Android Compatibility Issue Detection Using API Differences

被引:18
|
作者
Mahmud, Tarek [1 ]
Che, Meiru [2 ]
Yang, Guowei [1 ]
机构
[1] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
[2] Concordia Univ Texas, Dept Comp Sci, Austin, TX USA
基金
美国国家科学基金会;
关键词
Android; Compatibility Issues; API evolution; API differences; Program analysis;
D O I
10.1109/SANER50967.2021.00051
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Android apps are developed using a Software Development Kit (SDK), where the Android application programming interface (API) enables app developers to harness the functionalities of Android devices by interacting with services and hardware. However, API frequently evolves together with its associated SDK. The mismatch between the API level supported by the device where apps are installed and the API level targeted by app developers can induce compatibility issues. These issues can manifest themselves as unexpected behaviors, including runtime crashes, creating a poor user experience. In this paper, we propose ACID, a novel approach to detecting compatibility issues caused by API evolution. We leverage API differences and static analysis of the source code of Android apps to detect both API invocation compatibility issues and API callback compatibility issues. Experiments on 20 benchmark apps from previous studies show that ACID is more accurate and faster in detecting compatibility issues than state-of-the-art. We also analyzed 35 more real-world apps to show the practical applicability of our approach.
引用
收藏
页码:480 / 490
页数:11
相关论文
共 50 条
  • [31] A novel Android malware detection method with API semantics extraction
    Yang, Hongyu
    Wang, Youwei
    Zhang, Liang
    Cheng, Xiang
    Hu, Ze
    COMPUTERS & SECURITY, 2024, 137
  • [32] Android Malware Detection Using API Calls: A Comparison of Feature Selection and Machine Learning Models
    Muzaffar, Ali
    Hassen, Hani Ragab
    Lones, Michael A.
    Zantout, Hind
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED CYBER SECURITY (ACS) 2021, 2022, 378 : 3 - 12
  • [33] IntDroid: Android Malware Detection Based on API Intimacy Analysis
    Zou, Deqing
    Wu, Yueming
    Yang, Siru
    Chauhan, Anki
    Yang, Wei
    Zhong, Jiangying
    Dou, Shihan
    Jin, Hai
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)
  • [34] DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks
    Hou, Shifu
    Saas, Aaron
    Ye, Yanfang
    Chen, Lifei
    WEB-AGE INFORMATION MANAGEMENT, 2016, 9998 : 54 - 66
  • [35] On the effectiveness of system API-related information for Android ransomware detection
    Scalas, Michele
    Maiorca, Davide
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    Martinelli, Fabio
    Giacinto, Giorgio
    COMPUTERS & SECURITY, 2019, 86 : 168 - 182
  • [36] Android Malware Detection based on Useful API Calls and Machine Learning
    Jung, Jaemin
    Kim, Hyunjin
    Shin, Dongjin
    Lee, Myeonggeon
    Lee, Hyunjae
    Cho, Seong-je
    Suh, Kyoungwon
    2018 IEEE FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2018, : 175 - 178
  • [37] Android Malware Detection Method Based on Permission Complement and API Calls
    YANG Jiyun
    TANG Jiang
    YAN Ran
    XIANG Tao
    Chinese Journal of Electronics, 2022, 31 (04) : 773 - 785
  • [38] Android Malware Detection Method Based on Permission Complement and API Calls
    Yang, Jiyun
    Tang, Jiang
    Yan, Ran
    Xiang, Tao
    CHINESE JOURNAL OF ELECTRONICS, 2022, 31 (04) : 773 - 785
  • [39] Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls
    Taheri, Laya
    Kadir, Andi Fitriah Abdul
    Lashkari, Arash Habibi
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [40] DroidMat: Android Malware Detection through Manifest and API Calls Tracing
    Wu, Dong-Jie
    Mao, Ching-Hao
    Wei, Te-En
    Lee, Hahn-Ming
    Wu, Kuo-Ping
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 62 - 69