Android Applications Scanning: The Guide

被引:7
|
作者
Almomani, Iman [1 ,2 ]
Khayer, Aala [1 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, Dept Comp Sci, Amman, Jordan
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
Android; application; Security; apk; malware; scanning; detection; survey; guide; MALWARE DETECTION;
D O I
10.1109/iccisci.2019.8716380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming of Android technology makes Android users and their devices with all running applications targeted by many security attackers. These attackers intent to inject malicious software in these applications to obtain the user's data for several purposes. Nowadays, Android users are keen to install clean apps in their devices. At the same time, security solutions have been proposed to detect malware apps. This paper presents a general framework for Android applications scanning process. The aim is to guide researchers and developers to the main phases/steps required to analyze Android applications, check their trustworthiness and protect Android users from being victims to serious malware attacks. Moreover, this research highlights the metrics, tools, mechanisms and datasets that are mostly used throughout the scanning process.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [1] Estimate Risks Eate for Android Applications Using Android Permissions
    Er-Rajy, Latifa
    El Kiram, My Ahmed
    El Ghazouani, Mohamed
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (04)
  • [2] SteaelErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications
    Casolare, Rosangela
    Ciaramella, Giovanni
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [3] ALDROID: efficient update of Android anti-virus software using designated active learning methods
    Nissim, Nir
    Moskovitch, Robert
    Barad, Oren
    Rokach, Lior
    Elovici, Yuval
    KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 49 (03) : 795 - 833
  • [4] Certificate Reuse in Android Applications
    Nezhadian, Fatemeh
    Branca, Enrico
    Stakhanova, Natalia
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 226 - 245
  • [5] Migrating Android Applications to the Cloud
    Hung, Shih-Hao
    Shieh, Jeng-Peng
    Lee, Chen-Pang
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2011, 3 (02) : 14 - 28
  • [6] Android Applications and Security Breach
    Noemi Benitez-Mejia, Diana Gabriela
    Sanchez-Perez, Gabriel
    Karina Toscano-Medina, Linda
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 164 - 169
  • [7] SEMEO: A Semantic Equivalence Analysis Framework for Obfuscated Android Applications
    Hu, Zhen
    Silva, Bruno Vieira Resende E.
    Bagheri, Hamid
    Srisa-an, Witawas
    Rothermel, Gregg
    Dinh, Jackson
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, 2022, 419 : 322 - 346
  • [8] Ransomware Detection System for Android Applications
    Alsoghyer, Samah
    Almomani, Iman
    ELECTRONICS, 2019, 8 (08)
  • [9] Analysis and Classification of Danger Level in Android Applications using Naive Bayes Algorithm
    Utama, Ridho Alif
    Sukarno, Parman
    Jadied, Erwid Musthofa
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 281 - 285
  • [10] Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences
    Casolare, Rosangela
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    INFORMATION, 2020, 11 (06)