Write a Blog >>
ASE 2020
Mon 21 - Fri 25 September 2020 Melbourne, Australia
Thu 24 Sep 2020 03:00 - 03:20 at Koala - Empirical Software Engineering (2) Chair(s): Julia Rubin

Third-party libraries (TPLs) have become a significant part of the Android ecosystem. Developers can employ various TPLs with different functionalities to facilitate their app development. Unfortunately, the popularity of TPLs also brings new challenges and even threats. TPLs may carry malicious or vulnerable code and can infect many popular apps to pose threats to mobile users. Besides, the code of third-party libraries could constitute noises in some detection tasks. Thus, researchers have developed various tools to identify TPLs. However, no existing work has studied these TPL detection tools in detail; different tools focus on different applications with performance differences, so little is known about them.

To better understand existing TPL detection tools and dissect TPL detection techniques, we conduct an experience paper and attempt to fill the gap by evaluating and comparing all publicly available TPL detection tools based on four criteria: effectiveness, efficiency, code obfuscation-resilience capability, and ease of use. We reveal their advantages and disadvantages based on our empirical study. The result shows that most TPL detection tools can achieve high precision but with low recall. According to our evaluation and survey results, we recommend different tools for different application scenarios. We find that LibRadar is suitable for large-scale in-app TPL detection. LibPecker is ideal for identifying obfuscated TPLs. LibScout can identify specific library versions, which can be leveraged to find vulnerable TPLs, etc. Besides, we enhance these open-sourced tools by fixing their limitations, to improve their detection ability. We also build an extensible framework that integrates all existing available TPL detection tools, providing online service for the research community. We make publicly available the evaluation dataset and enhanced tools. We believe our work provides a clear picture of existing TPL detection techniques and also give a road-map for future directions.

Thu 24 Sep

Displayed time zone: (UTC) Coordinated Universal Time change

02:20 - 03:20
Empirical Software Engineering (2)Research Papers at Koala
Chair(s): Julia Rubin University of British Columbia, Canada
02:20
20m
Talk
Understanding Performance Concerns in the API Documentation of Data Science Libraries
Research Papers
Yida Tao Shenzhen University, Jiefang Jiang Shenzhen University, Yepang Liu Southern University of Science and Technology, Zhiwu Xu Shenzhen University, Shengchao Qin University of Teesside
02:40
20m
Talk
On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems
Research Papers
Samuel Benton The University of Texas at Dallas, Xia Li Kennesaw State University, Yiling Lou Peking University, China, Lingming Zhang University of Illinois at Urbana-Champaign, USA
03:00
20m
Talk
Automated Third-party Library Detection for Android Applications: Are We There Yet?Experience
Research Papers
Xian Zhan The Hong Kong Polytechnic University, Lingling Fan Nanyang Technological University, Singapore, Tianming Liu Monash University, Australia, Sen Chen Nanyang Technological University, Singapore, Li Li Monash University, Australia, Haoyu Wang Beijing University of Posts and Telecommunications, China, Yifei Xu Southern University of Science and Technology, Xiapu Luo The Hong Kong Polytechnic University, Yang Liu Nanyang Technological University, Singapore