Commit 30920a3c authored by Alessandra Gorla's avatar Alessandra Gorla
Browse files

Merge branch 'android' into 'master'

Android

added all papers in paolo's mendeley library or cited in the MSR paper

See merge request !1
parents 94af841d d0b577bd
@inproceedings{Ma:2016:LFA:Libradar,
author = {Ma, Ziang and Wang, Haoyu and Guo, Yao and Chen, Xiangqun},
title = {LibRadar: Fast and Accurate Detection of Third-party
Libraries in Android Apps},
crossref = "ICSE2016",
pages = {653--656},
doi = {10.1145/2889160.2889178},
publisher = {ACM},
}
@inproceedings{Stevens:2013:APU,
author = {Stevens, Ryan and Ganz, Jonathan and Filkov, Vladimir and
Devanbu, Premkumar and Chen, Hao},
title = {Asking for (and About) Permissions Used by Android Apps},
crossref = "MSR2013",
pages = {31--40},
publisher = {IEEE Press},
}
@inproceedings{Rapoport:2017:WGC,
author = {Marianna Rapoport and
Philippe Suter and
Erik Wittern and
Ondrej Lhot{\'{a}}k and
Julian Dolby},
title = {Who you gonna call?: analyzing web requests in Android
applications},
crossref = "MSR2017",
pages = {80--90},
doi = {10.1109/MSR.2017.11},
}
@inproceedings{Backes:2016:RTL,
author = {Backes, Michael and Bugiel, Sven and Derr, Erik},
title = {Reliable Third-Party Library Detection in Android and Its
Security Applications},
crossref = "CCS2016",
isbn = {978-1-4503-4139-4},
pages = {356--367},
doi = {10.1145/2976749.2978333},
publisher = {ACM},
keywords = {android, third-party library detection},
}
@inproceedings{Taylor:2017:UUI,
author = {Taylor, Vincent F. and Martinovic, Ivan},
title = {To Update or Not to Update: Insights From a Two-Year Study
of Android App Evolution},
crossref = "ASIACCS2017",
isbn = {978-1-4503-4944-4},
pages = {45--57},
doi = {10.1145/3052973.3052990},
publisher = {ACM},
keywords = {android, app, longitudinal, permission, vulnerability},
}
@inproceedings{Martin:2016:CIA,
author = {Martin, William and Sarro, Federica and Harman, Mark},
title = {Causal Impact Analysis for App Releases in Google Play},
crossref = "FSE2016",
isbn = {978-1-4503-4218-6},
pages = {435--446},
doi = {10.1145/2950290.2950320},
publisher = {ACM},
keywords = {App Store Mining and Analysis, Causal Impact},
}
@inproceedings{Tam:2015:CAR,
author = {Tam, Kimberly and Khan, Salahuddin J. and Fattori,
Aristide and Cavallaro, Lorenzo},
crossref = "NDSS2015",
keywords = {dblp},
publisher = {The Internet Society},
title = {CopperDroid: Automatic Reconstruction of Android Malware
Behaviors.},
}
@inproceedings{Krutz:2015:DOA,
author = {Krutz, Daniel E. and Mirakhorli, Mehdi and Malachowsky,
Samuel A. and Ruiz, Andres and Peterson, Jacob and
Filipski, Andrew and Smith, Jared},
title = {A Dataset of Open-source Android Applications},
crossref = "MSR2015",
isbn = {978-0-7695-5594-2},
pages = {522--525},
publisher = {IEEE Press},
keywords = {Android development, open-source dataset, software
engineering},
}
@inproceedings{Wei:2012:PEA,
author = {Wei, Xuetao and Gomez, Lorenzo and Neamtiu, Iulian and
Faloutsos, Michalis},
title = {Permission Evolution in the Android Ecosystem},
crossref = "ACSAC2012",
isbn = {978-1-4503-1312-4},
pages = {31--40},
doi = {10.1145/2420950.2420956},
publisher = {ACM},
}
@inproceedings{Wei:2015:WDY,
author = {Xuetao Wei and
Iulian Neamtiu and
Michalis Faloutsos},
title = {Whom Does Your Android App Talk To?},
crossref = "GLOBECOM2015",
pages = {1--6},
publisher = {{IEEE}},
}
@inproceedings{Klieber:2014:ATF,
author = {Klieber, William and Flynn, Lori and Bhosale, Amar and Jia,
Limin and Bauer, Lujo},
title = {Android Taint Flow Analysis for App Sets},
isbn = {978-1-4503-2919-4},
pages = {1--6},
doi = {10.1145/2614628.2614633},
publisher = {ACM},
}
@inproceedings{Ali-Gombe:2016:AAA,
author = {Ali-Gombe, Aisha and Ahmed, Irfan and Richard,III, Golden
G. and Roussev, Vassil},
title = {AspectDroid: Android App Analysis System},
crossref = "CODASPY2016",
isbn = {978-1-4503-3935-3},
pages = {145--147},
doi = {10.1145/2857705.2857739},
publisher = {ACM},
keywords = {android, aspectj, dynamic analysis, instrumentation},
}
@inproceedings{Zhang:2016:ATG,
author = {Zhang, Hailong and Wu, Haowei and Rountev, Atanas},
title = {Automated Test Generation for Detection of Leaks in Android
Applications},
crossref = "AST2016",
isbn = {978-1-4503-4151-6},
pages = {64--70},
doi = {10.1145/2896921.2896932},
publisher = {ACM},
}
@inproceedings{Wei:2012:PMP,
author = {Wei, Xuetao and Gomez, Lorenzo and Neamtiu, Iulian and
Faloutsos, Michalis},
title = {ProfileDroid: Multi-layer Profiling of Android Applications},
crossref = "Mobicom2012",
isbn = {978-1-4503-1159-5},
pages = {137--148},
doi = {10.1145/2348543.2348563},
publisher = {ACM},
keywords = {android apps, google android, monitoring, profiling,
system},
}
@inproceedings{Burguera:2011:CBM,
author = {Burguera, Iker and Zurutuza, Urko and Nadjm-Tehrani, Simin},
title = {Crowdroid: Behavior-based Malware Detection System for
Android},
crossref = "SPSM2011",
isbn = {978-1-4503-1000-0},
pages = {15--26},
doi = {10.1145/2046614.2046619},
publisher = {ACM},
keywords = {anomaly detection, crowdsourcing, data mining, dynamic
analysis, intrusion detection, malware detection,
smartphone security},
}
@inproceedings{Godefroid:2005:DDA,
author = {Godefroid, Patrice and Klarlund, Nils and Sen, Koushik},
title = {DART: Directed Automated Random Testing},
crossref = {PLDI2005},
isbn = {1-59593-056-6},
pages = {213--223},
doi = {10.1145/1065010.1065036},
publisher = {ACM},
keywords = {automated test generation, interfaces, program
verification, random testing, software testing},
}
@inproceedings{Wong:2016:ITI,
title={IntelliDroid: A Targeted Input Generator for the Dynamic
Analysis of Android Malware},
author={Michelle Y. Wong and David Lie},
crossref = "NDSS2016",
}
@inproceedings{Abraham:2015:GGT,
author = {Abraham, A. and Andriatsimandefitra, Radoniaina and
Brunelat, A. and Lalande, Jean-François and Tong,
V. Viet Triem},
title = {GroddDroid: a gorilla for triggering malicious behaviors.},
crossref = "MALWARE2015",
isbn = {978-1-5090-0319-8},
keywords = {dblp},
pages = {119-127},
publisher = {IEEE},
}
@inproceedings{Sasnauskas:2014:IFC,
author = {Sasnauskas, Raimondas and Regehr, John},
title = {Intent Fuzzer: Crafting Intents of Death},
crossref = "WODA2014",
isbn = {978-1-4503-2934-7},
pages = {1--5},
doi = {10.1145/2632168.2632169},
publisher = {ACM},
keywords = {Android IPC, fuzz testing, random testing, static
analysis},
}
@inproceedings{Ye:2013:DFA,
author = {Ye, Hui and Cheng, Shaoyin and Zhang, Lanbo and Jiang, Fan},
title = {DroidFuzzer: Fuzzing the Android Apps with Intent-Filter
Tag},
crossref = "MoMM2013",
isbn = {978-1-4503-2106-8},
pages = {68:68--68:74},
doi = {10.1145/2536853.2536881},
publisher = {ACM},
keywords = {Activity, Android app, automated testing tool, data
input, fuzzing},
}
@inproceedings{Morgado:2015:TAM,
author = {Ines Coimbra Morgado and Ana C. R. Paiva},
title = {Testing Approach for Mobile Applications through
Reverse Engineering of {UI} Patterns},
crossref = "TESTBEDS2015",
pages = {42--49},
publisher = {{IEEE} Computer Society},
}
@inproceedings{Mahmood:2014:ESE,
author = {Mahmood, Riyadh and Mirzaei, Nariman and Malek, Sam},
title = {EvoDroid: Segmented Evolutionary Testing of Android Apps},
crossref = "FSE2014",
isbn = {978-1-4503-3056-5},
pages = {599--609},
doi = {10.1145/2635868.2635896},
publisher = {ACM},
keywords = {Android, Evolutionary Testing, Program Analysis},
}
@inproceedings{Anand:2012:ACT,
author = {Anand, Saswat and Naik, Mayur and Harrold, Mary Jean and
Yang, Hongseok},
title = {Automated Concolic Testing of Smartphone Apps},
crossref = "FSE2012",
isbn = {978-1-4503-1614-9},
pages = {59:1--59:11},
doi = {10.1145/2393596.2393666},
publisher = {ACM},
keywords = {Android, GUI testing, testing event-driven programs},
}
@inproceedings{Morgado:2015:TIT,
author = {Ines Coimbra Morgado and Ana C. R. Paiva},
title = {The iMPAcT Tool: Testing {UI} Patterns on Mobile
Applications},
crossref = "ASE2015",
pages = {876--881},
publisher = {{IEEE} Computer Society},
}
@inproceedings{Moran:2017:ADR,
author = {Kevin Moran and
Mario Linares V{\'{a}}squez and
Carlos Bernal{-}C{\'{a}}rdenas and
Christopher Vendome and
Denys Poshyvanyk},
title = {Automatically Discovering, Reporting and Reproducing
Android Application Crashes},
crossref = "ICST2016",
publisher = {IEEE},
}
@inproceedings{Mao:2016:SMA:,
author = {Mao, Ke and Harman, Mark and Jia, Yue},
title = {Sapienz: Multi-objective Automated Testing for Android
Applications},
crossref = "ISSTA2016",
isbn = {978-1-4503-4390-9},
pages = {94--105},
doi = {10.1145/2931037.2931054},
publisher = {ACM},
keywords = {Android, Search-based software testing, Test generation},
}
@inproceedings{Li:2017:LSP,
author = {Li, Menghao and Wang, Wei and Wang, Pei and Wang, Shuai and
Wu, Dinghao and Liu, Jian and Xue, Rui and Huo, Wei},
title = {LibD: Scalable and Precise Third-party Library Detection in
Android Markets},
crossref = "ICSE2017",
isbn = {978-1-5386-3868-2},
pages = {335--346},
doi = {10.1109/ICSE.2017.38},
publisher = {IEEE Press},
keywords = {android, software mining, third-party library},
}
@inproceedings{Derr:2017:KUA,
author = {Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar,
Yasemin and Backes, Michael},
title = {Keep me Updated: An Empirical Study of Third-Party Library
Updatability on Android},
pages = {2187-2200},
crossref = "CCS2017",
}
@inproceedings{Zhang:2013:EMA:,
author = {Zhang, Jack and Sagar, Shikhar and Shihab, Emad},
title = {The Evolution of Mobile Apps: An Exploratory Study},
crossref = "DeMobile2013",
isbn = {978-1-4503-2312-3},
pages = {1--8},
doi = {10.1145/2501553.2501554},
publisher = {ACM},
keywords = {Software evolution, mobile applica- tions, mobile
software engineering},
}
@inproceedings{Grano:2017:AAU,
author = {Grano, Giovanni and Di Sorbo, Andrea and Mercaldo,
Francesco and Visaggio, Corrado A. and Canfora,
Gerardo and Panichella, Sebastiano},
title = {Android Apps and User Feedback: A Dataset for Software
Evolution and Quality Improvement},
crossref = "WAMA2017",
isbn = {978-1-4503-5158-4},
pages = {8--11},
doi = {10.1145/3121264.3121266},
publisher = {ACM},
