2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE) 2018
DOI: 10.1109/issre.2018.00031
|View full text |Cite
|
Sign up to set email alerts
|

MoonlightBox: Mining Android API Histories for Uncovering Release-Time Inconsistencies

Abstract: In most of the approaches aiming at investigating Android apps, the release time of apps is not appropriately taken into account. Through three empirical studies, we demonstrate that the app release time is key for guaranteeing performance. Indeed, not considering time may result in serious threats to the validity of proposed approaches. Unfortunately, even approaches considering time could present some threats to validity when release times are erroneous. Symptoms of such erroneous release times appear in the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

6
3

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…A more realistic setting would be to limit the testing samples to not include duplicated versions of the apps in the training set. An ideal approach could be to take app release time into consideration when preparing the training/testing set, e.g., testing apps are all released after the testing set, which is an ideal situation since the malware detector cannot learn from future samples, as suggested by Li et al [40]. Nevertheless, this is also not the main focus of this paper, we leave it as future work.…”
Section: Threats To Validitymentioning
confidence: 99%
“…A more realistic setting would be to limit the testing samples to not include duplicated versions of the apps in the training set. An ideal approach could be to take app release time into consideration when preparing the training/testing set, e.g., testing apps are all released after the testing set, which is an ideal situation since the malware detector cannot learn from future samples, as suggested by Li et al [40]. Nevertheless, this is also not the main focus of this paper, we leave it as future work.…”
Section: Threats To Validitymentioning
confidence: 99%
“…The release date we leveraged to select apps is based on the last modification date of the app, which, unfortunately, is known to be not reliable. Indeed, as shown in our previous work [43], according to the last modification date, some apps may access APIs that do not yet exist at that time i.e., such APIs are introduced posterior to the last modification date. Nonetheless, the time information is not critical to our approach, and hence we believe its impact on our results is limited.…”
Section: Discussion and Limitationsmentioning
confidence: 86%
“…Furthermore, we leverage the app assembly time to build app lineages in this work. The app assembly time, as experimentally revealed by Li et al [40], may not be accurate to represent the app release time. Hence, the app lineages we leverage to study the evolution of DICI usages may not be reliable as well.…”
Section: Limitationsmentioning
confidence: 96%