This release includes the source code for the static analyses, instrumentation and necessary scripts to reproduce the results described in the SCAM'19 paper:
@inproceedings{zhang-scam19,
title = "Introducing Privacy in Screen Event Frequency Analysis for {Android} Apps",
author = "Hailong Zhang and Sufian Latif and Raef Bassily and Atanas Rountev",
booktitle = "IEEE International Working Conference on Source Code Analysis and Manipulation",
year = 2019,
}
The directory structure is as follows:
-
README.md: this file.
-
INSTALL.md: instructions for reproduction of the results in the paper.
-
LICENSE: license for the software components developed at OSU.
-
apks: APKs of apps used in the SCAM'19 paper.
-
db: recorded screen view events from Monkey runs as SQLite databases.
-
code: source code for the static analysis and instrumentation, as well as scripts to run Monkey for simulation.
-
simulation: scripts to read and randomize events in databases, and plot the results described in the paper.
-
xml: results of the static analysis for the experimental subjects.