AndroLog: Android Instrumentation and Code Coverage Analysis

被引:1
作者
Samhi, Jordan [1 ]
Zeller, Andreas [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
来源
COMPANION PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, FSE COMPANION 2024 | 2024年
关键词
Android Instrumentation; Dynamic Analysis; Code Coverage;
D O I
10.1145/3663529.3663806
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Dynamic analysis has emerged as a pivotal technique for testing Android apps, enabling the detection of bugs, malicious code, and vulnerabilities. A key metric in evaluating the efficacy of tools employed by both research and practitioner communities for this purpose is code coverage. Obtaining code coverage typically requires planting probes within apps to gather coverage data during runtime. Due to the general unavailability of source code to analysts, there is a necessity for instrumenting apps to insert these probes in black-box environments. However, the tools available for such instrumentation are limited in their reliability and require intrusive changes interfering with apps' functionalities. This paper introduces AndroLog, a novel tool developed on top of the Soot framework, designed to provide fine-grained coverage information at multiple levels, including class, methods, statements, and Android components. In contrast to existing tools, AndroLog leaves the responsibility to test apps to analysts, and its motto is simplicity. As demonstrated in this paper, AndroLog can instrument up to 98% of recent Android apps compared to existing tools with 79% and 48% respectively for COSMO and ACVTool. AndroLog also stands out for its potential for future enhancements to increase granularity on demand. We make AndroLog available to the community and provide a video demonstration of AndroLog.
引用
收藏
页码:597 / 601
页数:5
相关论文
共 30 条
  • [1] Abraham A, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P119, DOI 10.1109/MALWARE.2015.7413692
  • [2] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
  • [3] DroidMate-2: A Platform for Android Test Generation
    Borges, Nataniel P., Jr.
    Hotzkow, Jenny
    Zeller, Andreas
    [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 916 - 919
  • [4] DroidHook: a novel API-hook based Android malware dynamic analysis sandbox
    Cui, Yuning
    Sun, Yi
    Lin, Zhaowen
    [J]. AUTOMATED SOFTWARE ENGINEERING, 2023, 30 (01)
  • [5] DEXRAY: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
    Daoudi, Nadia
    Samhi, Jordan
    Kabore, Abdoul Kader
    Allix, Kevin
    Bissyande, Tegawende F.
    Klein, Jacques
    [J]. DEPLOYABLE MACHINE LEARNING FOR SECURITY DEFENSE, MLHAT 2021, 2021, 1482 : 81 - 106
  • [6] Emma, 2024, Emma: a free Java code coverage tool
  • [7] Fereidooni H, 2016, 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS)
  • [8] Google, 2023, Google Play Protection
  • [9] Gruver Ben, 2024, Smali
  • [10] PUMA: Programmable UI-Automation for Large-Scale Dynamic Analysis of Mobile Apps
    Hao, Shuai
    Liu, Bin
    Nath, Suman
    Halfond, William G. J.
    Govindan, Ramesh
    [J]. MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2014, : 204 - 217