Write a Blog >>
ASE 2021
Sun 14 - Sat 20 November 2021 Australia
Mon 15 Nov 2021 10:30 - 10:45 at Wombat - DS Session 2
Thu 18 Nov 2021 10:12 - 10:14 at Kangaroo - LBR + DS Poster (2) (Thursday 21:00 - 00:00) Chair(s): Xiaoyin Wang

We propose an automated pipeline for analyzing privacy leaks in Android applications. By using a combination of dynamic and static analysis, we validate the results from each other to improve accuracy. Compare to the state-of-the-art approaches, we not only capture the network traffic for analysis, but also look into the data flows inside the application. We particularly focus on the privacy leakage caused by third-party services and high-risk permissions. The proposed automated approach will combine taint analysis, permission analysis, network traffic analysis, and dynamic function tracing during run-time to identify private information leaks. We further implement an automatic validation and complementation process to reduce false positives. A small-scale experiment has been conducted on 30 Android applications and a large-scale experiment on more than 10,000 Android applications is in progress.

Mon 15 Nov

Displayed time zone: Hobart change

10:30 - 12:00
DS Session 2Doctoral Symposium at Wombat
10:30
15m
Talk
An Automated Pipeline for Privacy Leak Analysis of Android Applications
Doctoral Symposium
Yifan Zhou The University of Adelaide
File Attached
10:45
15m
Talk
Training Automated Test Oracles to Identify Semantic Bugs
Doctoral Symposium
Charaka Geethal Monash University
File Attached
11:00
15m
Talk
Binary Code Similarity Detection
Doctoral Symposium
Zian Liu Swinburne University of Technology; Data61, CSIRO, Chao Chen James Cook University, Jun Zhang Digital Research & Innovation Capability Platform, Swinburne University of Technology, Dongxi Liu Data61, CSIRO, Muhammad Ejaz Ahmed Data61, CSIRO, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology
File Attached
11:15
15m
Talk
API Compatibility Issue Detection, Testing and Analysis for Android Apps
Doctoral Symposium
Tarek Mahmud Texas State University
File Attached
11:30
15m
Other
Discussion with presenters
Doctoral Symposium

11:45
15m
Talk
Wrap-up first half DS
Doctoral Symposium
Li Li Monash University

Thu 18 Nov

Displayed time zone: Hobart change

10:00 - 11:00
LBR + DS Poster (2) (Thursday 21:00 - 00:00)Late Breaking Results / Doctoral Symposium at Kangaroo
Chair(s): Xiaoyin Wang University of Texas at San Antonio
10:00
2m
Talk
API Compatibility Issue Detection, Testing and Analysis for Android Apps
Doctoral Symposium
Tarek Mahmud Texas State University
File Attached
10:02
2m
Talk
Towards the generation of machine learning defect reports
Doctoral Symposium
Tuan Dung Lai Deakin University
Pre-print File Attached
10:04
2m
Talk
DSInfoSearch: Supporting experimentation process of data scientists
Doctoral Symposium
Shangeetha Sivasothy Applied Artificial Intelligence Institute, Deakin University
File Attached
10:06
2m
Talk
A First Look at the Effect of Deep Learning inCoverage-guided Fuzzing
Late Breaking Results
Siqi Li Tianjin University, Yun Lin National University of Singapore, Xiaofei Xie Kyushu University, Yuekang Li Nanyang Technological University, Li Xiaohong TianJin University, Weimin Ge Tianjin University, Yang Liu Nanyang Technological University, Jin Song Dong National University of Singapore
10:08
2m
Talk
Counterexample Guided Inductive Repair of Reactive Contracts
Late Breaking Results
Soha Hussein University of Minnesota, USA / Ain Shams University, Egypt, Vaibhav Sharma University of Minnesota, USA, Stephen McCamant University of Minnesota, USA, Sanjai Rayadurgam University of Minnesota, Mats Heimdahl University of Minnesota
10:10
2m
Talk
AST-Transformer: Encoding Abstract Syntax TreesEfficiently for Code Summarization
Late Breaking Results
Ze Tang Software Institute, Nanjing University, Chuanyi Li Software Institute, Nanjing University, Jidong Ge , Xiaoyu Shen Alexa AI, Amazon, Zheling Zhu Software Institute, Nanjing University, Bin Luo Software Institute, Nanjing University
10:12
2m
Talk
An Automated Pipeline for Privacy Leak Analysis of Android Applications
Doctoral Symposium
Yifan Zhou The University of Adelaide
File Attached
10:14
2m
Talk
Detecting Adversarial Samples with Graph-Guided Testing
Late Breaking Results
Zuohui Chen Zhejiang University of Technology, Renxuan Wang Zhejiang University of Technology, Jingyang Xiang Zhejiang University of Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Xin Xia Huawei Software Engineering Application Technology Lab, Shouling Ji Zhejiang University, Qi Xuan Zhejiang University of Technology, Xiaoniu Yang Zhejiang University of Technology
10:16
2m
Talk
Using Static Analysis to Address Microservice Architecture Reconstruction
Late Breaking Results
Vincent Bushong Baylor University, Dipta Das Baylor University, Abdullah Al Maruf Baylor University, Tomas Cerny Baylor University
10:18
2m
Talk
Applying Semi-Automated Hyperparameter Tuning for Clustering Algorithms
Late Breaking Results
Elizabeth Forest James Cook University, Anne Swinbourne James Cook University, Trina Myers Queensland University of Technology, Mitchell Scovell James Cook University
Link to publication
10:20
2m
Talk
Business Process Extraction Using Static Analysis
Late Breaking Results
Rofiqul Islam Baylor University, Tomas Cerny Baylor University
10:22
2m
Talk
Binary Code Similarity Detection
Doctoral Symposium
Zian Liu Swinburne University of Technology; Data61, CSIRO, Chao Chen James Cook University, Jun Zhang Digital Research & Innovation Capability Platform, Swinburne University of Technology, Dongxi Liu Data61, CSIRO, Muhammad Ejaz Ahmed Data61, CSIRO, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology
File Attached
10:24
2m
Talk
Improving Mutation-Based Fault Localization with Plausible-code Generating Mutation Operators
Late Breaking Results
Juyoung Jeon Handong Global University, Shin Hong Handong Global University
10:26
2m
Talk
Using Version Control and Issue Tickets to detect Code Debt and Economical Cost
Late Breaking Results
Abdullah Al Maruf Baylor University, Noah Lambaria Baylor University, Amr El-Sayed Mohamed Abdelfattah Baylor University, Tomas Cerny Baylor University
File Attached
10:28
2m
Talk
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
Late Breaking Results
Tien N. Nguyen University of Texas at Dallas, Kim-Kwang Raymond Choo University of Texas at San Antonio
10:30
2m
Talk
A Prediction Model for Software Requirements Change Impact
Doctoral Symposium
Kareshna Zamani PhD candidate
File Attached
10:32
2m
Talk
Leveraging Code Clones and Natural Language Processing for Log Statement Prediction
Doctoral Symposium
Sina Gholamian University of Waterloo
Pre-print