首页 > 最新文献

Proceedings of the 1st International Workshop on Advances in Mobile App Analysis最新文献

英文 中文
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis 第一届移动应用程序分析进展国际研讨会论文集
{"title":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","authors":"","doi":"10.1145/3243218","DOIUrl":"https://doi.org/10.1145/3243218","url":null,"abstract":"","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114363404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poking the bear: lessons learned from probing three Android malware datasets 戳熊:探测三个Android恶意软件数据集的经验教训
Aleieldin Salem, A. Pretschner
To counter the continuous threat posed by Android malware, we attempted to devise a novel method based on active learning. Nonetheless, evaluating our active learning based method on three different Android malware datasets resulted in performance discrepancies. In an attempt to explain such inconsistencies, we postulated research questions and designed corresponding experiments to answer them. The results of our experiments unveiled the reasons behind the struggles of our method and, more importantly, revealed some limitations with the current Android malware detection methods that, we fear, can be leveraged by malware authors to evade detection. In this paper, we share with the research community our research questions, experiments, and findings to instigate researchers to devise methods to tackle such limitations.
为了应对Android恶意软件带来的持续威胁,我们尝试设计一种基于主动学习的新方法。尽管如此,在三种不同的Android恶意软件数据集上评估我们基于主动学习的方法会导致性能差异。为了解释这种不一致,我们假设了研究问题,并设计了相应的实验来回答这些问题。我们的实验结果揭示了我们的方法难以实现的原因,更重要的是,揭示了当前Android恶意软件检测方法的一些局限性,我们担心这些局限性可能被恶意软件作者利用来逃避检测。在本文中,我们与研究界分享我们的研究问题,实验和发现,以激励研究人员设计方法来解决这些限制。
{"title":"Poking the bear: lessons learned from probing three Android malware datasets","authors":"Aleieldin Salem, A. Pretschner","doi":"10.1145/3243218.3243222","DOIUrl":"https://doi.org/10.1145/3243218.3243222","url":null,"abstract":"To counter the continuous threat posed by Android malware, we attempted to devise a novel method based on active learning. Nonetheless, evaluating our active learning based method on three different Android malware datasets resulted in performance discrepancies. In an attempt to explain such inconsistencies, we postulated research questions and designed corresponding experiments to answer them. The results of our experiments unveiled the reasons behind the struggles of our method and, more importantly, revealed some limitations with the current Android malware detection methods that, we fear, can be leveraged by malware authors to evade detection. In this paper, we share with the research community our research questions, experiments, and findings to instigate researchers to devise methods to tackle such limitations.","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Configurations in Android testing: they matter Android测试中的配置:它们很重要
Emily Kowalczyk, Myra B. Cohen, A. Memon
Android has rocketed to the top of the mobile market thanks in large part to its open source model. Vendors use Android for their devices for free, and companies make customizations to suit their needs. This has resulted in a myriad of configurations that are extant in the user space today. In this paper, we show that differences in configurations, if ignored, can lead to differences in test outputs and code coverage. Consequently, researchers who develop new testing techniques and evaluate them on only one or two configurations are missing a necessary dimension in their experiments and developers who ignore this may release buggy software. In a large study on 18 apps across 88 configurations, we show that only one of the 18 apps studied showed no variation at all. The rest showed variation in either, or both, code coverage and test results. 15% of the 2,000 plus test cases across all of the apps vary, and some of the variation is subtle, i.e. not just a test crash. Our results suggest that configurations in Android testing do matter and that developers need to test using configuration-aware techniques.
