skip to main content
10.1145/2993259.2993262acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
short-paper

CALAPPA: a toolchain for mining Android applications

Published: 14 November 2016 Publication History

Abstract

Software engineering researchers and practitioners working on the Android ecosystem frequently have to do the same tasks over and over: retrieve data from the Google Play store to analyze it, decompile the Dalvik bytecode to understand the behavior of the app, and analyze applications metadata and user reviews. In this paper we present CALAPPA, a highly reusable and customizable toolchain that allows researchers to easily run common analysis tasks on large Android application datasets. CALAPPA includes components to retrieve the data from different Android stores, and comes with a predefined, but extensible, set of modules that can analyze apps metadata and code.

References

[1]
K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon. Androzoo: Collecting millions of android apps for the research community. In Proceedings of MSR, pages 468–471, 2016.
[2]
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In Proceedings of PLDI, 2014.
[3]
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: Analyzing the android permission specification. In Proceedings of CCS, pages 217–228, 2012.
[4]
V. Avdiienko, K. Kuznetsov, A. Gorla, A. Zeller, S. Arzt, S. Rasthofer, and E. Bodden. Mining apps for abnormal usage of sensitive data. In Proceedings of ICSE, pages 426–436, 2015.
[5]
S. R. Choudhary, A. Gorla, and A. Orso. Automated test input generation for android: Are we there yet? (E). In Proceedings of ASE, pages 429–440, 2015.
[6]
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of CCS, pages 627–638, 2011.
[7]
A. Gorla, I. Tavecchia, F. Gross, and A. Zeller. Checking app behavior against app descriptions. In Proceedings of ICSE, pages 1025–1035, 2014.
[8]
K. Kuznetsov, A. Gorla, I. Tavecchia, F. Gross, and A. Zeller. Mining android apps for anomalies. In The Art and Science of Analyzing Software Data, pages 257–281. Morgan Kaufmann, 4 2015.
[9]
W. Martin, F. Sarro, Y. Jia, Y. Zhang, and M. Harman. A survey of app store analysis for software engineering. Technical report, University College London, 2016.
[10]
A. von Rhein, T. Berger, N. S. Johansson, M. M. Hardø, and S. Apel. Lifting inter-app data-flow analysis to large app sets. Technical Report MIP-1504, Department of Informatics and Mathematics, University of Passau, September 2015.
[11]
Technical Report MIP-1504, Department of Informatics and Mathematics, University of Passau.
[12]
F. Wei, S. Roy, X. Ou, and Robby. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In Proceedings of CCS, pages 1329–1341, 2014.

Cited By

View all
  • (2018)An investigation into Android run-time permissions from the end users' perspectiveProceedings of the 5th International Conference on Mobile Software Engineering and Systems10.1145/3197231.3197236(45-55)Online publication date: 27-May-2018
  • (2018)What did really change with the new release of the app?Proceedings of the 15th International Conference on Mining Software Repositories10.1145/3196398.3196449(142-152)Online publication date: 28-May-2018
  • (2016)Checking app user interfaces against app descriptionsProceedings of the International Workshop on App Market Analytics10.1145/2993259.2993265(1-7)Online publication date: 14-Nov-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WAMA 2016: Proceedings of the International Workshop on App Market Analytics
November 2016
56 pages
ISBN:9781450343985
DOI:10.1145/2993259
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android Analysis
  2. Android app mining
  3. App market analysis

Qualifiers

  • Short-paper

Conference

FSE'16
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)An investigation into Android run-time permissions from the end users' perspectiveProceedings of the 5th International Conference on Mobile Software Engineering and Systems10.1145/3197231.3197236(45-55)Online publication date: 27-May-2018
  • (2018)What did really change with the new release of the app?Proceedings of the 15th International Conference on Mining Software Repositories10.1145/3196398.3196449(142-152)Online publication date: 28-May-2018
  • (2016)Checking app user interfaces against app descriptionsProceedings of the International Workshop on App Market Analytics10.1145/2993259.2993265(1-7)Online publication date: 14-Nov-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media