[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2387869.2387872guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards verifying android apps for the absence of no-sleep energy bugs

Published: 07 October 2012 Publication History

Abstract

The Android OS conserves battery life by aggressively turning off components, such as screen and GPS, while allowing application developers to explicitly prevent part of this behavior using the WakeLock API. Unfortunately, the inherent complexity of the Android programming model and developer errors often lead to improper use of Wake-Locks that manifests as no-sleep bugs. To mitigate this problem, we have implemented a tool that verifies the absence of this kind of energy bugs w.r.t. a set of Wake-Lock specific policies using a precise, inter-procedural data flow analysis framework to enforce them. We run our analysis on 328 Android apps that utilize WakeLocks, verify 145 of them and shed light on the locking patterns employed and when these can be harmful. Further, we identify challenges that remain in order to make verification of Android apps even more precise.

References

[1]
Android Developers. http://developer.android.com/.
[2]
dex2jar. http://code.google.com/p/dex2jar.
[3]
Imoblife Inc. http://downloadandroid.info/.
[4]
NetCounter. http://www.jaqpot.net/netcounter.
[5]
Soot. http://www.sable.mcgill.ca/soot.
[6]
T.J. Watson Libraries for Analysis. http://wala.sf.net.
[7]
BARTEL, A., KLEIN, J., LE TRAON, Y., AND MONPERRUS, M. Dexpler: converting android dalvik bytecode to jimple for static analysis with soot. In SOAP (2012).
[8]
CHIN, E., FELT, A. P., GREENWOOD, K., AND WAGNER, D. Analyzing inter-application communication in android. In MobiSys (2011).
[9]
ENCK, W., OCTEAU, D., MCDANIEL, P., AND CHAUDHURI, S. A study of android application security. In USENIX Security (2011).
[10]
FELT, A. P., CHIN, E., HANNA, S., SONG, D., AND WAGNER, D. Android permissions demystified. In CCS (2011).
[11]
GIBLER, C., CRUSSELL, J., ERICKSON, J., AND CHEN, H. Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale. In Trust and Trustworthy Computing, vol. 7344 of LNCS. 2012.
[12]
GILBERT, P., CHUN, B.-G., COX, L. P., AND JUNG, J. Vision: automated security validation of mobile apps at app markets. In MCS (2011).
[13]
OCTEAU, D., ENCK, W., AND MCDANIEL, P. The Ded Decompiler. Tech. Rep. NAS-TR-0140-2010, Network and Security Research Center, Pennsylvania State University, Sept. 2010.
[14]
OLINER, A. J., IYER, A. P., LAGERSPETZ, E., TARKOMA, S., AND STOICA, I. Carat: Collaborative energy debugging for mobile devices. In HotDep (2012).
[15]
PATHAK, A., HU, Y. C., AND ZHANG, M. Bootstrapping Energy Debugging on Smartphones: A First Look at Energy Bugs in Mobile Devices. In HotNets (2011).
[16]
PATHAK, A., HU, Y. C., AND ZHANG, M. What is Keeping my Phone Awake? Characterizing and Detecting No-sleep Energy Bugs in Smartphone Apps. In MobiSys (2012).
[17]
PATHAK, A., HU, Y. C., AND ZHANG, M. Where is the Energy Spent Inside my App? Fine Grained Energy Accounting on Smartphones with Eprof. In EuroSys (2012).
[18]
REPS, T., HORWITZ, S., AND SAGIV, M. Precise interprocedural dataflow analysis via graph reachability. In POPL (1995).

Cited By

View all
  • (2020)E-DebitumProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering10.1145/3417113.3422999(170-177)Online publication date: 21-Sep-2020
  • (2019)A Lightweight Framework for Fine-Grained Lifecycle Control of Android ApplicationsProceedings of the Fourteenth EuroSys Conference 201910.1145/3302424.3303956(1-14)Online publication date: 25-Mar-2019
  • (2019)A Case for Lease-Based, Utilitarian Resource Management on Mobile DevicesProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3297858.3304057(301-315)Online publication date: 4-Apr-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
HotPower'12: Proceedings of the 2012 USENIX conference on Power-Aware Computing and Systems
October 2012
10 pages

Publisher

USENIX Association

United States

Publication History

Published: 07 October 2012

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)E-DebitumProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering10.1145/3417113.3422999(170-177)Online publication date: 21-Sep-2020
  • (2019)A Lightweight Framework for Fine-Grained Lifecycle Control of Android ApplicationsProceedings of the Fourteenth EuroSys Conference 201910.1145/3302424.3303956(1-14)Online publication date: 25-Mar-2019
  • (2019)A Case for Lease-Based, Utilitarian Resource Management on Mobile DevicesProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3297858.3304057(301-315)Online publication date: 4-Apr-2019
  • (2019)Catalog of energy patterns for mobile applicationsEmpirical Software Engineering10.1007/s10664-019-09682-024:4(2209-2235)Online publication date: 1-Aug-2019
  • (2018)On adopting linters to deal with performance concerns in Android appsProceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering10.1145/3238147.3238197(6-16)Online publication date: 3-Sep-2018
  • (2017)NavyDroidProceedings of the 9th Asia-Pacific Symposium on Internetware10.1145/3131704.3131705(1-10)Online publication date: 23-Sep-2017
  • (2016)Reducing Power Consumption and Latency in Mobile Devices Using an Event Stream ModelACM Transactions on Embedded Computing Systems10.1145/296420316:1(1-24)Online publication date: 13-Oct-2016
  • (2016)Understanding and detecting wake lock misuses for Android applicationsProceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering10.1145/2950290.2950297(396-409)Online publication date: 1-Nov-2016
  • (2016)DefDroidProceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2906388.2906419(221-234)Online publication date: 20-Jun-2016
  • (2016)Similarity-based wakeup management for mobile systems in connected standbyProceedings of the 53rd Annual Design Automation Conference10.1145/2897937.2898091(1-6)Online publication date: 5-Jun-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media