计算机科学技术学报 ›› 2022,Vol. 37 ›› Issue (1): 147-181.doi: 10.1007/s11390-021-1659-3

所属专题: Software Systems

• • 上一篇    下一篇

GridDroid---一种有效且高效的基于运行时图形用户界面的安卓应用重打包检测方法

  

  • 收稿日期:2021-06-01 修回日期:2021-11-05 接受日期:2021-12-30 出版日期:2022-01-28 发布日期:2022-01-28

GridDroid---An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface

Jun Ma1,2 (马骏), Member, CCF, ACM, IEEE, Qing-Wei Sun1,2,3 (孙清伟), Chang Xu1,2 (许畅), Senior Member, CCF, IEEE, Member, ACM, and Xian-Ping Tao1,2 (陶先平), Senior Member, CCF        

  1. 1State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China
    2Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China
    3Huatai Securities Co., Ltd., Nanjing 210019, China
  • Received:2021-06-01 Revised:2021-11-05 Accepted:2021-12-30 Online:2022-01-28 Published:2022-01-28
  • Contact: Jun Ma E-mail:majun@nju.edu.cn
  • About author:Jun Ma is an associate professor in the Department of Computer Science and Technology at Nanjing University, Nanjing. He received his Ph.D. degree in computer science and technology from Nanjing University, Nanjing. His research interests include software testing and analysis, and software composition analysis.
  • Supported by:
    This work was supported by the Leading-Edge Technology Program of Jiangsu Natural Science Foundation of China under Grant No.BK20202001, and the National Natural Science Foundation of China under Grant No.61932021.

1、研究背景(context):
应用重打包(repackaging)给安卓生态系统带来严重威胁,而软件胎记(software birthmark)是用于检测重打包应用的常用技术之一。其中,基于应用程序运行时刻的图形用户界面(GUI)的软件胎记技术具有较好的效果。
2、目的(Objective):
然而,现有的基于应用程序运行时刻的图形用户界面(GUI)的软件胎记技术比对效率较低,尚不能满足大规模的应用程序重打包检测的需要。为此,本文尝试提供一套有效而且高效的基于应用程序运行时刻的图形用户界面(GUI)的软件胎记技术。
3、方法(Method):
在本文中,我们提出了一种有效而高效的基于安卓应用动态GUI的软件胎记。 简而言之,我们用自动生成的GUI事件来运行一个应用程序,并在执行每个事件后转储应用户界面的布局(layout)。我们将每个转储的布局划分为一个网格(grid),在每个网格单元中统计布局中的各个部件(widget)所对应的矩形区域的(左-上以及右-下)顶点数目,并进一步生成一个网格特征向量(grid vector)来编码该布局。 在胎记生成阶段,我们基于布局的特征向量来计算不同布局之间的相似度,相似的布局在运行时被合并,最后我们可以建模得到一个图(Graph),并以此作为应用的胎记。 给出一对要比较的应用,我们从它们的胎记中建立一个加权二部图,并应用一个修改后的最大权二部图匹配算法来确定它们是否构成重打包应用对(Repackaging Pair,RP)。
4、结果(Result & Findings):
我们基于所提出的技术,实现了一个名为GridDroid原型系统,并用该系统去检测3个数据集(共包含527个apks)。GridDroid只报告了6个假阴性和7个假阳性,并且比较一对胎记平均开销仅为20微秒。
5、结论(Conclusions):
如何标识界面布局是基于应用运行时刻的GUI构建软件胎记效果好坏、性能高低的关键。布局中控件的分布能够有效的标识和区别不同的布局结构。而本文提出的对布局的网格化编码方式,一方面则能够有效的表示控件的分布情况;另一方面,简单的向量表示也大大提升了胎记比对的效率。

关键词: 安卓应用, 动态软件胎记, 图形用户界面

Abstract: Repackaging brings serious threats to Android ecosystem. Software birthmark techniques are typically applied to detect repackaged apps. Birthmarks based on apps' runtime graphical user interfaces (GUI) are effective, especially for obfuscated or encrypted apps. However, existing studies are time-consuming and not suitable for handling apps in large scale. In this paper, we propose an effective yet efficient dynamic GUI birthmark for Android apps. Briefly, we run an app with automatically generated GUI events and dump its layout after each event. We divide each dumped layout into a grid, count in each grid cell the vertices of boundary rectangles corresponding to widgets within the layout, and generate a feature vector to encode the layout. Similar layouts are merged at runtime, and finally we obtain a graph as the birthmark of the app. Given a pair of apps to be compared, we build a weighted bipartite graph from their birthmarks and apply a modified version of the maximum-weight-bipartite-matching algorithm to determine whether they form a repackaging pair (RP) or not. We implement the proposed technique in a prototype, GridDroid, and apply it to detect RPs in three datasets involving 527 apks. GridDroid reports only six false negatives and seven false positives, and it takes GridDroid merely 20 microseconds on average to compare a pair of birthmarks.

