skip to main content
10.1145/2380445.2380503acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

ADEL: an automatic detector of energy leaks for smartphone applications

Published:07 October 2012Publication History

ABSTRACT

Energy leaks occur when applications use energy to perform useless tasks, a surprisingly common occurrence. They are particularly important for mobile applications running on smartphones due to their energy constraints. Energy leaks are difficult to detect and isolate because their negative consequences are often far removed from their causes. Few tools are available for addressing this problem. We have therefore developed ADEL (Automatic Detector of Energy Leaks). ADEL consists of taint-tracking enhancements to the Android platform. It detects and isolates energy leaks resulting from unnecessary network communication by tracing the direct and indirect use of received data to determine whether they ever affect the user. We profiled 15 applications using ADEL. In six of them, energy leaks detected by ADEL and verified by us account for approximately 57% of the energy consumed in communication. We identified four common causes of energy leaks in these applications: misinterpretation of callback API semantics, poorly designed downloading schemes, repetitive downloads, and aggressive prefetching.

References

  1. "iPhone battery life flaw confirmed by Apple," http://www.huffingtonpost.com/.Google ScholarGoogle Scholar
  2. "Android battery life: terrible, or just plain bad?" http://reviews.cnet.com/8301--19736_7--20058834--251.html.Google ScholarGoogle Scholar
  3. A. Pathak, Y. C. Hu, and M. Zhang, "Bootstrapping energy debugging on smartphones: a first look at energy bugs in mobile devices," in Proc. Wkshp. Hot Topics in Networks, Nov. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Qian, et al., "Profiling resource usage for mobile applications: a cross-layer approach," in phProc.\ Int.\ Conf.\ on Mobile Systems, Applications, and Services, June 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Pathak, et al., "What is keeping my phone awake? characterizing and detecting no-sleep energy bugs in smartphone apps," in phProc.\ Int.\ Conf.\ Mobile Systems, Applications And Services, June 2012, pp. 267--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Krashinsky and H. Balakrishnan, "Minimizing energy for wireless web access with bounded slowdown," in phProc.\ Int.\ Conf.\ Mobile Computing and Networking, Sept. 2002, pp. 135--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Anand, E. Nightingale, and J. Flinn, "Self-tuning wireless network power management," in phProc.\ Int.\ Conf.\ Mobile Computing and Networking, Sept. 2003, pp. 176--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Qiao and K. Shin, "Smart power-saving mode for IEEE 802.11 wirelss LANs," in phProc.\ Int.\ Conf.\ Computer Communications, Mar. 2005, pp. 1573--1583.Google ScholarGoogle Scholar
  9. T. Armstrong, et al., "Efficient and transparent dynamic content updates for mobile clients," in phProc.\ Int.\ Conf.\ Mobile Systems, Applications And Services, June 2006, pp. 56--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Housel and D. Lindquist, "WebExpress: a system for optimizing web browsing in a wireless environment," in phProc.\ Int.\ Conf.\ Mobile Computing and Networking, June 1996, pp. 108--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. C. Rosu, et al., "PAWP: A power aware web proxy for wireless lan clients," in phWorkshop on Mobile Computing Systems and Applications, Dec. 2004, pp. 206--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Enck, et al., "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in phProc.\ Int.\ Symp.\ Operating Systems Design and Implementation, Oct. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. V. Haldar, D. Chandra, and M. Franz, "Dynamic taint propagation for Java," in phProc.\ Annual Computer Security Applications Conference, 2005, pp. 303--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enformacement: a practical apporach to defeat a wide range of attacks," in phProc.\ USENIX Conf., 2006, pp. 121--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Chandra and M. Franz, "Fine-grained information flow analysis and enforcement in a Java Virtual Machine," in phProc.\ Annual Computer Security Applications Conference, Dec. 2007, pp. 463--475.Google ScholarGoogle Scholar
  16. PowerTutor, "PowerTutor," 2009, http://powertutor.org.Google ScholarGoogle Scholar
  17. H. Yin, et al., "Panorama: capturing system-wide information flow for malware detection and analysis," in phProc.\ Conf.\ on Computer and Communications Security, Oct. 2007, pp. 116--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Davis and H. Chen, "DBTaint: cross-application information flow tracking via databases," in phProc.\ USENIX Conf., June 2010, pp. 12--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. C. Myers, "JFlow: practical mostly-static information flow control," in phProc.\ of the ACM Symp.\ on principles of Programming Languages, Jan. 1999, pp. 228--241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Falaki, et al., "Diversity in smartphone usage," in phProc.\ Int.\ Conf.\ Mobile Systems, Applications And Services, June 2010, pp. 179--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. "Android SDK reference," http://developer.android.com/reference/packages.html.Google ScholarGoogle Scholar

Index Terms

  1. ADEL: an automatic detector of energy leaks for smartphone applications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CODES+ISSS '12: Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
        October 2012
        596 pages
        ISBN:9781450314268
        DOI:10.1145/2380445

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CODES+ISSS '12 Paper Acceptance Rate48of163submissions,29%Overall Acceptance Rate280of864submissions,32%

        Upcoming Conference

        ESWEEK '24
        Twentieth Embedded Systems Week
        September 29 - October 4, 2024
        Raleigh , NC , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader