ConfigDroid: Configuration-aware GUI testing of Android Applications

Teng Wang
{"title":"ConfigDroid: Configuration-aware GUI testing of Android Applications","authors":"Teng Wang","doi":"10.1109/ICCECE58074.2023.10135349","DOIUrl":null,"url":null,"abstract":"Android applications (a.k.a., Android apps) have developed rapidly in the last decade, and have become an indispensable part in people's lives. However, it is challenging to guarantee their quality and reliability. The prevalence and severity of Android apps issues have driven the design and development of a number of detection and testing techniques. However, these techniques mainly target the generation of test sequences using GUI events in the applications, lacking of attentions to complex Android system configurations. In this paper, we conducted an in-depth study on real-world Android bugs related with configurations from 20 open-source popular Android applications, to help understand the characteristics of these bugs. We find the majority of configurations-related Android bugs would lead to catastrophic consequences, e.g., crash and hang. Based on the study, we design and implement ConfigDroid, a tool for configuration-aware GUI testing of Android applications. We use 10 open-source popular Android applications to evaluate the effectiveness. The result shows that, ConfigDroid can detect 4 more unique configuration-related crashes than state-of-the-art tools, Monkey and Stoat.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCECE58074.2023.10135349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Android applications (a.k.a., Android apps) have developed rapidly in the last decade, and have become an indispensable part in people's lives. However, it is challenging to guarantee their quality and reliability. The prevalence and severity of Android apps issues have driven the design and development of a number of detection and testing techniques. However, these techniques mainly target the generation of test sequences using GUI events in the applications, lacking of attentions to complex Android system configurations. In this paper, we conducted an in-depth study on real-world Android bugs related with configurations from 20 open-source popular Android applications, to help understand the characteristics of these bugs. We find the majority of configurations-related Android bugs would lead to catastrophic consequences, e.g., crash and hang. Based on the study, we design and implement ConfigDroid, a tool for configuration-aware GUI testing of Android applications. We use 10 open-source popular Android applications to evaluate the effectiveness. The result shows that, ConfigDroid can detect 4 more unique configuration-related crashes than state-of-the-art tools, Monkey and Stoat.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ConfigDroid: Android应用程序的配置感知GUI测试
Android应用程序(又称安卓应用程序)在过去的十年中发展迅速,已经成为人们生活中不可或缺的一部分。然而,如何保证它们的质量和可靠性是一个挑战。Android应用程序问题的普遍性和严重性推动了许多检测和测试技术的设计和开发。然而,这些技术主要针对在应用程序中使用GUI事件生成测试序列,缺乏对复杂Android系统配置的关注。在本文中,我们深入研究了20个开源流行Android应用程序中与配置相关的真实Android漏洞,以帮助了解这些漏洞的特征。我们发现大多数与配置相关的Android漏洞会导致灾难性的后果,例如崩溃和挂起。在此基础上,设计并实现了基于配置感知的Android应用程序GUI测试工具ConfigDroid。我们使用10个开源的流行Android应用程序来评估其有效性。结果表明,ConfigDroid可以检测到比最先进的工具Monkey和Stoat更多的独特配置相关崩溃。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Clutter Edge and Target Detection Method Based on Central Moment Feature Adaptive short-time Fourier transform based on reinforcement learning Design and implementation of carrier aggregation and secure communication in distribution field network Power data attribution revocation searchable encrypted cloud storage Research of Intrusion Detection Based on Neural Network Optimized by Sparrow Search Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1