Reference : Fine-grained Code Coverage Measurement in Automated Black-box Android Testing
Scientific journals : Article
Engineering, computing & technology : Computer science
Security, Reliability and Trust; Computational Sciences
http://hdl.handle.net/10993/44477
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing
English
Pilgun, Aleksandr mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PI Mauw >]
Gadyatskaya, Olga mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Zhauniarovich, Yury mailto []
Dashevskyi, Stanislav mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Kushniarou, Artsiom mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Mauw, Sjouke mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
6-Jul-2020
ACM Transactions on Software Engineering and Methodology
Association for Computing Machinery (ACM)
29
4
1-35
Yes
1049-331X
United States
[en] Android ; Automated Software Testing ; Code Coverage ; Instrumentation ; Dynamic analysis
[en] Today, there are millions of third-party Android applications. Some of them are buggy or even malicious. To identify such applications, novel frameworks for automated black-box testing and dynamic analysis are being developed by the Android community. Code coverage is one of the most common metrics for evaluating effectiveness of these frameworks. Furthermore, code coverage is used as a fitness function for guiding evolutionary and fuzzy testing techniques. However, there are no reliable tools for measuring fine-grained code coverage in black-box Android app testing.

We present the Android Code coVerage Tool, ACVTool for short, that instruments Android apps and measures code coverage in the black-box setting at class, method and instruction granularity. ACVTool has successfully instrumented 96.9% of apps in our experiments. It introduces a negligible instrumentation time overhead, and its runtime overhead is acceptable for automated testing tools. We demonstrate practical value of ACVTool in a large-scale experiment with Sapienz, a state-of-art automated testing tool. Using ACVTool on the same cohort of apps, we have compared different coverage granularities applied by Sapienz in terms of the found amount of crashes. Our results show that none of the applied coverage granularities clearly outperforms others in this aspect.
Fonds National de la Recherche - FnR
FNR11289380 > Aleksandr Pilgun > > Systematically Exploring Semantic App Models for Android > 15/11/2016 > 14/11/2020 > 2016
http://hdl.handle.net/10993/44477
10.1145/3395042
https://dl.acm.org/doi/abs/10.1145/3395042
Copyright is held by the owner/author(s). Publication rights licensed to ACM.
https://doi.org/10.1145/3395042
FnR ; FNR10404933 > Olga Gadyatskaya > COMMA > Combating Context-Sensitive Mobile Malware > 01/04/2016 > 31/03/2019 > 2015

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
acvtool_cr.pdfAuthor preprint1.42 MBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.