TU Darmstadt / ULB / TUbiblio

Instrumenting Android and Java Applications as Easy as abc.

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Artikel, Bibliographie

Kurzbeschreibung (Abstract)

Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required.

Typ des Eintrags: Artikel
Erschienen: 2013
Autor(en): Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric
Art des Eintrags: Bibliographie
Titel: Instrumenting Android and Java Applications as Easy as abc.
Sprache: Englisch
Publikationsjahr: 17 Oktober 2013
Verlag: Springer
Titel der Zeitschrift, Zeitung oder Schriftenreihe: Runtime Verification 2013 (RV'13)
Kurzbeschreibung (Abstract):

Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required.

Freie Schlagworte: Android, Java, Security, Dynamic Analysis, Runtime Enforcement
Fachbereich(e)/-gebiet(e): LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Fachbereich Informatik > EC SPRIDE > Secure Software Engineering
20 Fachbereich Informatik > EC SPRIDE
Zentrale Einrichtungen
LOEWE
20 Fachbereich Informatik
LOEWE > LOEWE-Zentren
Hinterlegungsdatum: 21 Okt 2013 12:35
Letzte Änderung: 21 Okt 2013 12:35
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen