Towards Black Box Testing of Android Apps

被引:19
作者
Zhauniarovich, Yury [1 ]
Philippov, Anton [1 ]
Gadyatskaya, Olga [2 ]
Crispo, Bruno [1 ]
Massacci, Fabio [1 ]
机构
[1] Univ Trento, Trento, Italy
[2] Univ Luxembourg, SnT, Luxembourg, Luxembourg
来源
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 | 2015年
关键词
D O I
10.1109/ARES.2015.70
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many state-of-art mobile application testing frameworks (e.g., Dynodroid [1], EvoDroid [2]) enjoy Emma [3] or other code coverage libraries to measure the coverage achieved. The underlying assumption for these frameworks is availability of the app source code. Yet, application markets and security researchers face the need to test third-party mobile applications in the absence of the source code. There exists a number of frameworks both for manual and automated test generation that address this challenge. However, these frameworks often do not provide any statistics on the code coverage achieved, or provide coarse-grained ones like a number of activities or methods covered. At the same time, given two test reports generated by different frameworks, there is no way to understand which one achieved better coverage if the reported metrics were different (or no coverage results were provided). To address these issues we designed a framework called BBOXTESTER that is able to generate code coverage reports and produce uniform coverage metrics in testing without the source code. Security researchers can automatically execute applications exploiting current state-of-art tools, and use the results of our framework to assess if the security-critical code was covered by the tests. In this paper we report on design and implementation of BBOXTESTER and assess its efficiency and effectiveness.
引用
收藏
页码:501 / 510
页数:10
相关论文
共 39 条
[1]  
Amalfitano D., 2014, P WISE 2014
[2]  
Anand S., 2012, P FSE 2012
[3]  
[Anonymous], TOOL REV ENG ANDR AP
[4]  
[Anonymous], 2009, Technical Report CS-TR-4991
[5]  
[Anonymous], ARXIV12084536
[6]  
[Anonymous], TOOLS WORK ANDR
[7]  
Apvrille A., 2013, SOPHISTICATED DEX OB
[8]  
Avancini A., 2013, P AST 2013
[9]  
Azim T, 2013, ACM SIGPLAN NOTICES, V48, P641, DOI [10.1145/2509136.2509549, 10.1145/2544173.2509549]
[10]  
Bhoraskar R., 2014, P US SEC 2014