AndroLog: Android Instrumentation and Code Coverage Analysis

被引:1
作者
Samhi, Jordan [1 ]
Zeller, Andreas [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
来源
COMPANION PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, FSE COMPANION 2024 | 2024年
关键词
Android Instrumentation; Dynamic Analysis; Code Coverage;
D O I
10.1145/3663529.3663806
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Dynamic analysis has emerged as a pivotal technique for testing Android apps, enabling the detection of bugs, malicious code, and vulnerabilities. A key metric in evaluating the efficacy of tools employed by both research and practitioner communities for this purpose is code coverage. Obtaining code coverage typically requires planting probes within apps to gather coverage data during runtime. Due to the general unavailability of source code to analysts, there is a necessity for instrumenting apps to insert these probes in black-box environments. However, the tools available for such instrumentation are limited in their reliability and require intrusive changes interfering with apps' functionalities. This paper introduces AndroLog, a novel tool developed on top of the Soot framework, designed to provide fine-grained coverage information at multiple levels, including class, methods, statements, and Android components. In contrast to existing tools, AndroLog leaves the responsibility to test apps to analysts, and its motto is simplicity. As demonstrated in this paper, AndroLog can instrument up to 98% of recent Android apps compared to existing tools with 79% and 48% respectively for COSMO and ACVTool. AndroLog also stands out for its potential for future enhancements to increase granularity on demand. We make AndroLog available to the community and provide a video demonstration of AndroLog.
引用
收藏
页码:597 / 601
页数:5
相关论文
共 30 条
  • [11] Huang CY, 2015, IEEE INT CONF MO, P209, DOI [10.1109/MS.2015.38, 10.1109/MobServ.2015.38]
  • [12] JaCoCO, 2024, JaCoCo repository
  • [13] Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
    Kang, Hyunjae
    Jang, Jae-wook
    Mohaisen, Aziz
    Kim, Huy Kang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [14] Liu JR, 2017, 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), P502, DOI 10.1109/SANER.2017.7884662
  • [15] Machiry A., 2013, P 2013 9 JOINT M FDN, P224, DOI DOI 10.1145/2491411.2491450
  • [16] Machine Learning for Android Malware Detection Using Permission and API Calls
    Peiravian, Naser
    Zhu, Xingquan
    [J]. 2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, : 300 - 305
  • [17] Petsas Thanasis, 2014, P 7 EUROPEAN WORKSHO, P1, DOI [10.1145/2592791.2592796, DOI 10.1145/2592791.2592796]
  • [18] Fine-grained Code Coverage Measurement in Automated Black-box Android Testing
    Pilgun, Aleksandr
    Gadyatskaya, Olga
    Zhauniarovich, Yury
    Dashevskyi, Stanislav
    Kushniarou, Artsiom
    Mauw, Sjouke
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2020, 29 (04)
  • [19] COSMO: Code Coverage Made Easier for Android
    Romdhana, Andrea
    Ceccato, Mariano
    Georgiu, Gabriel Claudiu
    Merlo, Alessio
    Tonella, Paolo
    [J]. 2021 14TH IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2021), 2021, : 417 - 423
  • [20] Sahs J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P141, DOI 10.1109/EISIC.2012.34