InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applications
暂无分享,去创建一个
Xi Deng | Jun Yan | Jian Zhang | Tianyong Wu | Jierui Liu
[1] Li Li. Boosting Static Analysis of Android Apps through Code Instrumentation , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).
[2] Michael R. Lyu,et al. SpyAware: Investigating the privacy leakage signatures in app execution traces , 2015, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE).
[3] Marco Pistoia,et al. Dynamic detection of inter-application communication vulnerabilities in Android , 2015, ISSTA.
[4] Fan Zhang,et al. Lightweight Method-Level Energy Consumption Estimation for Android Applications , 2016, 2016 10th International Symposium on Theoretical Aspects of Software Engineering (TASE).
[5] A. Jefferson Offutt,et al. Is bytecode instrumentation as good as source code instrumentation: An empirical study with industrial tools (Experience Report) , 2013, 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE).
[6] Jun Yan,et al. Target Directed Event Sequence Generation for Android Applications , 2016, ArXiv.
[7] Eric Bodden,et al. Instrumenting Android and Java Applications as Easy as abc , 2013, RV.
[8] Jun Yan,et al. Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps , 2016, IEEE Transactions on Software Engineering.
[9] Rongxin Wu,et al. Casper: an efficient approach to call trace collection , 2016, POPL.