ASE 2025
Sun 16 - Thu 20 November 2025 Seoul, South Korea

This program is tentative and subject to change.

Wed 19 Nov 2025 11:40 - 11:50 at Grand Hall 2 - Web & Mobile Systems 1

User tracking is critical in the mobile ecosystem and relies on device identifiers to build user profiles. Early versions of Android allowed third-party apps to easily access non-resettable identifiers such as serial numbers and IMEI. As privacy concerns grew, Google has tightened identifier access in native Android. In response, stakeholders in custom Android systems introduced covert channels (e.g., system properties and settings) to maintain consistent and stable identifier access across systems and devices, which undoubtedly increases privacy risks. This paper examines the introduction of such channels through system customization and their vulnerability due to poor access control. We present IDRADAR, a scalable and accurate approach for identifying vulnerable properties and settings in custom Android systems. Applying our approach to 1,814 custom ROMs, we identified 8,192 system properties and 3,620 settings that store non-resettable device identifiers. Among these, 3,477 properties and 1,336 settings lack adequate access control and could be exploited by third-party apps to track users without permissions. Further validation on real devices demonstrates the effectiveness of our approach. Compared to state-of-the-art, IDRADAR offers improved scalability and analytical capabilities. Additionally, we investigate the root causes of the access control deficiencies and observe that such vulnerabilities frequently recur across devices from the same OEMs. We have reported our findings to the respective vendors and received positive confirmations. Our work underscores the need for greater scrutiny of covert access to device identifiers and better solutions to safeguard user privacy during system customizations.

This program is tentative and subject to change.

Wed 19 Nov

Displayed time zone: Seoul change

11:00 - 12:30
11:00
10m
Talk
Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps
Journal-First Track
Jordan Samhi University of Luxembourg, Luxembourg, René Just University of Washington, Michael D. Ernst University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
11:10
10m
Talk
GlassWing: A Tailored Static Analysis Approach for Flutter Android Apps
Research Papers
Xiangyu Zhang DISSec, NDST, College of Cyber Science, Nankai University, China, Yucheng Su Intelligence and Offensive Defense Lab, Xiaohongshu Inc., China, Lingling Fan Nankai University, Miaoying Cai DISSec, NDST, College of Cyber Science, Nankai University, China, Sen Chen Nankai University
11:20
10m
Talk
Characterizing and Repairing Color-Related Accessibility Issues in Android Apps
Research Papers
Jiahao Gu Xiamen University, Huaxun Huang Xiamen University
11:30
10m
Talk
Generating Failure-Based Oracles to Support Testing of Reported Bugs in Android Apps
Research Papers
Jack Johnson University of Minnesota, Junayed Mahmud University of Central Florida, Oscar Chaparro William & Mary, Kevin Moran University of Central Florida, Mattia Fazzini University of Minnesota
11:40
10m
Talk
On the (In)Security of Non-resettable Device Identifiers in Custom Android Systems
Research Papers
Zikan Dong Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and Technology
11:50
10m
Talk
Don't Mess with Bro's Cheese! An Empirical Study of Resource Conflict in Android Multi-window
Research Papers
Chenkai Guo Nankai University, China, Huimin Zhao College of Cryptology and Cyber Science, Nankai University, Tianhong Wang College of Computer Science, Nankai University, Naipeng Dong The University of Queensland, Australia, Qingqing Dong College of Cryptology and Cyber Science, Nankai University, Jiarui Che College of Computer Science, Nankai University, Yaqiong Qiao College of Cryptology and Cyber Science, Nankai University, Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing, Zheli Liu Nankai University
12:00
10m
Talk
Profile Coverage: Using Android Compilation Profiles to Evaluate Dynamic Testing
Research Papers
Jakob Bleier TU Wien, Felix Kehrer TU Wien, Jürgen Cito TU Wien, Martina Lindorfer TU Wien
Pre-print
12:10
10m
Talk
NATE: A Network-Aware Testing Enhancer for Network-Related Fault Detection in Android Apps
Research Papers
Yuanhong Lan Nanjing University, Shaoheng Cao Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University, Xuandong Li Nanjing University
12:20
10m
Talk
Automated Detection of Web Application Navigation Barriers for Screen Reader Users
Research Papers
Shubhi Jain University of California, Irvine, Syed Fatiul Huq University of California, Irvine, Ziyao He University of California, Irvine, Sam Malek University of California at Irvine