Android Applications Scanning: The Guide

被引:7
|
作者
Almomani, Iman [1 ,2 ]
Khayer, Aala [1 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, Dept Comp Sci, Amman, Jordan
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
Android; application; Security; apk; malware; scanning; detection; survey; guide; MALWARE DETECTION;
D O I
10.1109/iccisci.2019.8716380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming of Android technology makes Android users and their devices with all running applications targeted by many security attackers. These attackers intent to inject malicious software in these applications to obtain the user's data for several purposes. Nowadays, Android users are keen to install clean apps in their devices. At the same time, security solutions have been proposed to detect malware apps. This paper presents a general framework for Android applications scanning process. The aim is to guide researchers and developers to the main phases/steps required to analyze Android applications, check their trustworthiness and protect Android users from being victims to serious malware attacks. Moreover, this research highlights the metrics, tools, mechanisms and datasets that are mostly used throughout the scanning process.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [21] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [22] Privacy Vulnerability Analysis for Android Applications A Practical Approach
    Argudo, Alejandro
    Lopez, Gabriel
    Sanchez, Franklin
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 256 - 260
  • [23] Multilevel Permission Extraction in Android Applications for Malware Detection
    Wang, Zhen
    Li, Kai
    Hu, Yan
    Fukuda, Akira
    Kong, Weiqiang
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 221 - 225
  • [24] Explainable Machine Learning for Malware Detection on Android Applications
    Palma, Catarina
    Ferreira, Artur
    Figueiredo, Mario
    INFORMATION, 2024, 15 (01)
  • [25] Assessment of Source Data Vulnerability to Reproduction in Android Applications
    Shafi, Muhammad
    Israr, Muhammad
    Khan, Muhammad Sohail
    Khattak, Muhammad Irfan
    Syed, Togeer Ali
    2017 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2017, : 122 - 126
  • [26] A review of cloned mobile malware applications for android devices
    Baykara, Muhammet
    Colak, Eren
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 394 - 398
  • [27] "Less Give More": Evaluate and zoning Android applications
    Ab Razak, Mohd Faizal
    Anuar, Nor Badrul
    Salleh, Rosli
    Firdaus, Ahmad
    Faiz, Muhammad
    Alamri, Hammoudeh S.
    MEASUREMENT, 2019, 133 : 396 - 411
  • [28] Behavioral classification of Android applications using system calls
    Razgallah, Asma
    Khoury, Raphael
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021), 2021, : 43 - 52
  • [29] Privacy Risk Assessment for SQLite Based Android Applications
    Yeh, Kuo-Hui
    Hou, Jia-Li
    Chen, Lin-Chih
    Liao, Hao-Xiang
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (07): : 1533 - 1541
  • [30] A Novel Approach to Restrict the Access of Malicious Applications in Android
    Dar, Muneer Ahmad
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,