publication . Preprint . Part of book or chapter of book . 2017

Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps

Debin Gao; Jiayun Xu; Daoyuan Wu; David Lo; Ximing Liu;
Open Access English
  • Published: 16 Feb 2017
Abstract
Android has been the most popular smartphone system, with multiple platform versions (e.g., KITKAT and Lollipop) active in the market. To manage the application's compatibility with one or more platform versions, Android allows apps to declare the supported platform SDK versions in their manifest files. In this paper, we make a first effort to study this modern software mechanism. Our objective is to measure the current practice of the declared SDK versions (which we term as DSDK versions afterwards) in real apps, and the consistency between the DSDK versions and their app API calls. To this end, we perform a three-dimensional analysis. First, we parse Android d...
Subjects
free text keywords: Computer Science - Software Engineering, Current practice, Crash, Multiple platform, World Wide Web, Software, business.industry, business, Android (operating system), Parsing, computer.software_genre, computer, Computer science
Related Organizations
Download fromView all 2 versions
http://arxiv.org/pdf/1702.0487...
Part of book or chapter of book
Provider: UnpayWall
http://link.springer.com/conte...
Part of book or chapter of book . 2017
Provider: Crossref

1. Android: Dashboards. https://developer.android.com/about/dashboards/

2. Android: Platform codenames, versions, and API levels. https://source. android.com/source/build-numbers.html

3. Wu, D., Li, W., Chang, R., Gao, D.: MopEye: Monitoring per-app network performance with zero measurement tra c. In: CoNEXT Student Workshop. (2015)

4. Drake, J.: On the WebView addJavascriptInterface saga. http://www.droidsec. org/news/2014/02/26/on-the-webview-addjsif-saga.html (2014)

5. Wu, D., Chang, R.K.C.: Analyzing Android browser apps for le:// vulnerabilities. In: Proc. Springer Information Security Conference (ISC). (2014)

6. Wu, D., Chang, R.K.C.: Indirect le leaks in mobile applications. In: Proc. IEEE Mobile Security Technologies (MoST). (2015)

7. McDonnell, T., Ray, B., Kim, M.: An empirical study of API stability and adoption in the Android ecosystem. In: Proc. IEEE ICSM. (2013)

8. Wu, D., Luo, X., Chang, R.K.C.: A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps. CoRR abs/1405.6282 (2014)

9. Andrew: Hacking the \private" Android API. http://andrewoid.blogspot.com/ 2008/12/hacking-android-api.html

10. Linares-Vsquez, M., Bavota, G., Bernal-Crdenas, C., Penta, M.D., Oliveto, R., Poshyvanyk, D.: API change and fault proneness: A threat to the success of Android apps. In: Proc. ACM FSE. (2013) [OpenAIRE]

11. Brito, G., Hora, A., Valente, M.T., Robbes, R.: Do developers deprecate APIs with replacement messages? a large-scale analysis on Java systems. In: Proc. IEEE SANER. (2016) [OpenAIRE]

12. Li, L., Bissyand, T.F., Traon, Y.L., Klein, J.: Accessing inaccessible Android APIs: An empirical study. In: Proc. IEEE ICSME. (2016) [OpenAIRE]

13. Mutchler, P., Safaei, Y., Doupe, A., Mitchell, J.: Target fragmentation in Android apps. In: Proc. IEEE Mobile Security Technologies (MoST). (2016) [OpenAIRE]

14. Wei, L., Liu, Y., Cheung, S.C.: Taming Android fragmentation: Characterizing and detecting compatibility issues for Android apps. In: Proc. ACM ASE. (2016)

Any information missing or wrong?Report an Issue