{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:30:32Z","timestamp":1765546232992,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["HSHQDC-14-C-B0040"],"award-info":[{"award-number":["HSHQDC-14-C-B0040"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1252644, CNS-1629771 and CCF-1618132"],"award-info":[{"award-number":["CCF-1252644, CNS-1629771 and CCF-1618132"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA95501610030"],"award-info":[{"award-number":["FA95501610030"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106250","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"220-232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["PATDroid: permission-aware GUI testing of Android"],"prefix":"10.1145","author":[{"given":"Alireza","family":"Sadeghi","sequence":"first","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Reyhaneh","family":"Jabbarvand","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Sam","family":"Malek","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/github.com\/jroal\/a2dpvolume","author":"Volume DP","year":"2017","unstructured":"2017. A2 DP Volume . ( 2017 ). https:\/\/github.com\/jroal\/a2dpvolume 2017. Always On . (2017). https:\/\/github.com\/rosenpin\/AlwaysOnDisplayAmoled 2017. Android Permissions Best Practices. (2017). https:\/\/developer.android.com\/ training\/permissions\/best-practices.html 2017. Android Studio User Guide: Test your app. (2017). https:\/\/developer.android. com\/studio\/test\/index.html 2017. Android Testing Support Library : Espresso. (2017). https:\/\/google.github. io\/android-testing-support-library\/docs\/espresso\/ 2017. Budget Watch. (2017). https:\/\/github.com\/brarcher\/budget-watch 2017. Dumbphone Assistant. (2017). 2017. A2DP Volume. (2017). https:\/\/github.com\/jroal\/a2dpvolume 2017. Always On. (2017). https:\/\/github.com\/rosenpin\/AlwaysOnDisplayAmoled 2017. Android Permissions Best Practices. (2017). https:\/\/developer.android.com\/ training\/permissions\/best-practices.html 2017. Android Studio User Guide: Test your app. (2017). https:\/\/developer.android. com\/studio\/test\/index.html 2017. Android Testing Support Library : Espresso. (2017). https:\/\/google.github. io\/android-testing-support-library\/docs\/espresso\/ 2017. Budget Watch. (2017). https:\/\/github.com\/brarcher\/budget-watch 2017. Dumbphone Assistant. (2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"The Monkey UI android testing tool. (2017). https:\/\/developer.android. com\/studio\/test\/monkey.html","author":"DumbphoneAssistant","year":"2017","unstructured":"https:\/\/github.com\/yeriomin\/ DumbphoneAssistant 2017. The Monkey UI android testing tool. (2017). https:\/\/developer.android. com\/studio\/test\/monkey.html 2017 . Notes . (2017). https:\/\/github.com\/SecUSo\/privacy-friendly-notes 2017. PATDroid: Permission-Aware Testing for Android. (2017). http:\/\/www.ics. uci.edu\/~seal\/projects\/patdroid\/ 2017. Radio Beacon. (2017). https:\/\/github.com\/yeriomin\/ DumbphoneAssistant 2017. The Monkey UI android testing tool. (2017). https:\/\/developer.android. com\/studio\/test\/monkey.html 2017. Notes. (2017). https:\/\/github.com\/SecUSo\/privacy-friendly-notes 2017. PATDroid: Permission-Aware Testing for Android. (2017). http:\/\/www.ics. uci.edu\/~seal\/projects\/patdroid\/ 2017. Radio Beacon. (2017)."},{"key":"e_1_3_2_1_3_1","first-page":"2017","volume-title":"https:\/\/github.com\/vector-im\/riot-android","year":"2017","unstructured":"https:\/\/github.com\/openbmap\/ radiocells-scanner-android 2017. Riot. ( 2017 ). https:\/\/github.com\/vector-im\/riot-android 2017. Robotium . (2017). http:\/\/robotium.com\/pages\/about-us 2017 . SMS Scheduler. (2017). https:\/\/github.com\/yeriomin\/SmsScheduler 2017. Suntimes. (2017). https:\/\/github.com\/forrestguice\/SuntimesWidget 2017. SysLog. (2017). https:\/\/github.com\/Tortel\/SysLog 2017. Xposed Framework. (2017). http:\/\/repo.xposed.info\/ https:\/\/github.com\/openbmap\/ radiocells-scanner-android 2017. Riot. (2017). https:\/\/github.com\/vector-im\/riot-android 2017. Robotium. (2017). http:\/\/robotium.com\/pages\/about-us 2017. SMS Scheduler. (2017). https:\/\/github.com\/yeriomin\/SmsScheduler 2017. Suntimes. (2017). https:\/\/github.com\/forrestguice\/SuntimesWidget 2017. SysLog. (2017). https:\/\/github.com\/Tortel\/SysLog 2017. Xposed Framework. (2017). http:\/\/repo.xposed.info\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ICSTW.2011.77"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2351676.2351717"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2594291.2594299"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2382196.2382222"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2509136.2509549"},{"volume-title":"Sebastian Weisgerber. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Backes Michael","unstructured":"Michael Backes , Sven Bugiel , Erik Derr , Patrick McDaniel , Damien Octeau , and Sebastian Weisgerber. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In 25th USENIX Security Symposium (USENIX Security 16) . 1101\u20131118. Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau, and Sebastian Weisgerber. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In 25th USENIX Security Symposium (USENIX Security 16). 1101\u20131118.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_11_1","volume-title":"Colbourn","author":"Bryce Ren\u00e9e C.","year":"2006","unstructured":"Ren\u00e9e C. Bryce and Charles J . Colbourn . 