Please use this identifier to cite or link to this item:
Title: Fuzzing mobile applications to detect crashes
Authors: Wee, Aaron Soon Lee
Keywords: DRNTU::Engineering::Computer science and engineering::Software::Programming languages
Issue Date: 2019
Abstract: With the growing number of available android apps in the Google Play Store, it has become increasingly important for app developers to maintain app stability through automated black box testing, to ensure that both potential and existing app users are not lost to the competition due to frequent app crashes. While most app developers use sequential testing to automate testing of a specific test path, more bugs can be found with the addition of fuzz testing.This report introduces an automated black box android fuzzing tool named DRMFuzzer that operates in two phases. The first phase involves fuzzing a target app with user interface events using model-based approach enhanced by dynamic weighted random exploration strategy to find crashes. The second phase commences after fuzzing completes which consists of the generation of repeatable test scripts, activity screenshots and a detailed console output to facilitate crash analysis and bug reproduction. DRMFuzzer was evaluated on 10 android apps and when compared to Monkey showed that it was able to detect more unique crashes in 8 out of 10 of the apps tested and was able to reproduce 92% of the crashes found after the initial fuzzing.
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
Wee Soon Lee Aaron_U1621562A_Final Year Project Final Report.pdf
  Restricted Access
1.13 MBAdobe PDFView/Open

Page view(s)

Updated on May 6, 2021

Download(s) 50

Updated on May 6, 2021

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.