Publication | Open Access
Towards Black Box Testing of Android Apps
35
Citations
28
References
2015
Year
Unknown Venue
Software MaintenanceSecurity ResearchersEngineeringTest CoverageSoftware EngineeringSoftware AnalysisHardware SecurityTest AutomationDifferent FrameworksAndroid AppsTest GenerationSource CodeTesting TechniqueMobile MalwareComputer ScienceMobile ComputingSoftware DesignSecurity Testing MethodTest FrameworkProgram AnalysisSoftware TestingSystem Software
Many state-of-art mobile application testing frameworks (e.g., Dynodroid [1], EvoDroid [2]) enjoy Emma [3] or other code coverage libraries to measure the coverage achieved. The underlying assumption for these frameworks is availability of the app source code. Yet, application markets and security researchers face the need to test third-party mobile applications in the absence of the source code. There exists a number of frameworks both for manual and automated test generation that address this challenge. However, these frameworks often do not provide any statistics on the code coverage achieved, or provide coarse-grained ones like a number of activities or methods covered. At the same time, given two test reports generated by different frameworks, there is no way to understand which one achieved better coverage if the reported metrics were different (or no coverage results were provided). To address these issues we designed a framework called BBOXTESTER that is able to generate code coverage reports and produce uniform coverage metrics in testing without the source code. Security researchers can automatically execute applications exploiting current state-of-art tools, and use the results of our framework to assess if the security-critical code was covered by the tests. In this paper we report on design and implementation of BBOXTESTER and assess its efficiency and effectiveness.
| Year | Citations | |
|---|---|---|
Page 1
Page 1