[en] The deluge of Android apps from third-party developers calls for sophisticated security testing and analysis techniques to inspect suspicious apps without accessing their source code. Code coverage is an important metric used in these techniques to evaluate their effectiveness, and even as a fitness function to help achieving better results in evolutionary and fuzzy approaches. Yet, so far there are no reliable tools for measuring fine-grained bytecode coverage of Android apps. In this work we present ACVTool that instruments Android apps and measures the smali code coverage at the level of classes, methods, and instructions. Tool repository: https://github.com/pilgun/acvtool
Centre de recherche :
- Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other
Disciplines :
Sciences informatiques
Auteur, co-auteur :
PILGUN, Aleksandr ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
GADYATSKAYA, Olga ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
DASHEVSKYI, Stanislav ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Zhauniarovich, Yury; Hamad Bin Khalifa University - HBKU > Qatar Computing Research Institute
Kushniarou, Artsiom; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
DEMO: An Effective Android Code Coverage Tool
Date de publication/diffusion :
15 octobre 2018
Nom de la manifestation :
Conference on Computer and Communications Security
Date de la manifestation :
from 15-10-2018 to 19-10-2018
Manifestation à portée :
International
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR11289380 - Systematically Exploring Semantic App Models For Android, 2016 (15/11/2016-14/11/2020) - Aleksandr Pilgun