2006 . Prioritized interaction testing for pair-wise coverage with seeding and constraints. Information &amp; Software Technology 48, 10 (2006), 960\u2013970. Ren\u00e9e C. Bryce and Charles J. Colbourn. 2006. Prioritized interaction testing for pair-wise coverage with seeding and constraints. Information &amp; Software Technology 48, 10 (2006), 960\u2013970."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ASE.2015.89"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/32.605761"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TSE.2008.50"},{"key":"e_1_3_2_1_15_1","volume-title":"IASTED International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics","author":"Colbourn Charles J.","year":"2004","unstructured":"Charles J. Colbourn , Myra B. Cohen , and Ren\u00e9e Turban . A deterministic density algorithm for pairwise interaction coverage . In IASTED International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics , Innsbruck, Austria , February 17-19, 2004 . 345\u2013352. Charles J. Colbourn, Myra B. Cohen, and Ren\u00e9e Turban. A deterministic density algorithm for pairwise interaction coverage. In IASTED International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria, February 17-19, 2004. 345\u2013352."},{"key":"e_1_3_2_1_16_1","volume-title":"Portland","author":"Czerwonka Jacek","year":"2008","unstructured":"Jacek Czerwonka . Pairwise testing in the real world: Practical extensions to test-case scenarios , Portland , Oregon , October 14-15, 2008 . In Proceedings of 24th Pacific Northwest Software Quality Conference. 419\u2013430. Jacek Czerwonka. Pairwise testing in the real world: Practical extensions to test-case scenarios, Portland, Oregon, October 14-15, 2008. In Proceedings of 24th Pacific Northwest Software Quality Conference. 419\u2013430."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/s10664-010-9135-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2771783.2771784"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/1982595.1982612"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2377816.2377817"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1960275.1960284"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/ISSRE.2012.23"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/2491411.2491459"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_25_1","volume-title":"Patrick Mc-Daniel. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015","volume":"1","author":"Li Li","year":"2015","unstructured":"Li Li , Alexandre Bartel , Tegawend\u00c3\u013e F. Bissyand\u00c3\u013e , Jacques Klein , Yves Le Traon , Steven Arzt , Siegfried Rasthofer , Eric Bodden , Damien Octeau , and Patrick Mc-Daniel. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015 , Florence, Italy , May 16-24, 2015 , Volume 1 . 280\u2013291. Li Li, Alexandre Bartel, Tegawend\u00c3\u013e F. Bissyand\u00c3\u013e, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick Mc-Daniel. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 1. 280\u2013291."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2382196.2382223"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/2491411.2491450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2635868.2635896"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/2884781.2884853"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1883612.1883618"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1016\/S0166-218X(03)00291-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.5555\/2818754.2818767"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/2593882.2593885"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/1028976.1029012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/248233.248262"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2642937.2643018"},{"key":"e_1_3_2_1_37_1","volume-title":"28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. 72\u201377","author":"Shiba Toshiaki","year":"2017","unstructured":"Toshiaki Shiba , Tatsuhiro Tsuchiya , and Tohru Kikuno . Using Artificial Life Techniques to Generate Test Cases for Combinatorial Testing . In 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. 72\u201377 . PATDroid: Permission-Aware GUI Testing of Android ESEC\/FSE\u201917, September 4\u20138 , 2017 , Paderborn, Germany Toshiaki Shiba, Tatsuhiro Tsuchiya, and Tohru Kikuno. Using Artificial Life Techniques to Generate Test Cases for Combinatorial Testing. In 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. 72\u201377. PATDroid: Permission-Aware GUI Testing of Android ESEC\/FSE\u201917, September 4\u20138, 2017, Paderborn, Germany"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/TSE.2013.55"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.5555\/781995.782008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1007\/978-3-642-37057-1_19"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/TSE.2012.65"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/MC.2013.408"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ESEC\/FSE'17","name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106250","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:36Z","timestamp":1750217436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":42,"alternative-id":["10.1145\/3106237.3106250","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106250","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}