License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DARTS.8.2.24
URN: urn:nbn:de:0030-drops-162229
URL: https://drops.dagstuhl.de/opus/volltexte/2022/16222/
Go back to Dagstuhl Artifacts Series


Li, Hehao ; Wang, Yizhuo ; Zhang, Yiwei ; Li, Juanru ; Gu, Dawu

PEDroid: Automatically Extracting Patches from Android App Updates (Artifact)

pdf-format:
DARTS-8-2-24.pdf (0.5 MB)
artifact-format:
DARTS-8-2-24-artifact-b0b89511355472af631311792fdf8f89.zip (1,559 MB)

Evaluation Policy
The artifact has been evaluated as described in the ECOOP 2022 Call for Artifacts and the ACM Artifact Review and Badging Policy.


Abstract

We propose an approach to automatically identify and extract patches from updated Android apps by comparing the updated versions and their predecessors. PEDroid, a prototype patch extraction tool against Android apps, consists of two phases: differential analysis and patch identification. We evaluated it with a set of popular open-source apps to demonstrate its effectiveness. PEDroid achieves a recall of 92% in differential analysis and successfully identifies 28 of 36 patches in patch identification. We also provide specific guidance on reproducing the experimental results.

BibTeX - Entry

@Article{li_et_al:DARTS.8.2.24,
  author =	{Li, Hehao and Wang, Yizhuo and Zhang, Yiwei and Li, Juanru and Gu, Dawu},
  title =	{{PEDroid: Automatically Extracting Patches from Android App Updates (Artifact)}},
  pages =	{24:1--24:2},
  journal =	{Dagstuhl Artifacts Series},
  ISSN =	{2509-8195},
  year =	{2022},
  volume =	{8},
  number =	{2},
  editor =	{Li, Hehao and Wang, Yizhuo and Zhang, Yiwei and Li, Juanru and Gu, Dawu},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2022/16222},
  URN =		{urn:nbn:de:0030-drops-162229},
  doi =		{10.4230/DARTS.8.2.24},
  annote =	{Keywords: Diffing, Patch Identification, Android App Analysis, App Evolution}
}

Keywords: Diffing, Patch Identification, Android App Analysis, App Evolution
Collection: DARTS, Volume 8, Issue 1, Special Issue of the 34th Euromicro Conference on Real-Time Systems (ECRTS 2022)
Issue Date: 2022
Date of publication: 23.06.2022


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI