Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

被引:4
作者
Autili, Marco [1 ]
Malavolta, Ivano [2 ]
Perucci, Alexander [1 ]
Scoccia, Gian Luca [1 ]
Verdecchia, Roberto [2 ]
机构
[1] Univ Aquila, Laquila, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
Software engineering; Static analysis; Mobile apps; Systematic mapping study; ANDROID MALWARE DETECTION; FRAMEWORK; LEAKS;
D O I
10.1186/s13174-021-00134-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile platforms are rapidly and continuously changing, with support for new sensors, APIs, and programming abstractions. Static analysis is gaining a growing interest, allowing developers to predict properties about the run-time behavior of mobile apps without executing them. Over the years, literally hundreds of static analysis techniques have been proposed, ranging from structural and control-flow analysis to state-based analysis.In this paper, we present a systematic mapping study aimed at identifying, evaluating and classifying characteristics, trends and potential for industrial adoption of existing research in static analysis of mobile apps. Starting from over 12,000 potentially relevant studies, we applied a rigorous selection procedure resulting in 261 primary studies along a time span of 9 years. We analyzed each primary study according to a rigorously-defined classification framework. The results of this study give a solid foundation for assessing existing and future approaches for static analysis of mobile apps, especially in terms of their industrial adoptability.Researchers and practitioners can use the results of this study to (i) identify existing research/technical gaps to target, (ii) understand how approaches developed in academia can be successfully transferred to industry, and (iii) better position their (past and future) approaches for static analysis of mobile apps.
引用
收藏
页数:60
相关论文
共 308 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]   Mining system tests to aid software maintenance [J].
Agrawal, H ;
Albert, JL ;
Horgan, JR ;
Li, JJ ;
London, S ;
Wong, WE ;
Ghosh, S ;
Wilde, N .
COMPUTER, 1998, 31 (07) :64-+
[3]  
Ahmad Maqsood., 2017, Proceedings of the symposium on applied computing, P1747
[4]   OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications [J].
Al Rahat, Tamjid ;
Feng, Yu ;
Tian, Yuan .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :293-304
[5]   DroidNative: Automating and optimizing detection of Android native code malware variants [J].
Alam, Shahid ;
Qu, Zhengyang ;
Riley, Ryan ;
Chen, Yan ;
Rastogi, Vaibhav .
COMPUTERS & SECURITY, 2017, 65 :230-246
[6]   Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness [J].
Allen, Joey ;
Landen, Matthew ;
Chaba, Sanya ;
Ji, Yang ;
Chung, Simon Pak Ho ;
Lee, Wenke .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :210-221
[7]   Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios [J].
Allix, Kevin ;
Bissyande, Tegawende F. ;
Jerome, Quentin ;
Klein, Jacques ;
State, Radu ;
Le Traon, Yves .
EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) :183-211
[8]  
Annie A., APP ANNIES GLOBAL AP
[9]  
[Anonymous], 2014, NDSS
[10]  
[Anonymous], 2018, P 15 INT C MIN SOFTW