Key words: Android apps, dynamic software birthmark, graphical user interface (GUI), repackaging detection

[1] Zhou W, Zhou Y, Jiang X, Ning P. Detecting repackaged smartphone applications in third-party Android marketplaces. In Proc. the 2nd ACM Conference on Data and Application Security and Privacy, Feb. 2012, pp.317-326. DOI: 10.1145/2133601.2133640.
[2] Zhou Y, Jiang X. Dissecting Android malware: Characterization and evolution. In Proc. the 2012 IEEE Symposium on Security and Privacy, May 2012, pp.95-109. DOI: 10.1109/SP.2012.16.
[3] Tamada H, Nakamura M, Monden A, Matsumoto K. Design and evaluation of birthmarks for detecting theft of Java programs. In Proc. IASTED International Conference on Software Engineering, February 2004, pp.569-574.
[4] Hanna S, Huang L, Wu E, Li S, Chen C, Song D. Juxtapp: A scalable system for detecting code reuse among android applications. In Proc. the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 2013, pp.62-81. DOI: 10.1007/978-3-642-37300-8-4.
[5] Gonzalez H, Stakhanova N, Ghorbani A A. DroidKin: Lightweight detection of Android apps similarity. In Proc. the 10th International Conference on Security and Privacy in Communication Networks, Sept. 2015, pp.436-453. DOI: 10.1007/978-3-319-23829-6-30.
[6] Crussell J, Gibler C, Chen H. Attack of the clones: Detecting cloned applications on Android markets. In Proc. the 17th European Symposium on Research in Computer Security, Sept. 2012, pp.37-54. DOI: 10.1007/978-3-642-33167-1-3.
[7] Crussell J, Gibler C, Chen H. AnDarwin: Scalable detection of Android application clones based on semantics. IEEE Transactions on Mobile Computing, 2015, 14(10): 2007-2019. DOI: 10.1109/TMC.2014.2381212.
[8] Zhou W, Zhou Y, Grace M, Jiang X, Zou S. Fast, scalable detection of "Piggybacked'' mobile applications. In Proc. the 3rd ACM Conference on Data and Application Security and Privacy, February 2013, pp.185-196. DOI: 10.1145/2435349.2435377.
[9] Sun X, Zhongyang Y, Xin Z, Mao B, Xie L. Detecting code reuse in Android applications using component-based control flow graph. In Proc. the 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, June 2014, pp.142-155. DOI: 10.1007/978-3-642-55415-5-12.
[10] Chen K, Liu P, Zhang Y. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. In Proc. the 36th International Conference on Software Engineering, May 31-June 7, 2014, pp.175-186. DOI: 10.1145/2568225.2568286.
[11] Marastoni N, Continella A, Quarta D, Zanero S, Preda M D. GroupDroid: Automatically grouping mobile malware by extracting code similarities. In Proc. the 7th Software Security, Protection, and Reverse Engineering/Software Security and Protection Workshop, Dec. 2017, Article No.1. DOI: 10.1145/3151137.3151138.
[12] Potharaju R, Newell A, Nita-Rotaru C, Zhang X. Plagiarizing smartphone applications: Attack strategies and defense techniques. In Proc. the 4th International Symposium on Engineering Secure Software and Systems, February 2012, pp.106-120. DOI: 10.1007/978-3-642-28166-2-11.
[13] Zhauniarovich Y, Gadyatskaya O, Crispo B, La Spina F, Moser E. FSquaDRA: Fast detection of repackaged applications. In Proc. the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, July 2014, pp.130-145. DOI: 10.1007/978-3-662-43936-4-9.
[14] Ishii Y, Watanabe T, Akiyama M, Mori T. APPraiser: A large scale analysis of Android clone apps. IEICE Transactions on Information and Systems, 2017, E100D(8): 1703-1713. DOI: 10.1587/transinf.2016ICP0012.
[15] Viennot N, Garcia E, Nieh J. A measurement study of Google Play. In Proc. the 2014 ACM International Conference on Measurement and Modeling of Computer Systems, June 2014, pp.221-233. DOI: 10.1145/2591971.2592003.
[16] Jiao S, Cheng Y, Ying L, Su P, Feng D. A rapid and scalable method for Android application repackaging detection. In Proc. the 11th International Conference on Information Security Practice and Experience, May 2015, pp.349-364. DOI: 10.1007/978-3-319-17533-1-24.
[17] Sun M, Li M, Lui J C S. DroidEagle: Seamless detection of visually similar Android apps. In Proc. the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, June 2015, Article No.9. DOI: 10.1145/2766498.2766508.
[18] Lyu F Y J. An efficient and packing-resilient two-phase Android cloned application detection approach. Mobile Information Systems, 2017, Article No.6958698. DOI: 10.1155/2017/6958698.
[19] Zhang F, Huang H, Zhu S, Wu D, Liu P. ViewDroid: Towards obfuscation-resilient mobile application repackaging detection. In Proc. the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks, July 2014, pp.25-36. DOI: 10.1145/2627393.2627395.
[20] Chen K, Wang P, Lee Y, Wang X, Zhang N, Huang H, Zou W, Liu P. Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-Play scale. In Proc. the 24th USENIX Conference on Security Symposium, August 2015, pp.659-674.
[21] Soh C, Tan H B K, Arnatovich Y L, Wang L. Detecting clones in Android applications through analyzing user interfaces. In Proc. the 23rd IEEE International Conference on Program Comprehension, May 2015, pp.163-173. DOI: 10.1109/ICPC.2015.25.
[22] Yue S, Feng W, Ma J, Jiang Y, Tao X, Xu C, Lu J. RepDroid: An automated tool for Android application repackaging detection. In Proc. the 25th International Conference on Program Comprehension, May 2017, pp.132-142. DOI: 10.1109/ICPC.2017.16.
[23] Yue S, Sun Q, Ma J, Tao X, Xu C, Lu J. RegionDroid: A tool for detecting Android application repackaging based on runtime UI region features. In Proc. the 2018 IEEE International Conference on Software Maintenance and Evolution, Sept. 2018, pp.323-333. DOI: 10.1109/ICSME.2018.00041.
[24] Michail D, Kinable J, Naveh B, Sichi J V. JGraphT-A Java library for graph data structures and algorithms. ACM Trans. Math. Softw., 2020, 46(2): Article No.16. DOI: 10.1145/3381449.
[25] Li L, Bissyandé T F, Klein J. Rebooting research on detecting repackaged Android apps: Literature review and benchmark. IEEE Transactions on Software Engineering, 2021, 47(4): 676-693. DOI: 10.1109/TSE.2019.2901679.
[26] Cordella L, Foggia P, Sansone C, Vento M. A (sub)graph isomorphism algorithm for matching large graphs. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, 26(10): 1367-1372. DOI: 10.1109/TPAMI.2004.75.
[27] Mehlhorn K, Näher S. LEDA: A platform for combinatorial and geometric computing. Commun. ACM, 1995, 38(1): 96-102. DOI: 10.1145/204865.204889.
[28] Kim D, Gokhale A, Ganapathy V, Srivastava A. Detecting plagiarized mobile apps using API birthmarks. Automated Software Engineering, 2016, 23(4): 591-618. DOI: 10.1007/s10515-015-0182-6.
[29] Allix K, Bissyandé T F, Klein J, Le Traon Y. AndroZoo: Collecting millions of Android apps for the research community. In Proc. the 13th International Conference on Mining Software Repositories, May 2016, pp.468-471. DOI: 10.1145/2901739.2903508.
[30] Zhou H, Chen T, Wang H, Yu L, Luo X, Wang T, Zhang W. UI obfuscation and its effects on automated UI analysis for Android apps. In Proc. the 35th IEEE/ACM International Conference on Automated Software Engineering, Sept. 2020, pp.199-210. DOI: 10.1145/3324884.3416642.
[31] Wang H, Guo Y, Ma Z, Chen X. WuKong: A scalable and accurate two-phase approach to Android app clone detection. In Proc. the 2015 International Symposium on Software Testing and Analysis, July 2015, pp.71-82. DOI: 10.1145/2771783.2771795.
[32] Guan Q, Huang H, Luo W, Zhu S. Semantics based repackaging detection for mobile apps. In Proc. the 8th International Symposium on Engineering Secure Software and Systems, April 2016, pp.89-105. DOI: 10.1007/978-3-319-30806-7-6.
[33] Shao Y, Luo X, Qian C, Zhu P, Zhang L. Towards a scalable resource-driven approach for detecting repackaged Android applications. In Proc. the 30th Annual Computer Security Applications Conference, Dec. 2014, pp.56-65. DOI: 10.1145/2664243.2664275.
[34] Kywe S M, Li Y, Deng R H, Hong J. Detecting camouflaged applications on mobile application markets. In Proc. the 17th International Conference on Information Security and Cryptology, Dec. 2015, pp.241-254. DOI: 10.1007/978-3-319-15943-0-15.
[35] Guo J, Liu D, Zhao R, Li Z. WLTDroid: Repackaging detection approach for Android applications. In Proc. the 17th International Conference Web Information Systems and Applications, Sept. 2020, pp.579-591. DOI: 10.1007/978-3-030-60029-7-52.
[36] Deshotels L, Notani V, Lakhotia A. DroidLegacy: Automated familial classification of Android malware. In Proc. the 3rd ACM SIGPLAN on Program Protection and Reverse Engineering Workshop, Jan. 2014, Article No.3. DOI: 10.1145/2556464.2556467.
[37] Faruki P, Laxmi V, Bharmal A, Gaur M, Ganmoor V. AndroSimilar: Robust signature for detecting variants of Android malware. Journal of Information Security and Applications, 2015, 22: 66-80. DOI: 10.1016/j.jisa.2014.10.011.
[38] Tian K, Yao D, Ryder B G, Tan G. Analysis of code heterogeneity for high-precision classification of repackaged malware. In Proc. the 2016 IEEE Security and Privacy Workshops, May 2016, pp.262-271. DOI: 10.1109/SPW.2016.33.
[39] Gonzalez H, Kadir A A, Stakhanova N, Alzahrani A J, Ghorbani A A. Exploring reverse engineering symptoms in Android apps. In Proc. the 8th European Workshop on System Security, April 2015, Article No.7. DOI: 10.1145/2751323.2751330.
[40] Collberg C, Thomborson C. Software watermarking: Models and dynamic embeddings. In Proc. the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Jan. 1999, pp.311-324. DOI: 10.1145/292540.292569.
[41] Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation---Tools for software protection. IEEE Transactions on Software Engineering, 2002, 28(8): 735-746. DOI: 10.1109/TSE.2002.1027797.
[42] Hamilton J, Danicic S. A survey of static software watermarking. In Proc. the 2011 World Congress on Internet Security, Feb. 2011, pp.100-107. DOI: 10.1109/WorldCIS17046.2011.5749891.
[43] Nagra J, Thomborson C. Threading software watermarks. In Proc. the 6th International Workshop on Information Hiding, May 2005, pp.208-223. DOI: 10.1007/978-3-540-30114-1-15.
[44] Collberg C, Huntwork A, Carter E, Townsend G, Stepp M. More on graph theoretic software watermarks: Implementation, analysis, and attacks. Information and Software Technology, 2009, 51(1): 56-67. DOI: 10.1016/j.infsof.2008.09.016.
[45] Collberg C, Carter E, Debray S, Huntwork A, Kececioglu J, Linn C, Stepp M. Dynamic path-based software watermarking. In Proc. the 2004 ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2004, pp.107-118. DOI: 10.1145/996841.996856.
[46] Zhou W, Zhang X, Jiang X. AppInk: Watermarking Android apps for repackaging deterrence. In Proc. the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, May 2013, pp.1-12. DOI: 10.1145/2484313.2484315.
[47] Zhang Y, Chen K. AppMark: A picture-based watermark for Android apps. In Proc. the 8th International Conference on Software Security and Reliability, June 30-July 2, 2014, pp.58-67. DOI: 10.1109/SERE.2014.19.
[48] Ren C, Chen K, Liu P. Droidmarking: Resilient software watermarking for impeding Android application repackaging. In Proc. the 29th ACM/IEEE International Conference on Automated Software Engineering, Sept. 2014, pp.635-646. DOI: 10.1145/2642937.2642977.
