{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:21:45Z","timestamp":1763202105921},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ase.2017.8115613","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T22:03:57Z","timestamp":1511474637000},"page":"4-15","source":"Crossref","is-referenced-by-count":10,"title":["Systematically testing background services of mobile apps"],"prefix":"10.1109","author":[{"given":"Li Lyna","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chieh-Jan Mike","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464459"},{"journal-title":"Testflight","year":"2016","author":"inc","key":"ref38"},{"journal-title":"Wireshark","year":"0","key":"ref33"},{"key":"ref32","first-page":"21","article-title":"A Survey on Automatic Test Data Generation","author":"edvardsson","year":"1999","journal-title":"Proceedings of the Second Conference on Computer Science and Engineering in Linkoping"},{"journal-title":"IC3","year":"2015","key":"ref31"},{"journal-title":"JaCoCo Java Code Coverage Library","year":"2016","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606553"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"journal-title":"UI Automator Viewer","year":"2016","key":"ref35"},{"journal-title":"Appium","year":"2016","author":"labs","key":"ref34"},{"journal-title":"iOS Background App Refresh","year":"2016","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"ref11","first-page":"563","article-title":"Selectively Taming Background Android Apps to Improve Battery Lifetime","author":"martins","year":"2015","journal-title":"USENIX Annual Technical Conference USENIX"},{"journal-title":"IC3 Inter-Component Communication Analysis for Android","year":"2015","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263963"},{"journal-title":"Intent Fuzzer","year":"2012","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590316"},{"key":"ref17","first-page":"68:68","article-title":"DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag","author":"ye","year":"2013","journal-title":"International Mobile Multimedia Communications Conference"},{"key":"ref18","first-page":"3111","article-title":"Distributed Representations of Words and Phrases and their Compositionality","author":"mikolov","year":"2013","journal-title":"Neural Information Processing Systems NIPS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"journal-title":"Genymotion","year":"2016","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2708716"},{"journal-title":"Androguard","year":"2015","author":"team","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594377"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790107"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.70"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/2745844.2745875","article-title":"Smartphone Energy Drain in the Wild: Analysis and Implications","author":"chen","year":"2015","journal-title":"Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems - SIGMETRICS '11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435380"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815713"},{"key":"ref2","first-page":"57","article-title":"DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps","author":"liu","year":"2014","journal-title":"USENIX Symposium on Networked System Design and Implementation NSDI"},{"journal-title":"Android Restrict Background Data Usage","year":"2016","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639131"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307661"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971680"},{"key":"ref45","first-page":"543","article-title":"Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis","author":"qcteau","year":"2013","journal-title":"USENIX Security Symposium - Security '05"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"journal-title":"Android Services","year":"2017","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032972"},{"journal-title":"Xposed","year":"2016","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"ref26","first-page":"191","article-title":"Entrack: A System Facility for Analyzing Energy Consumption of Android System Services","author":"martins","year":"2015","journal-title":"ACM International Joint Conference On Pervasive And Ubiquitous Computing Ubicomp"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"journal-title":"Word2Vec Toolkit","year":"2013","key":"ref25"}],"event":{"name":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2017,10,30]]},"location":"Urbana, IL","end":{"date-parts":[[2017,11,3]]}},"container-title":["2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106906\/8115603\/08115613.pdf?arnumber=8115613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T05:53:56Z","timestamp":1659938036000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/ase.2017.8115613","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}