Title | ||
---|---|---|
Identifying Android library dependencies in the presence of code obfuscation and minimization. |
Abstract | ||
---|---|---|
The Android platform has gained tremendous popularity since it was unveiled in 2007. Currently it holds a global market share of 78.4% with 1.5M activations of Android devices per day. In the US alone, there are 76M Android users. The main Android app market, Google Play, offers over 2M apps with a history of over 50B downloads to date. These impressive statistics provide strong motivation to understand, and improve the quality of Android apps. In this work, we focus on a key question in this space, which to our knowledge has not been previously addressed; namely: Can we determine the library dependencies of a given Android application without access to its source code? |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/ICSE-C.2017.79 | ICSE (Companion Volume) |
Keywords | Field | DocType |
Android,mobile app,software libraries,TF-IDF,constraint optimization | Automatic summarization,Android (operating system),Computer science,Feature extraction,Software as a service,Theoretical computer science,Minification,Obfuscation (software),Obfuscation,Encoding (memory) | Conference |
ISSN | ISBN | Citations |
2574-1926 | 978-1-5386-1590-4 | 2 |
PageRank | References | Authors |
0.35 | 2 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Salman Baset | 1 | 69 | 9.66 |
Shih-Wei Li | 2 | 11 | 3.59 |
Philippe Suter | 3 | 264 | 16.02 |
Omer Tripp | 4 | 492 | 26.38 |