[49] Sharif M, Lanzi A, Giffin J, Lee W. Impeding malware analysis using conditional code obfuscation. In Proc. the 15th Annual Network and Distributed System Security Symposium, Feb. 2008.
[50] Luo L, Fu Y, Wu D, Zhu S, Liu P. Repackage-proofing Android apps. In Proc. the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 28-July 1, 2016, pp.550-561. DOI: 10.1109/DSN.2016.56.
[51] Cappaert J, Preneel B, Anckaert B, Madou M, De Bosschere K. Towards tamper resistant code encryption: Practice and experience. In Proc. the 4th International Conference on Information Security Practice and Experience, April 2008, pp.86-100. DOI: 10.1007/978-3-540-79104-1-7.
[52] Chang H, Atallah M J. Protecting software code by guards. In Proc. ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, Nov. 2001, pp.160-175. DOI: 10.1007/3-540-47870-1-10.
[53] Horne B, Matheson L, Sheehan C, Tarjan R E. Dynamic self-checking techniques for improved tamper resistance. In Proc. ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, Nov. 2001, pp.141-159. DOI: 10.1007/3-540-47870-1-9.
[54] Tsang H C, Lee M C, Pun C M. A robust anti-tamper protection scheme. In Proc. the 6th International Conference on Availability, Reliability and Security, Aug. 2011, pp.109-118. DOI: 10.1109/ARES.2011.24.
[55] Chen Y, Venkatesan R, Cary M, Pang R, Sinha S, Jakubowski M H. Oblivious hashing: A stealthy software integrity verification primitive. In Proc. the 5th International Workshop on Information Hiding, Oct. 2003, pp.400-414. DOI: 10.1007/3-540-36415-3-26.
[56] Chen H Y, Hou T W, Lin C L. Tamper-proofing basis path by using oblivious hashing on Java. ACM SIGPLAN Not., 2007, 42(2): 9-16. DOI: 10.1145/1241761.1241762.
[57] Jacob M, Jakubowski M H, Venkatesan R. Towards integral binary ution: Implementing oblivious hashing using overlapped instruction encodings. In Proc. the 9th Workshop on Multimedia and Security, Sept. 2007, pp.129-140. DOI: 10.1145/1288869.1288887.
[58] Song L, Tang Z, Li Z, Gong X, Chen X, Fang D, Wang Z. AppIS: Protect Android apps against runtime repackaging attacks. In Proc. the 23rd IEEE International Conference on Parallel and Distributed Systems, Dec. 2017, pp.25-32. DOI: 10.1109/ICPADS.2017.00015.
[59] Chen K, Zhang Y, Liu P. Leveraging information asymmetry to transform Android apps into self-defending code against repackaging attacks. IEEE Transactions on Mobile Computing, 2018, 17(8): 1879-1893. DOI: 10.1109/TMC.2017.2782249.
[60] Zeng Q, Luo L, Qian Z, Du X, Li Z. Resilient decentralized Android application repackaging detection using logic bombs. In Proc. the 2018 International Symposium on Code Generation and Optimization, Feb. 2018, pp.50-61. DOI: 10.1145/3168820.
[61] Tanner S, Vogels I, Wattenhofer R. Protecting Android apps from repackaging using native code. In Proc. the 12th International Symposium on Foundations and Practice of Security, Nov. 2019, pp.189-204. DOI: 10.1007/978-3-030-45371-8-12.
[62] Merlo A, Ruggia A, Sciolla L, Verderame L. ARMAND: Anti-repackaging through multi-pattern anti-tampering based on native detection. Pervasive and Mobile Computing, 2021, 76: Article No.101443. DOI: 10.1016/j.pmcj.2021.101443.
[63] Ma H, Li S, Gao D, Wu D, Jia Q, Jia C. Active warden attack: On the (in)effectiveness of Android app repackage-proofing. IEEE Transactions on Dependable and Secure Computing. DOI: 10.1109/TDSC.2021.3100877.
[64] Machiry A, Tahiliani R, Naik M. Dynodroid: An input generation system for Android apps. In Proc. the 9th Joint Meeting on Foundations of Software Engineering, August 2013, pp.224-234. DOI: 10.1145/2491411.2491450.
[65] Amalfitano D, Fasolino A R, Tramontana P, Ta B D, Memon A M. MobiGUITAR: Automated model-based testing of mobile apps. IEEE Software, 2015, 32(5): 53-59. DOI: 10.1109/MS.2014.55.