Android在很大程度上要归功于其开源模式,它已经飞升到移动市场的顶端。供应商免费在他们的设备上使用Android,公司根据他们的需求进行定制。这导致了目前存在于用户空间中的无数配置。在本文中,我们展示了配置上的差异,如果忽略的话,会导致测试输出和代码覆盖率的差异。因此,开发新测试技术并仅在一两个配置上对其进行评估的研究人员在他们的实验中遗漏了必要的维度,而忽视这一点的开发人员可能会发布有缺陷的软件。在一项针对88种配置的18款应用的大型研究中,我们发现,在被研究的18款应用中,只有一款完全没有变化。其余的显示了代码覆盖率和测试结果的变化,或者两者都有。在所有应用的2000多个测试用例中,有15%是不同的,其中一些变化是微妙的,例如不仅仅是测试崩溃。我们的研究结果表明,Android测试中的配置确实很重要,开发者需要使用配置感知技术进行测试。
{"title":"Configurations in Android testing: they matter","authors":"Emily Kowalczyk, Myra B. Cohen, A. Memon","doi":"10.1145/3243218.3243219","DOIUrl":"https://doi.org/10.1145/3243218.3243219","url":null,"abstract":"Android has rocketed to the top of the mobile market thanks in large part to its open source model. Vendors use Android for their devices for free, and companies make customizations to suit their needs. This has resulted in a myriad of configurations that are extant in the user space today. In this paper, we show that differences in configurations, if ignored, can lead to differences in test outputs and code coverage. Consequently, researchers who develop new testing techniques and evaluate them on only one or two configurations are missing a necessary dimension in their experiments and developers who ignore this may release buggy software. In a large study on 18 apps across 88 configurations, we show that only one of the 18 apps studied showed no variation at all. The rest showed variation in either, or both, code coverage and test results. 15% of the 2,000 plus test cases across all of the apps vary, and some of the variation is subtle, i.e. not just a test crash. Our results suggest that configurations in Android testing do matter and that developers need to test using configuration-aware techniques.","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
AppSeer: discovering flawed interactions among Android components AppSeer:发现Android组件之间有缺陷的交互
Vincenzo Chiaramida, F. Pinci, U. Buy, Rigel Gjomemo
We identify several reliability issues arising from interactions between components of system-defined Android apps and components of third-party apps. These issues are generally caused by incorrect assumptions that system apps make about the behavior of third-party apps, resulting in significant vulnerabilities in system apps. For instance, it is possible for a third-party app to make many system applications to crash, including the Phone app used to make and receive phone calls, the Settings app used to configure a mobile device, and several other apps that expose a so-called started service. Our findings indicate that additional automated tools for integration testing and static analysis of Android apps are in order. Here we discuss AppSeer, a toolset that automatically detects vulnerabilities of system apps and third-party apps. Preliminary precision and recall results for AppSeer are quite encouraging.
我们确定了系统定义的Android应用程序组件和第三方应用程序组件之间的交互产生的几个可靠性问题。这些问题通常是由系统应用对第三方应用行为的错误假设引起的,从而导致系统应用存在重大漏洞。例如,第三方应用程序可能会使许多系统应用程序崩溃,包括用于拨打和接听电话的Phone应用程序,用于配置移动设备的设置应用程序,以及其他几个公开所谓已启动服务的应用程序。我们的发现表明,用于Android应用集成测试和静态分析的额外自动化工具已经就位。这里我们讨论AppSeer,一个自动检测系统应用程序和第三方应用程序漏洞的工具集。AppSeer的初步精度和召回结果相当令人鼓舞。
{"title":"AppSeer: discovering flawed interactions among Android components","authors":"Vincenzo Chiaramida, F. Pinci, U. Buy, Rigel Gjomemo","doi":"10.1145/3243218.3243225","DOIUrl":"https://doi.org/10.1145/3243218.3243225","url":null,"abstract":"We identify several reliability issues arising from interactions between components of system-defined Android apps and components of third-party apps. These issues are generally caused by incorrect assumptions that system apps make about the behavior of third-party apps, resulting in significant vulnerabilities in system apps. For instance, it is possible for a third-party app to make many system applications to crash, including the Phone app used to make and receive phone calls, the Settings app used to configure a mobile device, and several other apps that expose a so-called started service. Our findings indicate that additional automated tools for integration testing and static analysis of Android apps are in order. Here we discuss AppSeer, a toolset that automatically detects vulnerabilities of system apps and third-party apps. Preliminary precision and recall results for AppSeer are quite encouraging.","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPEjs: a symbolic partial evaluator for JavaScript SPEjs: JavaScript的符号部分求值器
Sümeyye Süslü, Christoph Csallner
Partial evaluation is widely performed statically, to perform a source to source transformation on a source program that yields a specialized source program. A key observation is that current partial evaluation schemes perform fast but relatively shallow static analyses. In this paper we propose to deepen the reach of such partial evaluation schemes by selectively adding local symbolic execution. Concretely, we describe the SPEjs symbolic partial evaluator for JavaScript that is built on Babel and the SMT solver Z3. To gauge the promise of this approach we compared SPEjs with Facebook's state-of-the-art partial evaluator Prepack. Our results on a set of micro benchmarks and Prepack's test suite indicate that, within Prepack's runtime budget, SPEjs was able to simplify additional expressions and therefore remove dead code branches that Prepack failed to remove, yielding smaller residual programs.
