{"id":34,"date":"2013-05-13T11:34:51","date_gmt":"2013-05-13T09:34:51","guid":{"rendered":"http:\/\/sseblog.ec-spride.de\/?page_id=34"},"modified":"2016-02-09T10:44:11","modified_gmt":"2016-02-09T09:44:11","slug":"droidbench","status":"publish","type":"page","link":"https:\/\/blogs.uni-paderborn.de\/sse\/tools\/droidbench\/","title":{"rendered":"DroidBench &#8211; Benchmarks"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_34 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_34')){$('.twoclick_social_bookmarks_post_34').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blogs.uni-paderborn.de\\\/sse\\\/tools\\\/droidbench\\\/\",\"post_id\":34,\"post_title_referrer_track\":\"DroidBench+%26%238211%3B+Benchmarks\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><a href=\"http:\/\/blogs.uni-paderborn.de\/sse\/files\/2013\/05\/droidbench_apps.png\"><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/blogs.uni-paderborn.de\/sse\/files\/2013\/05\/droidbench_apps.png\" alt=\"droidbench_apps\" width=\"400\" \/><\/a><\/p>\n<p>DroidBench is a set of open source real-life Android applications to be used as a testing ground for static and dynamic security tools. It contains different applications with data leaks. The challenges for the security tools are the identification of the data leakage. For the checking of false-positive alarms, \u00a0we also included different applications that do not have a data leak.<\/p>\n<p>Version 2 comprises 120 test cases, including the following categories:<\/p>\n<ul>\n<li>Arrays and Lists<\/li>\n<li>Callbacks<\/li>\n<li>Field and Object Sensitivity<\/li>\n<li>Inter-App Communication<\/li>\n<li>Lifecycle<\/li>\n<li>General Java<\/li>\n<li>Miscellaneous Android-Specific<\/li>\n<li>Implicit Flows<\/li>\n<li>Reflection\u00a0<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/raw.github.com\/secure-software-engineering\/DroidBench\/develop\/new.gif\" alt=\"\" width=\"31\" height=\"12\" \/><\/li>\n<li>Threading\u00a0<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/raw.github.com\/secure-software-engineering\/DroidBench\/develop\/new.gif\" alt=\"\" width=\"31\" height=\"12\" \/><\/li>\n<li>Emulator Detection\u00a0<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/raw.github.com\/secure-software-engineering\/DroidBench\/develop\/new.gif\" alt=\"\" width=\"31\" height=\"12\" \/><\/li>\n<\/ul>\n<p><strong>Where can I find DroidBench?<\/strong><\/p>\n<p><a href=\"https:\/\/github.com\/secure-software-engineering\/DroidBench\">DroidBench<\/a> is hosted at GitHub.<\/p>\n<p><strong>Are there other\u00a0Java-based Benchmarks?<\/strong><\/p>\n<p><a href=\"http:\/\/suif.stanford.edu\/~livshits\/work\/securibench\/index.html\">SecuriBench<\/a> would be a Benchmark suite\u00a0which\u00a0focuses on Web-based applications written in Java.<\/p>\n<h2>We welcome your contributions!<\/h2>\n<p>You are most welcome to contribute additional test cases to DroidBench. To do so, please fork the <a href=\"https:\/\/github.com\/secure-software-engineering\/DroidBench\">project<\/a>, commit an appropriate Eclipse source project and APK, update the README and then send us a pull request.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DroidBench is a set of open source real-life Android applications to be used as a testing ground for static and dynamic security tools. It contains different applications with data leaks. The challenges for the security tools are the identification of &hellip; <a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/tools\/droidbench\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6581,"featured_media":0,"parent":22,"menu_order":2,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-34","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/users\/6581"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":2641,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/34\/revisions\/2641"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/22"}],"wp:attachment":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}