Article (Périodiques scientifiques)
ANCHOR: locating android framework-specific crashing faults
KONG, Pingfan; Li, Li; GAO, Jun et al.
2021In Automated Software Engineering
Peer reviewed vérifié par ORBi
 

Documents


Texte intégral
anchor-ase.pdf
Postprint Auteur (1.25 MB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Android Crash; Crashing Fault; Fault Localization
Résumé :
[en] Android framework-specific app crashes are hard to debug. Indeed, the callback-based event-driven mechanism of Android challenges crash localization techniques that are developed for traditional Java programs. The key challenge stems from the fact that the buggy code location may not even be listed within the stack trace. For example, our empirical study on 500 framework-specific crashes from an open benchmark has revealed that 37 percent of the crash types are related to bugs that are outside the stack traces. Moreover, Android programs are a mixture of code and extra-code artifacts such as the Manifest file. The fact that any artifact can lead to failures in the app execution creates the need to position the localization target beyond the code realm. In this paper, we propose Anchor, a two-phase suspicious bug location suggestion tool. Anchor specializes in finding crash-inducing bugs outside the stack trace. Anchor is lightweight and source code independent since it only requires the crash message and the apk file to locate the fault. Experimental results, collected via cross-validation and in-the- wild dataset evaluation, show that Anchor is effective in locating Android framework-specific crashing faults.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
KONG, Pingfan ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
Li, Li;  Monash University
GAO, Jun ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
RIOM, Timothée ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
Zhao, Yanjie;  Monash University
BISSYANDE, Tegawendé François D Assise  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
KLEIN, Jacques  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
ANCHOR: locating android framework-specific crashing faults
Date de publication/diffusion :
novembre 2021
Titre du périodique :
Automated Software Engineering
ISSN :
0928-8910
eISSN :
1573-7535
Maison d'édition :
Kluwer Academic Publishers, Pays-Bas
Peer reviewed :
Peer reviewed vérifié par ORBi
Focus Area :
Computational Sciences
Projet FnR :
FNR11693861 - Characterization Of Malicious Code In Mobile Apps: Towards Accurate And Explainable Malware Detection, 2017 (01/06/2018-31/12/2021) - Jacques Klein
Organisme subsidiant :
FNR - Fonds National de la Recherche
Disponible sur ORBilu :
depuis le 15 janvier 2022

Statistiques


Nombre de vues
146 (dont 24 Unilu)
Nombre de téléchargements
164 (dont 7 Unilu)

citations Scopus®
 
10
citations Scopus®
sans auto-citations
9
OpenCitations
 
1
citations OpenAlex
 
9
citations WoS
 
5

Bibliographie


Publications similaires



Contacter ORBilu