(\mu\)SE: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android

This demo paper presents the technical details and usage scenarios of \(\mu\)SE: a mutation-based tool for evaluating security-focused static analysis tools for Android. Mutation testing is generally used by software practitioners to assess the robustness of a given test-suite. However, we leverage...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2021-02
Hauptverfasser: Amit Seal Ami, Kaushal Kafle, Moran, Kevin, Nadkarni, Adwait, Poshyvanyk, Denys
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This demo paper presents the technical details and usage scenarios of \(\mu\)SE: a mutation-based tool for evaluating security-focused static analysis tools for Android. Mutation testing is generally used by software practitioners to assess the robustness of a given test-suite. However, we leverage this technique to systematically evaluate static analysis tools and uncover and document soundness issues. \(\mu\)SE's analysis has found 25 previously undocumented flaws in static data leak detection tools for Android. \(\mu\)SE offers four mutation schemes, namely Reachability, Complex-reachability, TaintSink, and ScopeSink, which determine the locations of seeded mutants. Furthermore, the user can extend \(\mu\)SE by customizing the API calls targeted by the mutation analysis. \(\mu\)SE is also practical, as it makes use of filtering techniques based on compilation and execution criteria that reduces the number of ineffective mutations.
ISSN:2331-8422
DOI:10.48550/arxiv.2102.06823