E-APK: Energy pattern detection in decompiled android applications

نویسندگان

چکیده

Energy efficiency is a non-functional requirement that developers must consider, particularly when building software for battery-operated devices like mobile ones: long-lasting battery an essential enjoyable user experience. In previous studies, it has been shown many applications include inefficiencies cause to be drained faster than necessary. Some of these result from patterns have catalogued, and which more energy-efficient alternatives are also known. The existing catalogues, however, assume as fundamental one access the source code application in order able analyse it. This makes independent energy analysis challenging, or even impossible, e.g. or, most significantly, App Store trying provide information on how efficient being submitted publication is. We study viability looking known by decompiling them analysing resulting code. For this, we decompiled analysed 420 open-source extending tool, now capable transparently android applications. With collected data, performed comparative presence four between two types analysis: (i) comparing total number pattern detections; (ii) similarity detections. When detections against code, found 79.29% reported same To test APKs, calculated, each application, score based our implemented detectors. Of all applications, 35.76% achieved perfect 4, 89.40% got 3 out 4. Furthermore, only 0. viewed tandem, results analyses point promising direction. They initial evidence static techniques, typically used can viable method inspect APKs restricted, further research this area worthwhile.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

APK Auditor: Permission-based Android malware detection system

Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the...

متن کامل

Detecting Anomalous Energy Consumption in Android Applications

The use of powerful mobile devices, like smartphones, tablets and laptops, are changing the way programmers develop software. While in the past the primary goal to optimize software was the run time optimization, nowadays there is a growing awareness of the need to reduce energy consumption. This paper presents a technique and a tool to detect anomalous energy consumption in Android application...

متن کامل

Certifying Energy Efficiency of Android Applications

While smartphone and tablet functionality is increasing, battery runtime goes down. Both users and software developers are not always aware of the energy consumed by applications. Without this information, users cannot choose energy-efficient apps to prevent battery drain. Awareness of energy consumption would also entice app developers to implement more energy-efficient apps to remain competit...

متن کامل

Piracy Detection App of Android Applications

Rapid increase of Smartphone users worldwide has moved developers attention towards Mobile platform to create applications for Smartphone. Android is one such major mobile platform and also an open source operating system. With the rapid increase in the android applications some undesirable apps begin to show up. Two kinds of such apps are pirated and malware. This focuses on piracy of applicat...

متن کامل

Analysis and Detection of Malicious Behaviors in Repackaged Android Applications

Context Over the past decades malware authorship grew to become a profession. Nowadays, there exists a plethora of malware instances that span various targets, structures, motivations, and objectives [1]. Despite the different objectives they pursue, the majority of malware authors strive to prolong the period of time their instances remain operational within the infected system. In this contex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of computer languages

سال: 2023

ISSN: ['2665-9182', '2590-1184']

DOI: https://doi.org/10.1016/j.cola.2023.101220