Recent years have witnessed the widespread adoption of mobile applications(apps for short).For quality-of-service and commercial competitiveness,sufficient Graphical User Interface(GUI)testing is required to verify th...Recent years have witnessed the widespread adoption of mobile applications(apps for short).For quality-of-service and commercial competitiveness,sufficient Graphical User Interface(GUI)testing is required to verify the robustness of the apps.Given that testing with manual efforts is time-consuming and error-prone,automated GUI testing has been widely studied.However,existing approaches mostly focus on GUI exploration while lacking attention to complex interactions with apps,especially generating appropriate text inputs like real users.In this paper,we introduce CamDroid,a lightweight context-aware automated GUI testing tool,which can efficiently explore app activities through(1)a model-based UI-guided testing strategy informed by the context of previous event-activity transitions and(2)a data-driven text input generation approach regarding the GUI context.We evaluate CamDroid on 20 widely-used apps.The results show that CamDroid outperforms non-trivial baselines in activity coverage,crash detection,and test efficiency.展开更多
Mobile applications(apps for short)often need to display images.However,inefficient image displaying(IID)issues are pervasive in mobile apps,and can severely impact app performance and user experience.This paper first...Mobile applications(apps for short)often need to display images.However,inefficient image displaying(IID)issues are pervasive in mobile apps,and can severely impact app performance and user experience.This paper first establishes a descriptive framework for the image displaying procedures of IID issues.Based on the descriptive framework,we conduct an empirical study of 216 real-world IID issues collected from 243 popular open-source Android apps to validate the presence and severity of IID issues,and then shed light on these issues’characteristics to support research on effective issue detection.With the findings of this study,we propose a static IID issue detection tool TAPIR and evaluate it with 243 real-world Android apps.Encouragingly,49 and 64 previously-unknown IID issues in two different versions of 16 apps reported by TAPIR are manually confirmed as true positives,respectively,and 16 previously-unknown IID issues reported by TAPIR have been confirmed by developers and 13 have been fixed.Then,we further evaluate the performance impact of these detected IID issues and the performance improvement if they are fixed.The results demonstrate that the IID issues detected by TAPIR indeed cause significant performance degradation,which further show the effectiveness and efficiency of TAPIR.展开更多
Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecti...Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecting benefits and minimizing risks requires reliable and robust cyber security, backed by a robust research and translation system. Trust is essential for growth and maintenance of participation in the digital community. Organizations gain trust by acting in a trustworthy way leading to building reliable and secure systems, treating people, their privacy and their data with respect, and providing reliable and understandable information to help people understand how safe they are. Research and revolution in industry and academia will continue to make important contributions to create flexible and reliable digital environment. Cyber Security has </span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">a </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">main role in the field of information technology because securing information has become one of the greatest challenges today. When we think about the cyber security, the first thing that comes to our mind is “cyber crimes” which </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">are</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> increasing exponentially day by day. Many governments and firms are taking many measures to prevent these cybercrimes. Besides the various measures, cyber security remains a major concern. This paper intended to give </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">a </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">deep overview of the concepts and principles of cyber security that affect the safety and security in an international context. It mainly focuses on challenges faced by cyber security on the latest technologies and focuses also on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and finally attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, then uses adaptive acquisition methods to collect the information and finally a new cryptographic method is used to complete SPI secure encryption according to acquisition results as described in details in Section 4.展开更多
基金supported by the National Key R&D Program of China(No.2022YFB4500703)the National Natural Science Foundation of China(Nos.61902211 and 62202266)+1 种基金the China Postdoctoral Science Foundation(No.2022M721831)Microsoft Research Asia(No.100336949).
文摘Recent years have witnessed the widespread adoption of mobile applications(apps for short).For quality-of-service and commercial competitiveness,sufficient Graphical User Interface(GUI)testing is required to verify the robustness of the apps.Given that testing with manual efforts is time-consuming and error-prone,automated GUI testing has been widely studied.However,existing approaches mostly focus on GUI exploration while lacking attention to complex interactions with apps,especially generating appropriate text inputs like real users.In this paper,we introduce CamDroid,a lightweight context-aware automated GUI testing tool,which can efficiently explore app activities through(1)a model-based UI-guided testing strategy informed by the context of previous event-activity transitions and(2)a data-driven text input generation approach regarding the GUI context.We evaluate CamDroid on 20 widely-used apps.The results show that CamDroid outperforms non-trivial baselines in activity coverage,crash detection,and test efficiency.
基金supported by the Leading-Edge Technology Program of Jiangsu Natural Science Foundation of China under Grant No.BK20202001the National Natural Science Foundation of China under Grant No.61932021.
文摘Mobile applications(apps for short)often need to display images.However,inefficient image displaying(IID)issues are pervasive in mobile apps,and can severely impact app performance and user experience.This paper first establishes a descriptive framework for the image displaying procedures of IID issues.Based on the descriptive framework,we conduct an empirical study of 216 real-world IID issues collected from 243 popular open-source Android apps to validate the presence and severity of IID issues,and then shed light on these issues’characteristics to support research on effective issue detection.With the findings of this study,we propose a static IID issue detection tool TAPIR and evaluate it with 243 real-world Android apps.Encouragingly,49 and 64 previously-unknown IID issues in two different versions of 16 apps reported by TAPIR are manually confirmed as true positives,respectively,and 16 previously-unknown IID issues reported by TAPIR have been confirmed by developers and 13 have been fixed.Then,we further evaluate the performance impact of these detected IID issues and the performance improvement if they are fixed.The results demonstrate that the IID issues detected by TAPIR indeed cause significant performance degradation,which further show the effectiveness and efficiency of TAPIR.
文摘Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecting benefits and minimizing risks requires reliable and robust cyber security, backed by a robust research and translation system. Trust is essential for growth and maintenance of participation in the digital community. Organizations gain trust by acting in a trustworthy way leading to building reliable and secure systems, treating people, their privacy and their data with respect, and providing reliable and understandable information to help people understand how safe they are. Research and revolution in industry and academia will continue to make important contributions to create flexible and reliable digital environment. Cyber Security has </span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">a </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">main role in the field of information technology because securing information has become one of the greatest challenges today. When we think about the cyber security, the first thing that comes to our mind is “cyber crimes” which </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">are</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> increasing exponentially day by day. Many governments and firms are taking many measures to prevent these cybercrimes. Besides the various measures, cyber security remains a major concern. This paper intended to give </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">a </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">deep overview of the concepts and principles of cyber security that affect the safety and security in an international context. It mainly focuses on challenges faced by cyber security on the latest technologies and focuses also on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and finally attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, then uses adaptive acquisition methods to collect the information and finally a new cryptographic method is used to complete SPI secure encryption according to acquisition results as described in details in Section 4.