ABSTRACT
Energy leaks occur when applications use energy to perform useless tasks, a surprisingly common occurrence. They are particularly important for mobile applications running on smartphones due to their energy constraints. Energy leaks are difficult to detect and isolate because their negative consequences are often far removed from their causes. Few tools are available for addressing this problem. We have therefore developed ADEL (Automatic Detector of Energy Leaks). ADEL consists of taint-tracking enhancements to the Android platform. It detects and isolates energy leaks resulting from unnecessary network communication by tracing the direct and indirect use of received data to determine whether they ever affect the user. We profiled 15 applications using ADEL. In six of them, energy leaks detected by ADEL and verified by us account for approximately 57% of the energy consumed in communication. We identified four common causes of energy leaks in these applications: misinterpretation of callback API semantics, poorly designed downloading schemes, repetitive downloads, and aggressive prefetching.
- "iPhone battery life flaw confirmed by Apple," http://www.huffingtonpost.com/.Google Scholar
- "Android battery life: terrible, or just plain bad?" http://reviews.cnet.com/8301--19736_7--20058834--251.html.Google Scholar
- A. Pathak, Y. C. Hu, and M. Zhang, "Bootstrapping energy debugging on smartphones: a first look at energy bugs in mobile devices," in Proc. Wkshp. Hot Topics in Networks, Nov. 2011. Google ScholarDigital Library
- F. Qian, et al., "Profiling resource usage for mobile applications: a cross-layer approach," in phProc.\ Int.\ Conf.\ on Mobile Systems, Applications, and Services, June 2011. Google ScholarDigital Library
- A. Pathak, et al., "What is keeping my phone awake? characterizing and detecting no-sleep energy bugs in smartphone apps," in phProc.\ Int.\ Conf.\ Mobile Systems, Applications And Services, June 2012, pp. 267--280. Google ScholarDigital Library
- R. Krashinsky and H. Balakrishnan, "Minimizing energy for wireless web access with bounded slowdown," in phProc.\ Int.\ Conf.\ Mobile Computing and Networking, Sept. 2002, pp. 135--148. Google ScholarDigital Library
- M. Anand, E. Nightingale, and J. Flinn, "Self-tuning wireless network power management," in phProc.\ Int.\ Conf.\ Mobile Computing and Networking, Sept. 2003, pp. 176--189. Google ScholarDigital Library
- D. Qiao and K. Shin, "Smart power-saving mode for IEEE 802.11 wirelss LANs," in phProc.\ Int.\ Conf.\ Computer Communications, Mar. 2005, pp. 1573--1583.Google Scholar
- T. Armstrong, et al., "Efficient and transparent dynamic content updates for mobile clients," in phProc.\ Int.\ Conf.\ Mobile Systems, Applications And Services, June 2006, pp. 56--68. Google ScholarDigital Library
- B. Housel and D. Lindquist, "WebExpress: a system for optimizing web browsing in a wireless environment," in phProc.\ Int.\ Conf.\ Mobile Computing and Networking, June 1996, pp. 108--116. Google ScholarDigital Library
- M. C. Rosu, et al., "PAWP: A power aware web proxy for wireless lan clients," in phWorkshop on Mobile Computing Systems and Applications, Dec. 2004, pp. 206--215. Google ScholarDigital Library
- W. Enck, et al., "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in phProc.\ Int.\ Symp.\ Operating Systems Design and Implementation, Oct. 2010. Google ScholarDigital Library
- V. Haldar, D. Chandra, and M. Franz, "Dynamic taint propagation for Java," in phProc.\ Annual Computer Security Applications Conference, 2005, pp. 303--311. Google ScholarDigital Library
- W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enformacement: a practical apporach to defeat a wide range of attacks," in phProc.\ USENIX Conf., 2006, pp. 121--136. Google ScholarDigital Library
- D. Chandra and M. Franz, "Fine-grained information flow analysis and enforcement in a Java Virtual Machine," in phProc.\ Annual Computer Security Applications Conference, Dec. 2007, pp. 463--475.Google Scholar
- PowerTutor, "PowerTutor," 2009, http://powertutor.org.Google Scholar
- H. Yin, et al., "Panorama: capturing system-wide information flow for malware detection and analysis," in phProc.\ Conf.\ on Computer and Communications Security, Oct. 2007, pp. 116--127. Google ScholarDigital Library
- B. Davis and H. Chen, "DBTaint: cross-application information flow tracking via databases," in phProc.\ USENIX Conf., June 2010, pp. 12--12. Google ScholarDigital Library
- A. C. Myers, "JFlow: practical mostly-static information flow control," in phProc.\ of the ACM Symp.\ on principles of Programming Languages, Jan. 1999, pp. 228--241. Google ScholarDigital Library
- H. Falaki, et al., "Diversity in smartphone usage," in phProc.\ Int.\ Conf.\ Mobile Systems, Applications And Services, June 2010, pp. 179--194. Google ScholarDigital Library
- "Android SDK reference," http://developer.android.com/reference/packages.html.Google Scholar
Index Terms
- ADEL: an automatic detector of energy leaks for smartphone applications
Recommendations
Detecting and diagnosing energy issues for mobile applications
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisEnergy efficiency is an important criterion to judge the quality of mobile apps, but one third of our randomly sampled apps suffer from energy issues that can quickly drain battery power. To understand these issues, we conducted an empirical study on 27 ...
Combatting Energy Issues for Mobile Applications
Energy efficiency is an important criterion to judge the quality of mobile apps, but one third of our arbitrarily sampled apps suffer from energy issues that can quickly drain battery power. To understand these issues, we conduct an empirical study on 36 ...
AppInk: watermarking android apps for repackaging deterrence
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityWith increased popularity and wide adoption of smartphones and mobile devices, recent years have seen a new burgeoning economy model centered around mobile apps. However, app repackaging, among many other threats, brings tremendous risk to the ecosystem,...
Comments