Android Applications Scanning: The Guide

被引:5
作者
Almomani, Iman [1 ,2 ]
Khayer, Aala [1 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, Dept Comp Sci, Amman, Jordan
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
Android; application; Security; apk; malware; scanning; detection; survey; guide; MALWARE DETECTION;
D O I
10.1109/iccisci.2019.8716380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming of Android technology makes Android users and their devices with all running applications targeted by many security attackers. These attackers intent to inject malicious software in these applications to obtain the user's data for several purposes. Nowadays, Android users are keen to install clean apps in their devices. At the same time, security solutions have been proposed to detect malware apps. This paper presents a general framework for Android applications scanning process. The aim is to guide researchers and developers to the main phases/steps required to analyze Android applications, check their trustworthiness and protect Android users from being victims to serious malware attacks. Moreover, this research highlights the metrics, tools, mechanisms and datasets that are mostly used throughout the scanning process.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 24 条
[1]  
Abubaker H., 2018, International Journal of Advances in Soft Computing Its Applications, V10, P106
[2]  
Alenezi M, 2017, IEEE JORDAN CONF APP
[3]  
Alenezi Mamdouh, 2018, 5 S DAT MIN APPL SDM
[4]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[5]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[6]  
[Anonymous], 2017, Internet Security Threat Report, V22
[7]   A Comparison of Android Reverse Engineering Tools via Program Behaviors Validation Based on Intermediate Languages Transformation [J].
Arnatovi, Yauhen Leanidavich ;
Wang, Lipo ;
Ngoc Minh Ngo ;
Soh, Charlie .
IEEE ACCESS, 2018, 6 :12382-12394
[8]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[9]  
Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
[10]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]