完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Yeh, Chao-Chun | en_US |
dc.contributor.author | Lu, Han-Lin | en_US |
dc.contributor.author | Chen, Chun-Yen | en_US |
dc.contributor.author | Khor, Kee-Kiat | en_US |
dc.contributor.author | Huang, Shih-Kun | en_US |
dc.date.accessioned | 2015-12-02T03:00:58Z | - |
dc.date.available | 2015-12-02T03:00:58Z | - |
dc.date.issued | 2014-01-01 | en_US |
dc.identifier.isbn | 978-1-4799-5843-6 | en_US |
dc.identifier.issn | en_US | |
dc.identifier.uri | http://dx.doi.org/10.1109/SERE-C.2014.32 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/128605 | - |
dc.description.abstract | Mobile devices such as smart phones and tablet PCs are becoming common personal devices. The business model of a central software market is also thriving and turning into a major distribution source of software packages on those devices. However, these devices often contain personal private information and can be used to conduct operations involving data leakage and payment events like sending SMS. As a result, the quality of software on mobile devices becomes a critical issue. We aim at checking whether software off the shelf contains defective behavior or potential vulnerabilities, and aiding the official APP or third party markets to ensure their software without privacy issues. We have built a platform for android APP testing, by revising our software quality assurance and exploit generation platform, called CRAX, to apply in the Android platform. It is called the CRAXDroid that allows any inputs to be the testing sources to the APP without source code. These approaches are based on the symbolic execution technique and android emulator. By automatically exploring execution paths, we can find potential software defects. We perform several experiments on Android applications to prove the feasibility of our method. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | symbolic execution | en_US |
dc.subject | concolic execution | en_US |
dc.subject | market App software | en_US |
dc.subject | software testing | en_US |
dc.subject | software quality assurance | en_US |
dc.title | CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.doi | 10.1109/SERE-C.2014.32 | en_US |
dc.identifier.journal | 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014) | en_US |
dc.citation.spage | 140 | en_US |
dc.citation.epage | 148 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | 資訊技術服務中心 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.contributor.department | Information Technology Services Center | en_US |
dc.identifier.wosnumber | WOS:000361018100021 | en_US |
dc.citation.woscount | 0 | en_US |
顯示於類別: | 會議論文 |