{"id":"https://openalex.org/W4285586701","doi":"https://doi.org/10.1145/3533767.3534221","title":"PermDroid: automatically testing permission-related behaviour of Android applications","display_name":"PermDroid: automatically testing permission-related behaviour of Android applications","publication_year":2022,"publication_date":"2022-07-15","ids":{"openalex":"https://openalex.org/W4285586701","doi":"https://doi.org/10.1145/3533767.3534221"},"language":"en","primary_location":{"id":"doi:10.1145/3533767.3534221","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061807969","display_name":"Shuaihao Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuaihao Yang","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029438965","display_name":"Zigang Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zigang Zeng","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071056788","display_name":"Wei Song","orcid":"https://orcid.org/0000-0002-4324-3382"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Song","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061807969"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":1.4859,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.81560762,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"593","last_page":"604"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9887381792068481},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7699331045150757},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6296327114105225},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4112362563610077},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3018069863319397}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9887381792068481},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7699331045150757},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6296327114105225},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4112362563610077},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3018069863319397},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3533767.3534221","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W176206521","https://openalex.org/W1565125975","https://openalex.org/W1812630525","https://openalex.org/W1971844571","https://openalex.org/W1972642098","https://openalex.org/W1986330503","https://openalex.org/W1988737164","https://openalex.org/W1994931937","https://openalex.org/W2004921952","https://openalex.org/W2013856010","https://openalex.org/W2055703785","https://openalex.org/W2075699551","https://openalex.org/W2087611087","https://openalex.org/W2088749975","https://openalex.org/W2091932246","https://openalex.org/W2092298276","https://openalex.org/W2101800210","https://openalex.org/W2102197271","https://openalex.org/W2105412867","https://openalex.org/W2113867182","https://openalex.org/W2114275288","https://openalex.org/W2140095007","https://openalex.org/W2140462040","https://openalex.org/W2153497135","https://openalex.org/W2164170598","https://openalex.org/W2166743230","https://openalex.org/W2227887088","https://openalex.org/W2242463216","https://openalex.org/W2296725054","https://openalex.org/W2356780433","https://openalex.org/W2407130899","https://openalex.org/W2463553622","https://openalex.org/W2496662957","https://openalex.org/W2504384057","https://openalex.org/W2732777532","https://openalex.org/W2740719741","https://openalex.org/W2740742367","https://openalex.org/W2767357513","https://openalex.org/W2885043017","https://openalex.org/W2886986591","https://openalex.org/W2955215835","https://openalex.org/W2962992787","https://openalex.org/W2969874374","https://openalex.org/W2984951742","https://openalex.org/W3013205478","https://openalex.org/W3089623613","https://openalex.org/W3091089987","https://openalex.org/W3096210725","https://openalex.org/W3102181655","https://openalex.org/W3102650716","https://openalex.org/W3177754813","https://openalex.org/W3178676396","https://openalex.org/W3194555047","https://openalex.org/W4251541794","https://openalex.org/W6931549644"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W2070518775","https://openalex.org/W609672658"],"abstract_inverted_index":{"The":[0,113],"Android":[1,119],"runtime":[2],"permission":[3,32,58],"model":[4],"allows":[5],"users":[6],"to":[7,22,68,101],"grant":[8],"and":[9,37,124,139],"revoke":[10],"permissions":[11,77],"at":[12],"runtime.":[13],"To":[14,61],"verify":[15],"the":[16,24,71,90,95,98,107,110,122,128,152],"robustness":[17],"of":[18,31,47,74,109,126,146],"apps,":[19],"developers":[20],"have":[21],"test":[23,70,102],"apps":[25,75,120],"repeatedly":[26],"under":[27,106],"a":[28,84],"wide":[29],"range":[30],"combinations,":[33],"which":[34,147],"is":[35],"time-consuming":[36],"unsuited":[38],"for":[39,89,97],"regression":[40],"testing.":[41],"Existing":[42],"app":[43],"testing":[44],"techniques":[45],"are":[46,143,148],"limited":[48],"help":[49],"in":[50,136],"this":[51,63],"context,":[52],"as":[53],"they":[54],"seldom":[55],"consider":[56],"different":[57],"combinations":[59,108],"explicitly.":[60],"address":[62],"issue,":[64],"we":[65],"present":[66],"PermDroid":[67,80],"automatically":[69],"permission-related":[72,103,130,141],"behaviour":[73,104],"with":[76],"granted/revoked":[78],"dynamically.":[79],"first":[81],"statically":[82],"constructs":[83],"state":[85],"transition":[86],"graph":[87],"(STG)":[88],"app;":[91],"it":[92],"then":[93],"utilizes":[94],"STG":[96],"permission-directed":[99],"exploration":[100],"only":[105],"relevant":[111],"permissions.":[112],"experimental":[114],"results":[115],"on":[116],"50":[117],"real-world":[118],"demonstrate":[121],"effectiveness":[123],"efficiency":[125],"PermDroid:":[127],"average":[129],"API":[131],"invocation":[132],"coverage":[133],"achieves":[134],"72.38%":[135],"10":[137],"minutes,":[138],"seven":[140],"bugs":[142],"uncovered,":[144],"six":[145],"not":[149],"detected":[150],"by":[151],"competitors.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
