Dynamic Security Analysis on Android: A Systematic Literature Review

被引:6
作者
Sutter, Thomas [1 ,2 ]
Kehrer, Timo [1 ]
Rennhard, Marc [2 ,3 ]
Tellenbach, Bernhard [4 ]
Klein, Jacques
机构
[1] Univ Bern, Inst Comp Sci, CH-3012 Bern, Switzerland
[2] Zurich Univ Appl Sci, Inst Comp Sci, CH-8401 Winterthur, Switzerland
[3] Armasuisse Sci & Technol, Cyber Def Campus, CH-8005 Zurich, Switzerland
[4] Armasuisse Sci & Technol, Cyber Def Campus, CH-1855 Thun, Switzerland
关键词
Android; dynamic analysis; security; software testing; vulnerabilities; instrumentation; fuzzing; monitoring; tracing; machine learning; MALWARE DETECTION; APPS;
D O I
10.1109/ACCESS.2024.3390612
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic analysis is a technique that is used to fully understand the internals of a system at runtime. On Android, dynamic security analysis involves real-time assessment and active adaptation of an app's behaviour, and is used for various tasks, including network monitoring, system-call tracing, and taint analysis. The research on dynamic analysis has made significant progress in the past years. However, to the best of our knowledge, there is a lack in secondary studies that analyse the novel ideas and common limitations of current security research. The main aim of this work is to understand dynamic security analysis research on Android to present the current state of knowledge, highlight research gaps, and provide insights into the existing body of work in a structured and systematic manner. We conduct a systematic literature review (SLR) on dynamic security analysis for Android. The systematic review establishes a taxonomy, defines a classification scheme, and explores the impact of advanced Android app testing tools on security solutions in software engineering and security research. The study's key findings centre on tool usage, research objectives, constraints, and trends. Instrumentation and network monitoring tools play a crucial role, with research goals focused on app security, privacy, malware detection, and software testing automation. Identified limitations include code coverage constraints, security-related analysis obstacles, app selection adequacy, and non-deterministic behaviour. Our study results deepen the understanding of dynamic analysis in Android security research by an in-depth review of 43 publications. The study highlights recurring limitations with automated testing tools and concerns about detecting or obstructing dynamic analysis.
引用
收藏
页码:57261 / 57287
页数:27
相关论文
共 121 条
  • [1] RETRACTED: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis (Retracted Article)
    Acharya, Saket
    Rawat, Umashankar
    Bhatnagar, Roheet
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications
    Ahmad, Maqsood
    Costamagna, Valerio
    Crispo, Bruno
    Bergadano, Francesco
    Zhauniarovich, Yury
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 159
  • [3] ViaLin: Path-Aware Dynamic Taint Analysis for Android
    Ahmed, Khaled
    Wang, Yingying
    Lis, Mieszko
    Rubin, Julia
    [J]. PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1598 - 1610
  • [4] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
  • [5] CHIMP: Crowdsourcing Human Inputs for Mobile Phones
    Almeida, Mario
    Bilal, Muhammad
    Finamore, Alessandro
    Leontiadis, Ilias
    Grunenberger, Yan
    Varvello, Matteo
    Blackburn, Jeremy
    [J]. WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 45 - 54
  • [6] DL-Droid: Deep learning based android malware detection using real devices
    Alzaylaee, Mohammed K.
    Yerima, Suleiman Y.
    Sezer, Sakir
    [J]. COMPUTERS & SECURITY, 2020, 89
  • [7] UiRef: Analysis of Sensitive User Inputs in Android Applications
    Andow, Benjamin
    Acharya, Akhil
    Li, Dengfeng
    Enck, William
    Singh, Kapil
    Xie, Tao
    [J]. PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 23 - 34
  • [8] [Anonymous], Security With Dynamically Loaded Code
  • [9] [Anonymous], 2023, 360 App Store
  • [10] [Anonymous], 2023, Fiddler Network Proxy