PEDroid: Automatically Extracting Patches from Android App Updates (Artifact)

Authors Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu



PDF
Thumbnail PDF

Artifact Description

DARTS.8.2.24.pdf
  • Filesize: 467 kB
  • 2 pages

Document Identifiers

Author Details

Hehao Li
  • Shanghai Jiao Tong University, China
Yizhuo Wang
  • Shanghai Jiao Tong University, China
Yiwei Zhang
  • Shanghai Jiao Tong University, China
Juanru Li
  • Shanghai Jiao Tong University, China
Dawu Gu
  • Shanghai Jiao Tong University, China

Acknowledgements

We are grateful to our reviewers for their valuable support and suggestions.

Cite AsGet BibTex

Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, and Dawu Gu. PEDroid: Automatically Extracting Patches from Android App Updates (Artifact). In Special Issue of the 36th European Conference on Object-Oriented Programming (ECOOP 2022). Dagstuhl Artifacts Series (DARTS), Volume 8, Issue 2, pp. 24:1-24:2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)
https://doi.org/10.4230/DARTS.8.2.24

Artifact

Artifact Evaluation Policy

The artifact has been evaluated as described in the ECOOP 2022 Call for Artifacts and the ACM Artifact Review and Badging Policy

Abstract

We propose an approach to automatically identify and extract patches from updated Android apps by comparing the updated versions and their predecessors. PEDroid, a prototype patch extraction tool against Android apps, consists of two phases: differential analysis and patch identification. We evaluated it with a set of popular open-source apps to demonstrate its effectiveness. PEDroid achieves a recall of 92% in differential analysis and successfully identifies 28 of 36 patches in patch identification. We also provide specific guidance on reproducing the experimental results.

Subject Classification

ACM Subject Classification
  • Software and its engineering → Software evolution
Keywords
  • Diffing
  • Patch Identification
  • Android App Analysis
  • App Evolution

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Find security bugs, accessed: November 2021. URL: https://find-sec-bugs.github.io/.
  2. Soot - a java optimization framework, accessed: November 2021. URL: https://github.com/soot-oss/soot.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail