TU Darmstadt / ULB / TUbiblio

Instrumenting Android and Java Applications as Easy as abc.

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), Springer, pp. 364-381, [Article]

Abstract

Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required.

Item Type: Article
Erschienen: 2013
Creators: Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
Title: Instrumenting Android and Java Applications as Easy as abc.
Language: English
Abstract:

Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required.

Journal or Publication Title: Runtime Verification 2013 (RV'13)
Publisher: Springer
Uncontrolled Keywords: Android, Java, Security, Dynamic Analysis, Runtime Enforcement
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > EC SPRIDE > Secure Software Engineering
20 Department of Computer Science > EC SPRIDE
Zentrale Einrichtungen
LOEWE
20 Department of Computer Science
LOEWE > LOEWE-Zentren
Date Deposited: 21 Oct 2013 12:35
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)

View Item View Item