2014
DOI: 10.1007/s10009-014-0303-8
|View full text |Cite
|
Sign up to set email alerts
|

APSET, an Android aPplication SEcurity Testing tool for detecting intent-based vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 19 publications
0
18
0
1
Order By: Relevance
“…The literature includes several contributions on highlighting issues related to the performance of Android apps such as poor responsiveness [29] and exception handling [55]. Yang et al [74], for example, have proposed a systematic testing approach to uncover and quantify common causes of poor [27] MAMBA [28] Pretect [29] SSDA [30] TrimDroid [8] ERVA [9] SAPIENZ [11] RacerDroid [31] DiagDroid [32] MOTIF [33] DRUN [34] GAT [35] Zhang et al [36] Jabbarvand et al [37] Qian et al [38] Ermuth et al [39] Zhang et al [40] Zhang et al [41] dLens [42] Packeviius et al [43] Knorr et al [44] IntentDroid [45] Farto et al [46] Bielik et al [47] MobiGUITAR [48] Aktouf et al [49] AppAudit [50] Hassanshahi et al [51] iMPAcT [52] Deng et al [53] Espada et al [54] Zhang et al [55] QUANTUM [56] CRAXDroid [57] IntentFuzzer [58] Vikomir et al [59] Shahriar et al [60] APSET [61] DROIDRACER [62] AppACTS [63] CAFA [64] Guo et al…”
Section: Test Objectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…The literature includes several contributions on highlighting issues related to the performance of Android apps such as poor responsiveness [29] and exception handling [55]. Yang et al [74], for example, have proposed a systematic testing approach to uncover and quantify common causes of poor [27] MAMBA [28] Pretect [29] SSDA [30] TrimDroid [8] ERVA [9] SAPIENZ [11] RacerDroid [31] DiagDroid [32] MOTIF [33] DRUN [34] GAT [35] Zhang et al [36] Jabbarvand et al [37] Qian et al [38] Ermuth et al [39] Zhang et al [40] Zhang et al [41] dLens [42] Packeviius et al [43] Knorr et al [44] IntentDroid [45] Farto et al [46] Bielik et al [47] MobiGUITAR [48] Aktouf et al [49] AppAudit [50] Hassanshahi et al [51] iMPAcT [52] Deng et al [53] Espada et al [54] Zhang et al [55] QUANTUM [56] CRAXDroid [57] IntentFuzzer [58] Vikomir et al [59] Shahriar et al [60] APSET [61] DROIDRACER [62] AppACTS [63] CAFA [64] Guo et al…”
Section: Test Objectivesmentioning
confidence: 99%
“…[43] SIG-Droid [99] Knorr et al [44] TAST [100] IntentDroid [45] Griebe et al [101] Farto et al [46] Bielik et al [47] MobiGUITAR [48] AGRippin [102] Aktouf et al [49] THOR [103] AppAudit [50] Morgado et al [104] Hassanshahi et al [51] iMPAcT [52] Deng et al [53] Espada et al [54] Zhang et al [55] QUANTUM [56] CRAXDroid [57] IntentFuzzer [58] Vikomir et al [59] Shahriar et al [60] APSET [61] DROIDRACER [62] EvoDroid [105] SPAG-C [106] Caiipa [107] UGA [108] AppACTS [63] CAFA [64] Holzmann et al [109] Guo et al [65] Griebe et al [66] PBGT [67] Chen et al [110] Banerjee et al [68] Amalfitano et al [111] Adinata et al [112] A5 [69] Suarez et al [70] Linares et al [71] Sasnauskas et al [72] AMDetector [73] RERAN [15] Yang et al …”
Section: Which Test Levels Are Addressed?mentioning
confidence: 99%
“…APSET is a tool for Android application security testing. This tool aims to detect intent‐based vulnerabilities and uses vulnerability patterns proposed by an Android expert.…”
Section: Related Workmentioning
confidence: 99%
“…This mechanism is combined with the permission mechanism in the components to achieve more flexibility in developing applications. 12 As the Android application communication model mostly promotes the development of rich applications, Android developers can use this communication model to leverage existing data and services provided by other applications. To achieve this, Android has provided a message passing system that facilitates the communication of applications.…”
mentioning
confidence: 99%
“…There are other model-based testing tools for Android which are not focused on models that consider the user inputs. For instance, the tool APSET [23] considers manually constructed formal models of vulnerability patterns to generate test cases for ANDROID applications. Test generation is implemented with an ad-hoc algorithm that also considers the compiled code of the application and the configuration files in the ANDROID system.…”
Section: Comparison With Related Workmentioning
confidence: 99%