部分求值通常是静态执行的,以便在生成专门化源程序的源程序上执行源到源的转换。一个关键的观察是,当前的部分评估方案执行快速但相对较浅的静态分析。在本文中,我们建议通过选择性地添加局部符号执行来深化这种部分求值方案的范围。具体地说,我们描述了基于Babel和SMT求解器Z3构建的JavaScript的SPEjs符号部分求值器。为了衡量这种方法的前景,我们将SPEjs与Facebook最先进的部分评估器Prepack进行了比较。我们在一组微基准测试和Prepack的测试套件上的结果表明,在Prepack的运行时预算内,SPEjs能够简化额外的表达式,从而删除Prepack无法删除的死代码分支,产生更小的剩余程序。
{"title":"SPEjs: a symbolic partial evaluator for JavaScript","authors":"Sümeyye Süslü, Christoph Csallner","doi":"10.1145/3243218.3243220","DOIUrl":"https://doi.org/10.1145/3243218.3243220","url":null,"abstract":"Partial evaluation is widely performed statically, to perform a source to source transformation on a source program that yields a specialized source program. A key observation is that current partial evaluation schemes perform fast but relatively shallow static analyses. In this paper we propose to deepen the reach of such partial evaluation schemes by selectively adding local symbolic execution. Concretely, we describe the SPEjs symbolic partial evaluator for JavaScript that is built on Babel and the SMT solver Z3. To gauge the promise of this approach we compared SPEjs with Facebook's state-of-the-art partial evaluator Prepack. Our results on a set of micro benchmarks and Prepack's test suite indicate that, within Prepack's runtime budget, SPEjs was able to simplify additional expressions and therefore remove dead code branches that Prepack failed to remove, yielding smaller residual programs.","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring the effects of ad schemes on the performance cost of mobile phones 探索广告方案对手机性能成本的影响
Cuiyun Gao, Jichuan Zeng, Federica Sarro, Michael R. Lyu, Irwin King
Advertising is an important revenue source for mobile app development, especially for free apps. However, ads also carry costs to users. Displaying ads can interfere user experience, and lead to less user retention and reduced earnings ultimately. Although there are recent studies devoted to directly mitigating ad costs, for example, by reducing the battery or memory consumed, comprehensive analysis on ad embedded schemes (e.g., ad sizes and ad providers) has rarely been conducted. In this paper, we focus on analyzing three types of performance cost, i.e., cost of memory/CPU, traffic, and battery. We explore 12 ad schemes used in 104 popular Android apps and compare their performance consumption. We show that the performance costs of the ad schemes we analyzed are significantly different. We also summarize the ad schemes that would generate low resource cost to users. Our summary is endorsed by 37 experienced app developers we surveyed.
