This paper proposes a solution for automated goal-driven exploration of Android applications – a scenario in which a user, e.g., security auditor, needs to dynamically trigger the functionality of interest in an application, e.g., to check whether user-sensitive info is only sent to recognized third-party servers. As the auditor might need to check hundreds or even thousands of apps, manually exploring each app to trigger the desired behavior is too time-consuming to be feasible. Existing automated application exploration and testing techniques are of limited help in this scenario as well, as their goal is mostly to identify faults by systematically exploring different app paths, rather than swiftly navigating to the target functionality.
The goal-driven application exploration approach proposed in this paper, called GoalExplorer, automatically generates an executable test script that directly triggers the functionality of interest. The core idea behind GoalExplorer is to first statically model the application UI screens and transitions between these screens, producing a Screen Transition Graph (STG). Then, GoalExplorer uses the STG to guide the dynamic exploration of the application to the particular target of interest: an Android activity, API call, or a program statement. The results of our empirical evaluation on 93 benchmark applications and 95 the most popular GooglePlay applications show that the STG is substantially more accurate than other Android app UI models and that \tool is able to trigger a target functionality much faster than existing application exploration and testing techniques.
Tue 12 NovDisplayed time zone: Tijuana, Baja California change
13:40 - 15:20
|A Qualitative Analysis of Android Taint-Analysis Results|
Linghui Luo Paderborn University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Johannes Späth Fraunhofer IEMPre-print File Attached
|Goal-Driven Exploration for Android Applications|
|RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation|
|Specifying Callback Control Flow of Mobile Apps Using Finite Automata|
Journal First PresentationsLink to publication
|MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis|
Yueming Wu Huazhong University of Science and Technology, Xiaodi Li University of Texas at Dallas, Deqing Zou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Xin Zhang Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and TechnologyPre-print