[66] Gu T, Sun C, Ma X, Cao C, Xu C, Yao Y, Zhang Q, Lu J, Su Z. Practical GUI testing of Android applications via model abstraction and refinement. In Proc. the 41st IEEE/ACM International Conference on Software Engineering, May 2019, pp.269-280. DOI: 10.1109/ICSE.2019.00042.
[67] Mahmood R, Mirzaei N, Malek S. EvoDroid: Segmented evolutionary testing of Android apps. In Proc. the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, Nov. 2014, pp.599-609. DOI: 10.1145/2635868.2635896.
[68] Mao K, Harman M, Jia Y. Sapienz: Multi-objective automated testing for Android applications. In Proc. the 25th International Symposium on Software Testing and Analysis, July 2016, pp.94-105. DOI: 10.1145/2931037.2931054.
[69] Su T, Meng G, Chen Y, Wu K, Yang W, Yao Y, Pu G, Liu Y, Su Z. Guided, stochastic model-based GUI testing of Android apps. In Proc. the 11th Joint Meeting on Foundations of Software Engineering, Sept. 2017, pp.245-256. DOI: 10.1145/3106237.3106298.
[70] Degott C, Borges Jr N P, Zeller A. Learning user interface element interactions. In Proc. the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2019, pp.296-306. DOI: 10.1145/3293882.3330569.
[71] Pan M, Huang A, Wang G, Zhang T, Li X. Reinforcement learning based curiosity-driven testing of Android applications. In Proc. the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2020, pp.153-164. DOI: 10.1145/3395363.3397354.
[72] Mirzaei N, Bagheri H, Mahmood R, Malek S. SIG-Droid: Automated system input generation for Android applications. In Proc. the 26th IEEE International Symposium on Software Reliability Engineering, Nov. 2015, pp.461-471. DOI: 10.1109/ISSRE.2015.7381839.
[73] Jensen C S, Prasad M R, M{\o}ller A. Automated testing with targeted event sequence generation. In Proc. the 2013 International Symposium on Software Testing and Analysis, July 2013, pp.67-77. DOI: 10.1145/2483760.2483777.
[74] Gao X, Tan S H, Dong Z, Roychoudhury A. Android testing via synthetic symbolic ution. In Proc. the 33rd ACM/IEEE International Conference on Automated Software Engineering, Sept. 2018, pp.419-429. DOI: 10.1145/3238147.3238225.
[75] Bai G, Ye Q, Wu Y, Botha H, Sun J, Liu Y, Dong J S, Visser W. Towards model checking Android applications. IEEE Transactions on Software Engineering, 2018, 44(6): 595-612. DOI: 10.1109/TSE.2017.2697848.
[76] Wang J, Jiang Y, Xu C, Cao C, Ma X, Lu J. ComboDroid: Generating high-quality test inputs for Android apps via use case combinations. In Proc. the 42nd ACM/IEEE International Conference on Software Engineering, June 27-July 19, 2020, pp.469-480. DOI: 10.1145/3377811.3380382.
[1] 龙永浩, 陈彦呈, 陈湘萍, 石晓虹, 周凡. 测试驱动的构件功能提取[J]. 计算机科学技术学报, 2022, 37(2): 389-404.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 李万学;. Almost Optimal Dynamic 2-3 Trees[J]. , 1986, 1(2): 60 -71 .
[2] C.Y.Chung; 华宣仁;. A Chinese Information Processing System[J]. , 1986, 1(2): 15 -24 .
[3] 章萃; 赵沁平; 徐家福;. Kernel Language KLND[J]. , 1986, 1(3): 65 -79 .
[4] 黄学东; 蔡莲红; 方棣棠; 迟边进; 周立; 蒋力;. A Computer System for Chinese Character Speech Input[J]. , 1986, 1(4): 75 -83 .
[5] 史忠植;. Knowledge-Based Decision Support System[J]. , 1987, 2(1): 22 -29 .
[6] 唐同诰; 招兆铿;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[7] 夏培肃; 方信我; 王玉祥; 严开明; 张廷军; 刘玉兰; 赵春英; 孙继忠;. Design of Array Processor Systems[J]. , 1987, 2(3): 163 -173 .
[8] 孙永强; 陆汝占; 黄小戎;. Termination Preserving Problem in the Transformation of Applicative Programs[J]. , 1987, 2(3): 191 -201 .
[9] 林琦; 夏培肃;. The Design and Implementation of a Very Fast Experimental Pipelining Computer[J]. , 1988, 3(1): 1 -6 .
[10] 谢立; 陈珮珮; 杨培根; 孙钟秀;. The Design and Implementation of an OA System ZGL1[J]. , 1988, 3(1): 75 -80 .
版权所有 © 《计算机科学技术学报》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn
总访问量: