Memory leaks represent a remarkable problem for mobile app developers since a waste of memory due to bad programming practices may reduce the available memory of the device, slow down the apps, reduce their responsiveness and, in the worst cases, they may cause the crash of the app. A common cause of memory leaks in the specific context of Android apps is the bad handling of the events tied to the Activity Lifecycle. In order to detect and characterize these memory leaks, we present FunesDroid, a tool-supported black box technique for the automatic detection of memory leaks tied to the Activity Lifecycle in Android apps. FunesDroid implements a testing approach that can find memory leaks by analyzing unnecessary heap object replications aft...
App crashes constitute an important deterrence for app adoption in the android ecosystem. Yet, Andro...
Software aging – the phenomenon affecting many long-running systems, causing perfor-mance degradatio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
Memory leaks represent a remarkable problem for mobile app developers since a waste of memory due to...
One of the best ways to make a mobile application usable, reputed and high-scored is attention to th...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Android is today the world's most popular mobile operating system and the demand for quality to Andr...
The analysis of application-specific behavior has become an increasingly important technique in cybe...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Users entrust mobile applications (apps) to help them with different tasks in their daily lives. How...
Memory corruption is one of the oldest and most prominent problems in the field of computer security...
With the growing number of available android apps in the Google Play Store, it has become increasing...
Resource leaks -- a program does not release resources it previously acquired -- are a common kind o...
Summary. We propose Dagger, a lightweight system to dynamically vet sens-itive behaviors in Android ...
Mobile applications can access both sensitive personal data and the network, giving rise to threats ...
App crashes constitute an important deterrence for app adoption in the android ecosystem. Yet, Andro...
Software aging – the phenomenon affecting many long-running systems, causing perfor-mance degradatio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
Memory leaks represent a remarkable problem for mobile app developers since a waste of memory due to...
One of the best ways to make a mobile application usable, reputed and high-scored is attention to th...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Android is today the world's most popular mobile operating system and the demand for quality to Andr...
The analysis of application-specific behavior has become an increasingly important technique in cybe...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Users entrust mobile applications (apps) to help them with different tasks in their daily lives. How...
Memory corruption is one of the oldest and most prominent problems in the field of computer security...
With the growing number of available android apps in the Google Play Store, it has become increasing...
Resource leaks -- a program does not release resources it previously acquired -- are a common kind o...
Summary. We propose Dagger, a lightweight system to dynamically vet sens-itive behaviors in Android ...
Mobile applications can access both sensitive personal data and the network, giving rise to threats ...
App crashes constitute an important deterrence for app adoption in the android ecosystem. Yet, Andro...
Software aging – the phenomenon affecting many long-running systems, causing perfor-mance degradatio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...