Android Applications Scanning: The Guide

被引:7
|
作者
Almomani, Iman [1 ,2 ]
Khayer, Aala [1 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, Dept Comp Sci, Amman, Jordan
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
Android; application; Security; apk; malware; scanning; detection; survey; guide; MALWARE DETECTION;
D O I
10.1109/iccisci.2019.8716380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming of Android technology makes Android users and their devices with all running applications targeted by many security attackers. These attackers intent to inject malicious software in these applications to obtain the user's data for several purposes. Nowadays, Android users are keen to install clean apps in their devices. At the same time, security solutions have been proposed to detect malware apps. This paper presents a general framework for Android applications scanning process. The aim is to guide researchers and developers to the main phases/steps required to analyze Android applications, check their trustworthiness and protect Android users from being victims to serious malware attacks. Moreover, this research highlights the metrics, tools, mechanisms and datasets that are mostly used throughout the scanning process.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [31] Droidrevealer: Automatically detecting Mysterious Codes in Android Applications
    Zhang, Xinyin
    Cao, Yuanye
    Yang, Mutian
    Wu, Jingzheng
    Luo, Tianyue
    Liu, Yueqin
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 535 - 536
  • [32] Dynaldroid : A System for Automated Dynamic Analysis of Android Applications
    Reddy, K. P.
    Rajesh, Babu, V
    Pareek, Himanshu
    Patil, Mahesh U.
    2015 NATIONAL CONFERENCE ON RECENT ADVANCES IN ELECTRONICS & COMPUTER ENGINEERING (RAECE), 2015, : 124 - 129
  • [33] OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications
    Al Rahat, Tamjid
    Feng, Yu
    Tian, Yuan
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 293 - 304
  • [34] ApkClassiFy: Identification and Classification of packed Android Malicious Applications
    Guo, Xu
    Zheng, Tao
    Chen, Xingshu
    Wang, Qixu
    Shao, Jiang
    Hu, Zhijie
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2092 - 2097
  • [35] Characterizing File Accesses in Android Applications and Caching Implications
    Lim, Soojung
    Bahn, Hyokyung
    IEEE ACCESS, 2021, 9 : 150292 - 150303
  • [36] Instrumenting Android and Java']Java Applications as Easy as abc
    Arzt, Steven
    Rasthofer, Siegfried
    Bodden, Eric
    RUNTIME VERIFICATION, RV 2013, 2013, 8174 : 364 - 381
  • [37] Defending Android Applications Availability
    Schmeelk, Suzanna
    Aho, Alfred
    2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,
  • [38] A New Protection for Android Applications
    Er-Rajy, Latifa
    El Kiram, My Ahmed
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2016, 3 (07): : 15 - 19
  • [39] Taming Exceptions in Android Applications
    Oliveira, Juliana
    2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2018, : 174 - 177
  • [40] Real Time Android Ransomware Detection by Analyzed Android Applications
    Ko, Ju-Seong
    Jo, Jeong-Seok
    Kim, Deuk-Hun
    Choi, Seul-Ki
    Kwak, Jin
    2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 375 - 379