DroidLeaks features 292 diverse resource leak bugs in popular and large-scale open-source Android apps. For each bug, DroidLeaks provides links to: 1. the code repository of the app subject 2. the concerned resource class 3. the buggy code revision (and buggy file and method names) 4. the bug-fixing code revision (i.e., link to the patch) 5. the bug report or the corresponding pull request for patches (if located
Android is currently the largest mobile platform with around 750 million devices worldwide. Unfortun...
Android's permission model is used to regulate access to the Application Program Interfaces (APIs) w...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...
Resource leaks -- a program does not release resources it previously acquired -- are a common kind o...
While Apple has checked every app available on the App Store, Google takes another approach that all...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Software maintenance constitutes a large portion of the software development lifecycle. To carry out...
The Android platform now features more than a million apps from thousands of developers. This abunda...
Abstract—Changes, a rather inevitable part of software de-velopment can cause maintenance implicatio...
This is a replication package for our paper "Automated Repair of Resource Leaks in Android Applicati...
Abstract—Studying vast volumes of bug and issue discussions can give an understanding of what the co...
Abstract—Smartphones have become ubiquitous due to func-tionalities provided by them which is no les...
The modern software development landscape has seen a shift in focus toward mobile applications as ta...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Android is currently the largest mobile platform with around 750 million devices worldwide. Unfortun...
Android's permission model is used to regulate access to the Application Program Interfaces (APIs) w...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...
Resource leaks -- a program does not release resources it previously acquired -- are a common kind o...
While Apple has checked every app available on the App Store, Google takes another approach that all...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Software maintenance constitutes a large portion of the software development lifecycle. To carry out...
The Android platform now features more than a million apps from thousands of developers. This abunda...
Abstract—Changes, a rather inevitable part of software de-velopment can cause maintenance implicatio...
This is a replication package for our paper "Automated Repair of Resource Leaks in Android Applicati...
Abstract—Studying vast volumes of bug and issue discussions can give an understanding of what the co...
Abstract—Smartphones have become ubiquitous due to func-tionalities provided by them which is no les...
The modern software development landscape has seen a shift in focus toward mobile applications as ta...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Android is currently the largest mobile platform with around 750 million devices worldwide. Unfortun...
Android's permission model is used to regulate access to the Application Program Interfaces (APIs) w...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...