Race Detection for Android Applications

被引:3
|
作者
Maiya, Pallavi [1 ]
Kanade, Aditya [1 ]
Majumdar, Rupak [2 ]
机构
[1] Indian Inst Sci, Bangalore, Karnataka, India
[2] MPI SWS, Kaiserslautern, Germany
关键词
Languages; Reliability; Verification; Data races; Android concurrency semantics; Happens-before reasoning; EFFICIENT;
D O I
10.1145/2666356.2594311
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Programming environments for smartphones expose a concurrency model that combines multi-threading and asynchronous event-based dispatch. While this enables the development of efficient and feature-rich applications, unforeseen thread interleavings coupled with non-deterministic reorderings of asynchronous tasks can lead to subtle concurrency errors in the applications. In this paper, we formalize the concurrency semantics of the Android programming model. We further define the happens-before relation for Android applications, and develop a dynamic race detection technique based on this relation. Our relation generalizes the so far independently studied happens-before relations for multi-threaded programs and single-threaded event-driven programs. Additionally, our race detection technique uses a model of the Android runtime environment to reduce false positives. We have implemented a tool called DROIDRACER. It generates execution traces by systematically testing Android applications and detects data races by computing the happens-before relation on the traces. We analyzed 1 5 Android applications including popular applications such as Facebook, Twitter and K-9 Mail. Our results indicate that data races are prevalent in Android applications, and that DROIDRACER is an effective tool to identify data races.
引用
收藏
页码:316 / 325
页数:10
相关论文
共 50 条
  • [31] Modelling Analysis and Auto Detection of Cryptographic Misuse in Android Applications
    Shao Shuai
    Dong Guowei
    Guo Tao
    Yang Tianchang
    Shi Chenjie
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 75 - +
  • [32] A Technique for Evaluation and Detection of Potentially Vulnerable Code in Android Applications
    Ferreira, Ricardo Luis D. M.
    dos Santos, Anderson F. P.
    Choren, Ricardo
    2017 12TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2017,
  • [33] Reference architecture for android applications to support the detection of manipulated evidence
    Pieterse H.
    Olivier M.S.
    Van Heerden R.P.
    1600, South African Institute of Electrical Engineers (107) : 92 - 103
  • [34] Detection of Android Applications Homology Based on the Authors' Programming Style
    Xu, Jiayu
    2019 THE 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, CONTROL AND ROBOTICS (EECR 2019), 2019, 533
  • [35] Memory Leak detection in Android applications based on code patterns
    Santhanakrishnan, Gayathri
    Cargile, Chris
    Olmsted, Aspen
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2016), 2016, : 133 - 134
  • [36] Detection of Energy Bugs in Android Applications: A Systematic Literature Review
    Shahab, Asia
    Naseer, Ayesha
    Zafar, Muhammad Noumam
    Nadeem, Aamer
    2021 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2021), 2021, : 7 - 12
  • [37] A Hidden Markov Model Detection of Malicious Android Applications at Runtime
    Chen, Yang
    Ghorbanzadeh, Mo
    Ma, Kevin
    Clancy, Charles
    McGwier, Robert
    2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [38] Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications
    Wongwiwatchai, Nattanon
    Pongkham, Phannawhat
    Sripanidkulchai, Kunwadee
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 121 - 126
  • [39] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [40] Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid
    Lo, Nai-Wei
    Yeh, Kuo-Hui
    Fan, Chuan-Yen
    IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1361 - 1369