广告是手机应用开发的重要收入来源,尤其是免费应用。然而,广告也会给用户带来成本。显示广告会干扰用户体验,导致用户留存率下降,最终减少收益。虽然最近有研究致力于直接降低广告成本,例如,通过减少电池或内存消耗,但对广告嵌入方案(例如,广告大小和广告提供商)的全面分析很少进行。在本文中,我们将重点分析三种类型的性能成本,即内存/CPU成本、流量成本和电池成本。我们研究了104个流行Android应用中使用的12种广告方案,并比较了它们的性能消耗。我们表明,我们分析的广告方案的性能成本是显著不同的。我们还总结了能够给用户带来低资源成本的广告方案。我们的总结得到了37位经验丰富的应用开发者的认可。
{"title":"Exploring the effects of ad schemes on the performance cost of mobile phones","authors":"Cuiyun Gao, Jichuan Zeng, Federica Sarro, Michael R. Lyu, Irwin King","doi":"10.1145/3243218.3243221","DOIUrl":"https://doi.org/10.1145/3243218.3243221","url":null,"abstract":"Advertising is an important revenue source for mobile app development, especially for free apps. However, ads also carry costs to users. Displaying ads can interfere user experience, and lead to less user retention and reduced earnings ultimately. Although there are recent studies devoted to directly mitigating ad costs, for example, by reducing the battery or memory consumed, comprehensive analysis on ad embedded schemes (e.g., ad sizes and ad providers) has rarely been conducted. In this paper, we focus on analyzing three types of performance cost, i.e., cost of memory/CPU, traffic, and battery. We explore 12 ad schemes used in 104 popular Android apps and compare their performance consumption. We show that the performance costs of the ad schemes we analyzed are significantly different. We also summarize the ad schemes that would generate low resource cost to users. Our summary is endorsed by 37 experienced app developers we surveyed.","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Repackman: a tool for automatic repackaging of Android apps Repackman:一个自动重新包装Android应用程序的工具
Aleieldin Salem, F. F. Paulus, A. Pretschner
Repackaging is a technique adopted by attackers to generate fake, malicious versions of legitimate Android apps, which undermines users’ trust in the Android ecosystem. Unfortunately, the process of releasing and evaluating anti-repackaging techniques is hindered by the difficulty of acquiring repackaged versions of legitimate apps that employ those techniques on demand. In this paper, we present Repackman, a tool to automatically repackage Android apps with arbitrary payloads. We evaluate the feasibility and reliability of the tool and furnish it upon request for the research community to generate repackaged apps on demand for research purposes.
重新包装是攻击者采用的一种技术,用于生成合法Android应用的虚假恶意版本,这会破坏用户对Android生态系统的信任。不幸的是,发布和评估反重新打包技术的过程受到了获取使用这些技术的合法应用的重新打包版本的困难的阻碍。在本文中,我们介绍了Repackman,一个自动重新打包带有任意有效负载的Android应用程序的工具。我们评估该工具的可行性和可靠性,并根据研究社区的要求提供它,以根据研究目的的需求生成重新包装的应用程序。
{"title":"Repackman: a tool for automatic repackaging of Android apps","authors":"Aleieldin Salem, F. F. Paulus, A. Pretschner","doi":"10.1145/3243218.3243224","DOIUrl":"https://doi.org/10.1145/3243218.3243224","url":null,"abstract":"Repackaging is a technique adopted by attackers to generate fake, malicious versions of legitimate Android apps, which undermines users’ trust in the Android ecosystem. Unfortunately, the process of releasing and evaluating anti-repackaging techniques is hindered by the difficulty of acquiring repackaged versions of legitimate apps that employ those techniques on demand. In this paper, we present Repackman, a tool to automatically repackage Android apps with arbitrary payloads. We evaluate the feasibility and reliability of the tool and furnish it upon request for the research community to generate repackaged apps on demand for research purposes.","PeriodicalId":324676,"journal":{"name":"Proceedings of the 1st International Workshop on Advances in Mobile App Analysis","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128454746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1