keywords = {App Reviews, Mobile Applications, Software Maintenance
and Evolution, Software Quality},
}
@inproceedings{Hecht:2015:TSQ,
author = {Hecht, Geoffrey and Benomar, Omar and Rouvoy, Romain and
Moha, Naouel and Duchien, Laurence},
title = {Tracking the Software Quality of Android Applications Along
Their Evolution (T)},
crossref = "ASE2015",
isbn = {978-1-5090-0025-8},
pages = {236--247},
doi = {10.1109/ASE.2015.46},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
@inproceedings{Allix:2016:ACM,
author = {Allix, Kevin and Bissyand{\'e}, Tegawend{\'e} F. and Klein,
Jacques and Le Traon, Yves},
title = {{AndroZoo}: Collecting Millions of Android Apps for the
Research Community},
crossref = "MSR2016",
isbn = {978-1-4503-4186-8},
location = {Austin, Texas},
pages = {468--471},
url = {http://doi.acm.org/10.1145/2901739.2903508},
doi = {10.1145/2901739.2903508},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {APK, android applications, software repository},
}
@inproceedings{Ng:2014:AAS,
author = {Ng, Yi Ying and Zhou, Hucheng and Ji, Zhiyuan and Luo, Huan
and Dong, Yuan},
title = {Which Android App Store Can Be Trusted in China?},
crossref = "COMPSAC2014",
isbn = {978-1-4799-3575-8},
pages = {509--518},
doi = {10.1109/COMPSAC.2014.95},
publisher = {IEEE Computer Society},
keywords = {Android, app store, APK, trustworthy, severity ranking},
}
@inproceedings {Backes:2016:ODA,
author = {Michael Backes and Sven Bugiel and Erik Derr and Patrick
McDaniel and Damien Octeau and Sebastian Weisgerber},
title = {On Demystifying the Android Application Framework:
Re-Visiting Android Permission Specification
Analysis},
crossref = "USENIXSec2016",
isbn = {978-1-931971-32-4},
pages = {1101--1118},
publisher = {{USENIX} Association},
}
@article{Allix:2016:EAM,
author = {Kevin Allix and
Tegawend{\'{e}} F. Bissyand{\'{e}} and
Quentin J{\'{e}}rome and
Jacques Klein and
Radu State and
Yves Le Traon},
title = {Empirical assessment of machine learning-based malware
detectors for Android - Measuring the gap between
in-the-lab and in-the-wild validation scenarios},
journal = JEmpiricalSE,
volume = {21},
number = {1},
pages = {183--211},
year = {2016},
doi = {10.1007/s10664-014-9352-6},
}
@inproceedings{Bartel:2012:ASP,
author = {Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and
Monperrus, Martin},
title = {Automatically Securing Permission-based Software by Reducing
the Attack Surface: An Application to Android},
crossref = {ASE2012},
isbn = {978-1-4503-1204-2},
pages = {274--277},
doi = {10.1145/2351676.2351722},
publisher = {ACM},
keywords = {Android, Permissions, Soot, call-graph, permission-based
software, security, static analysis},
}
......@@ -96,6 +96,13 @@
address = "Honolulu, HI, USA",
month = dec,
}
@Proceedings{ACSAC2012,
title = "ACSAC 2012: Proceedings of the 28th Annual Computer Security Applications Conference",
booktitle = "ACSAC 2012: Proceedings of the 28th Annual Computer Security Applications Conference",
year = 2012,
address = "Orlando, FL, USA",
month = dec,
}
@Proceedings{ACSC2005,
title = "ACSC 2005: Proceedings of the Twenty-eighth Australasian Conference on Computer Science",
......@@ -479,12 +486,19 @@
month = may,
}
@Proceedings{AST2011,
title = "AST Workshop: 6th Workshop on Automation of Software Test (AST 2006)",
booktitle = "AST Workshop: 6th Workshop on Automation of Software Test (AST 2006)",
title = "AST Workshop: 6th Workshop on Automation of Software Test (AST 2011)",
booktitle = "AST Workshop: 6th Workshop on Automation of Software Test (AST 2011)",
year = 2011,
address = "Honolulu, Hawaii, USA",
month = may,
}
@Proceedings{AST2016,
title = "AST Workshop:Proceedings of the 11th International Workshop on Automation of Software Test (AST 2016)",
booktitle = "AST Workshop: Proceedings of the 11th International Workshop on Automation of Software Test (AST 2016)",
year = 2016,
address = "Austin, Texas, USA",
month = may,
}
@Proceedings{ASWEC2001,
title = "ASWEC 2001: 13th Australian Software Engineering
......@@ -790,6 +804,36 @@
address = "Scottsdale, AZ, USA",
month = nov,
}
@Proceedings{CCS2016,
title = "CCS 2016: Proceedings of the 23rd ACM Conference on Computer and Communications Security",
booktitle = "CCS 2016: Proceedings of the 23rd ACM Conference on Computer and Communications Security",
year = 2016,
address = "Vienna, Austria",
month = oct,
}
@Proceedings{CCS2017,
title = "CCS 2017: Proceedings of the 24th ACM Conference on Computer and Communications Security",
booktitle = "CCS 2017: Proceedings of the 24th ACM Conference on Computer and Communications Security",
year = 2017,
address = "Dallas, TX, USA",
month = oct,
}
@Proceedings{ASIACCS2017,
title = "ASIACCS 2017: Proceedings of the ACM Asia Conference on Computer and Communications Security",
booktitle = "ASIACCS 2017: Proceedings of the ACM Asia Conference on Computer and Communications Security",
year = 2017,
address = "Abu Dhabi, UAE",
month = apr,
}
@Proceedings{GLOBECOM2015,
title = "GLOBECOM 2015: IEEE Global Communications Conference",
booktitle = "GLOBECOM 2015: IEEE Global Communications Conference",
year = 2015,
address = "San Diego, CA, USA",
month = dec,
}
@Proceedings{CHASE2008,
title = "CHASE 2008: Cooperative and Human Aspects of Software Engineering",
......@@ -902,6 +946,15 @@
month = mar,
}
@Proceedings{COMPSAC2014,
title = "COMPSAC 2014: Proceedings of the 38th Annual International Computers, Software \& Applications Conference",
booktitle = "COMPSAC 2014: Proceedings of thehe 38th Annual International Computers, Software \& Applications Conference",
year = 2014,
address = "V{\aa}ster{\aa}s, Sweden",
month = jul,
}
% The "S" didn't start standing for "and Systems" until 1998
@Proceedings{COOTS97,
title = "COOTS '97: Proceedings of the Third USENIX Conference on Object-Oriented Technologies",
......@@ -1019,6 +1072,14 @@
month = jul,
}
@Proceedings{DeMobile2013,
title = "DeMobile 2013: 1st international Workshop on Software Development Lifecycle for Mobile",
booktitle = "DeMobile 2013: 1st international Workshop on Software Development Lifecycle for Mobile",
year = 2013,
address = "Saint Petersburg, Russia",
month = aug,
}
@Proceedings{RDL2004,
title = "RDL 2004: Workshop on Revival of Dynamic Languages",
booktitle = "RDL 2004: Workshop on Revival of Dynamic Languages",
......@@ -1950,6 +2011,15 @@
month = oct,
}
@Proceedings{CODASPY2016,
title = "CODASPY 2016: Proceedings of the 6th ACM Conference on Data and Application Security and Privacy",
booktitle = "CODASPY 2016: Proceedings of the 6th ACM Conference on Data and Application Security and Privacy",
year = 2016,
address = "New Orleans, LA, USA",
month = mar,
}
@Proceedings{HLD83,
title = "HLD '83: ACM SIGSOFT/SIGPLAN Software Engineering Symposium on High-level Debugging",
booktitle = "HLD '83: ACM SIGSOFT/SIGPLAN Software Engineering Symposium on High-level Debugging",
......@@ -1958,6 +2028,14 @@
NEEDmonth = "*",
}
@Proceedings{SOAP2014,
title = "SOAP 2014: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis ",
booktitle = "SOAP 2014: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis ",
year = 2014,
address = "Edinburgh, UK",
month = jun,
}
@Proceedings{HotMobile2011,
title = "HotMobile 2011: 12th Workshop on Mobile Computing Systems and Applications",
booktitle = "HotMobile 2011: 12th Workshop on Mobile Computing Systems and Applications",
......@@ -2731,6 +2809,13 @@
address = "Graz, Austria",
month = apr,
}
@Proceedings{ICST2016,
title = "ICST 2016: 9th International Conference on Software Testing, Verification and Validation (ICST)",
booktitle = "ICST 2016: 9th International Conference on Software Testing, Verification and Validation (ICST)",
year = 2016,
address = "Chicago, IL, USA",
month = apr,
}
@Proceedings{ICST2017,
title = "ICST 2017: 10th International Conference on Software Testing, Verification and Validation (ICST)",
booktitle = "ICST 2017: 10th International Conference on Software Testing, Verification and Validation (ICST)",
......@@ -3254,6 +3339,14 @@
month = nov,
}
@Proceedings{MALWARE2015,
title = "MALWARE 2015: Proceedings of the 10th International Conference on Malicious and Unwanted Software",
booktitle = "MALWARE 2015: Proceedings of the 10th International Conference on Malicious and Unwanted Software",
year = 2015,
address = "Fajardo, PR, USA",
month = oct,
}
@Proceedings{MASPLAS2004,
title = "MASPLAS 2004: Mid-Atlantic Student Workshop on Programming
Languages and Systems",
......@@ -3333,6 +3426,14 @@
month = sep,
}
@Proceedings{MobiCom2012,
title = "MobiCom 2012: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking",
booktitle = "MobiCom 2012: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking",
year = 2012,
address = "Istambul, Turkey",
month = aug,
}
@Proceedings{MobiSys2011,
title = "MobiSys 2011: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services",
booktitle = "MobiSys 2011: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services",
......@@ -3385,6 +3486,20 @@
address = "San Francisco, CA, USA",
month = may,
}
@Proceedings{MSR2015,
title = "MSR 2015: 12th Working Conference on Mining Software Repositories",
booktitle = "MSR 2015: 12th Working Conference on Mining Software Repositories",
year = 2015,
address = "Florence, Italy",
month = may,
}
@Proceedings{MSR2016,
title = "MSR 2016: 13th Working Conference on Mining Software Repositories",
booktitle = "MSR 2016: 13th Working Conference on Mining Software Repositories",
year = 2016,
address = "Austin, TX, USA",
month = may,
}
@Proceedings{MSR2017,
title = "MSR 2017: 14th International Conference on Mining
Software Repositories",
......@@ -3433,6 +3548,20 @@
address = "San Diego, CA, USA",
month = feb,
}
@Proceedings{NDSS2015,
title = "NDSS 2015: 21st Annual Symposium on Network and Distributed System Security",
booktitle = "NDSS 2015: 21st Annual Symposium on Network and Distributed System Security",
year = 2015,
address = "San Diego, CA, USA",
month = feb,
}
@Proceedings{NDSS2016,
title = "NDSS 2016: 22nd Annual Symposium on Network and Distributed System Security",
booktitle = "NDSS 2016: 22nd Annual Symposium on Network and Distributed System Security",
year = 2016,
address = "San Diego, CA, USA",
month = feb,
}