2020
DOI: 10.3390/sym12111894
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Analysis of Test Input Generation Tools for Android Apps through a Sequence of Events

Abstract: Graphical User Interface (GUI) testing of Android apps has gained considerable interest from the industries and research community due to its excellent capability to verify the operational requirements of GUI components. To date, most of the existing GUI testing tools for Android apps are capable of generating test inputs by using different approaches and improve the Android apps’ code coverage and fault detection performance. Many previous studies have evaluated the code coverage and crash detection performan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…Nearly half of Android malware is multifunctional Trojans that steal personal information stored on the user's phone. By the end of Dec 2020, over 3 million apps were on Google Play, the official store for Android apps [2]. Because of numerous reasons like Android applications' available environmental method, management of its coarse-grained permission control and the Capability to summon code from the third party, there are several Surfaces for security attacks available that seriously threatens Android apps integrity [3].…”
Section: Introductionmentioning
confidence: 99%
“…Nearly half of Android malware is multifunctional Trojans that steal personal information stored on the user's phone. By the end of Dec 2020, over 3 million apps were on Google Play, the official store for Android apps [2]. Because of numerous reasons like Android applications' available environmental method, management of its coarse-grained permission control and the Capability to summon code from the third party, there are several Surfaces for security attacks available that seriously threatens Android apps integrity [3].…”
Section: Introductionmentioning
confidence: 99%
“…These techniques are random-based, model-based, systematic based, and reinforcement learning. However, there are issues with low code coverage of existing tools [11,19,20], due to the inability to explore app functions extensively because some of the app functions can only be explored through a specific sequence of events [21]. Such tools must not only choose which GUI component to interact with but also which type of input to perform.…”
Section: Introductionmentioning
confidence: 99%