Paper published in a book (Scientific congresses, symposiums and conference proceedings)
AndroLog: Android Instrumentation and Code Coverage Analysis
SAMHI, Jordan; Zeller, Andreas
2024In d�Amorim, Marcelo (Ed.) FSE Companion - Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering
Peer reviewed
 

Files


Full Text
paper.pdf
Author postprint (1.22 MB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Android Instrumentation; Code Coverage; Dynamic Analysis; Android apps; Android instrumentation; Black boxes; Code coverage; Coverage analysis; Dynamics analysis; Malicious codes; Plantings; Runtimes; Source codes; Software
Abstract :
[en] Dynamic analysis has emerged as a pivotal technique for testing Android apps, enabling the detection of bugs, malicious code, and vulnerabilities. A key metric in evaluating the efficacy of tools employed by both research and practitioner communities for this purpose is code coverage. Obtaining code coverage typically requires planting probes within apps to gather coverage data during runtime. Due to the general unavailability of source code to analysts, there is a necessity for instrumenting apps to insert these probes in black-box environments. However, the tools available for such instrumentation are limited in their reliability and require intrusive changes interfering with apps’ functionalities. This paper introduces AndroLog, a novel tool developed on top of the Soot framework, designed to provide fine-grained coverage information at multiple levels, including class, methods, statements, and Android components. In contrast to existing tools, AndroLog leaves the responsibility to test apps to analysts, and its motto is simplicity. As demonstrated in this paper, AndroLog can instrument up to 98% of recent Android apps compared to existing tools with 79% and 48% respectively for COSMO and ACVTool. AndroLog also stands out for its potential for future enhancements to increase granularity on demand. We make AndroLog available to the community and provide a video demonstration of AndroLog.
Research center :
CISPA Helmholtz Center for Information Security
Disciplines :
Computer science
Author, co-author :
SAMHI, Jordan  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX ; CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
Zeller, Andreas ;  CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
External co-authors :
yes
Language :
English
Title :
AndroLog: Android Instrumentation and Code Coverage Analysis
Publication date :
10 July 2024
Event name :
Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering
Event place :
Porto de Galinhas, Bra
Event date :
15-07-2024 => 19-07-2024
Main work title :
FSE Companion - Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering
Editor :
d�Amorim, Marcelo
Publisher :
Association for Computing Machinery, Inc
ISBN/EAN :
9798400706585
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Funders :
ACM SIGSOFT
Available on ORBilu :
since 05 November 2024

Statistics


Number of views
108 (0 by Unilu)
Number of downloads
27 (0 by Unilu)

Scopus citations®
 
3
Scopus citations®
without self-citations
1
OpenCitations
 
0
OpenAlex citations
 
3
WoS citations
 
2

Bibliography


Similar publications



Contact ORBilu