targeted and depth-first exploration for systematic testing of android apps. ACM SIGPLAN Notices, 2013, 48: 641-660 CrossRef Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号