Recommending Security Requirements for the Development of Android Applications Based on Sensitive APIs

被引:1
作者
Liu, Yuzhou [1 ,2 ]
Liu, Lei [1 ,3 ]
Liu, Huaxiao [1 ,3 ]
Gao, Shanquan [1 ,3 ]
Song, Guohang [1 ,3 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Coll Elect Sci & Engn, Changchun 130012, Peoples R China
[3] Minist Educ, Key Lab Symbol Computat & Knowledge Engn, Changchun 130012, Peoples R China
关键词
Security; Feature extraction; Data mining; Androids; Humanoid robots; Software; Bridges; Requirements engineering; sensitive permissions; APIs analysis; information recommendation; APPS; KNOWLEDGE; FEATURES;
D O I
10.1109/ACCESS.2020.2997335
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
App stores allow anyone to sell his products to millions of potential users. However, limited by the resources and time, some developers often focus on the functionalities of their Apps without well-rounded considering security problems, which are more and more important for a successful product. In this paper, we propose an approach to help developers elicit security requirements by recommending related information gained from existing Apps in the marketplace. Firstly, we construct a feature framework to summarize functionalities of Apps by mining their descriptions with the method proposed in our previous work. Then, the sensitive APIs used in these Apps are extracted from their APK files and mapped with App features. Finally, we establish relationships between permissions and functionalities by taking sensitive APIs as a bridge, and design a recommendation framework to show information according to developers' demands from two aspects: the security requirements for the whole App and the ones for the given functionality. We evaluate our approach with 580 Apps from 5 categories on Google Play. The results confirm the usefulness of our approach, especially it can help new developers without experience initialize the security requirements and give mature developers supplementary information to elicit security requirements completely.
引用
收藏
页码:101591 / 101606
页数:16
相关论文
共 46 条
[1]  
[Anonymous], 2012, EXPERIMENTATION SOFT
[2]  
[Anonymous], 2014, International Conference on Information Systems
[3]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]  
Au K. W. Y., 2012, P 2012 ACM C COMP CO, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
[5]   Detecting Behavior Anomalies in Graphical User Interfaces [J].
Avdiienko, Vitalii ;
Kuznetsov, Konstantin ;
Rommelfanger, Isabelle ;
Rau, Andreas ;
Gorla, Alessandra ;
Zeller, Andreas .
PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, :201-203
[6]   Extracting features from online software reviews to aid requirements reuse [J].
Bakar, Noor Hasrina ;
Kasirun, Zarinah M. ;
Salleh, Norsaremah ;
Jalab, Hamid A. .
APPLIED SOFT COMPUTING, 2016, 49 :1297-1315
[7]   Latent Dirichlet allocation [J].
Blei, DM ;
Ng, AY ;
Jordan, MI .
JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (4-5) :993-1022
[8]   Are Mobile Banking Apps Secure? What Can Be Improved? [J].
Chen, Sen ;
Su, Ting ;
Fan, Lingling ;
Meng, Guozhu ;
Xue, Minhui ;
Liu, Yang ;
Xu, Lihua .
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, :797-802
[9]  
Davril J, 2013, P 2013 9 JOINT M FDN, P290, DOI [DOI 10.1145/2491411.2491455, 10.1145/]
[10]   Permission based Android security: Issues and countermeasures [J].
Fang, Zheran ;
Han, Weili ;
Li, Yingjiu .
COMPUTERS & SECURITY, 2014, 43 :205-218