Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Artikel, Bibliographie
Kurzbeschreibung (Abstract)
Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required.
Typ des Eintrags: | Artikel |
---|---|
Erschienen: | 2013 |
Autor(en): | Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric |
Art des Eintrags: | Bibliographie |
Titel: | Instrumenting Android and Java Applications as Easy as abc. |
Sprache: | Englisch |
Publikationsjahr: | 17 Oktober 2013 |
Verlag: | Springer |
Titel der Zeitschrift, Zeitung oder Schriftenreihe: | Runtime Verification 2013 (RV'13) |
Kurzbeschreibung (Abstract): | Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required. |
Freie Schlagworte: | Android, Java, Security, Dynamic Analysis, Runtime Enforcement |
Fachbereich(e)/-gebiet(e): | LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt 20 Fachbereich Informatik > EC SPRIDE > Secure Software Engineering 20 Fachbereich Informatik > EC SPRIDE Zentrale Einrichtungen LOEWE 20 Fachbereich Informatik LOEWE > LOEWE-Zentren |
Hinterlegungsdatum: | 21 Okt 2013 12:35 |
Letzte Änderung: | 21 Okt 2013 12:35 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |