Testing Android Incoming Calls

被引:1
|
作者
Paiva, Ana C. R. [1 ]
Goncalves, Marco A. [2 ]
Barros, Andre R. [2 ]
机构
[1] Univ Porto, Fac Engn, INESC TEC, Porto, Portugal
[2] Univ Porto, Fac Engn, Porto, Portugal
关键词
Mobile Testing; Android Testing; Software Testing; Software Test Automation; Pattern Based Testing;
D O I
10.1109/ICST.2019.00053
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile applications are increasingly present in our daily lives. Being increasingly dependent on apps, we all want to make sure apps work as expected. One way to increase confidence and quality of software is through testing. However, the existing approaches and tools still do not provide sufficient solutions for testing mobile apps with features different from the ones found in desktop or web applications. In particular, there are guidelines that mobile developers should follow and that may be tested automatically but, as far as we know, there are no tools that are able do it. The iMPAcT tool combines exploration, reverse engineering and testing to check if mobile apps follow best practices to implement specific behavior called UI Patterns. Examples of UI Patterns within this catalog are: orientation, background-foreground, side drawer, tab-scroll, among others. For each of these behaviors (UI Patterns), the iMPAcT tool has a corresponding Test Pattern that checks if the UI Pattern implementation follows the guidelines. This paper presents an extension to iMPAcT tool. It enables to test if Android apps work properly after receiving an incoming call, i.e., if the state of the screen after the call is the same as before getting the call. It formalizes the problem, describes the overall approach, describes the architecture of the tool and reports an experiment performed over 61 public mobile apps.
引用
收藏
页码:441 / 448
页数:8
相关论文
共 50 条
  • [21] LogPruner: detect, analyze and prune logging calls in Android apps
    Xin ZHOU
    Kaidong WU
    Huaqian CAI
    Shuai LOU
    Ying ZHANG
    Gang HUANG
    ScienceChina(InformationSciences), 2018, 61 (05) : 101 - 103
  • [22] LogPruner: detect, analyze and prune logging calls in Android apps
    Zhou, Xin
    Wu, Kaidong
    Cai, Huaqian
    Lou, Shuai
    Zhang, Ying
    Huang, Gang
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (05)
  • [23] Mining Dominance Tree of API Calls for Detecting Android Malware
    Alam, Shahid
    Yildirim, Serdar
    Hassan, Mahamat
    Sogukpinar, Ibrahim
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 192 - 195
  • [24] STATIC DETECTION OF ANDROID MALWARE BY USING PERMISSIONS AND API CALLS
    Chan, Patrick P. K.
    Song, Wen-Kai
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 82 - 87
  • [26] Iterative Android automated testing
    ZHONG Yi
    SHI Mengyu
    XU Youran
    FANG Chunrong
    CHEN Zhenyu
    Frontiers of Computer Science, 2023, 17 (05)
  • [27] Iterative Android automated testing
    Zhong, Yi
    Shi, Mengyu
    Xu, Youran
    Fang, Chunrong
    Chen, Zhenyu
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (05)
  • [28] The iMPAcT tool for android testing
    Morgado I.C.
    Paiva A.C.R.
    Proceedings of the ACM on Human-Computer Interaction, 2019, 3 (EICS)
  • [29] Enabling Testing of Android Apps
    Linares-Vasquez, Mario
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 763 - 765
  • [30] Guiding the Crowds for Android Testing
    Zhang, Xin
    Chen, Zhenyu
    Fang, Chunrong
    Liu, Zicong
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, : 752 - 753