Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

被引:4
作者
Autili, Marco [1 ]
Malavolta, Ivano [2 ]
Perucci, Alexander [1 ]
Scoccia, Gian Luca [1 ]
Verdecchia, Roberto [2 ]
机构
[1] Univ Aquila, Laquila, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
Software engineering; Static analysis; Mobile apps; Systematic mapping study; ANDROID MALWARE DETECTION; FRAMEWORK; LEAKS;
D O I
10.1186/s13174-021-00134-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile platforms are rapidly and continuously changing, with support for new sensors, APIs, and programming abstractions. Static analysis is gaining a growing interest, allowing developers to predict properties about the run-time behavior of mobile apps without executing them. Over the years, literally hundreds of static analysis techniques have been proposed, ranging from structural and control-flow analysis to state-based analysis.In this paper, we present a systematic mapping study aimed at identifying, evaluating and classifying characteristics, trends and potential for industrial adoption of existing research in static analysis of mobile apps. Starting from over 12,000 potentially relevant studies, we applied a rigorous selection procedure resulting in 261 primary studies along a time span of 9 years. We analyzed each primary study according to a rigorously-defined classification framework. The results of this study give a solid foundation for assessing existing and future approaches for static analysis of mobile apps, especially in terms of their industrial adoptability.Researchers and practitioners can use the results of this study to (i) identify existing research/technical gaps to target, (ii) understand how approaches developed in academia can be successfully transferred to industry, and (iii) better position their (past and future) approaches for static analysis of mobile apps.
引用
收藏
页数:60
相关论文
共 308 条
[21]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[22]   StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework [J].
Arzt, Steven ;
Bodden, Eric .
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, :725-735
[23]   A hybrid approach for resource-based comparison of adaptable Java']Java applications [J].
Autili, Marco ;
Di Benedetto, Paolo ;
Inverardi, Paola .
SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (08) :987-1009
[24]   Mining Apps for Abnormal Usage of Sensitive Data [J].
Avdiienko, Vitalii ;
Kuznetsov, Konstantin ;
Gorla, Alessandra ;
Zeller, Andreas ;
Arzt, Steven ;
Rasthofer, Siegfried ;
Bodden, Eric .
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, :426-436
[25]  
Azim T, 2013, ACM SIGPLAN NOTICES, V48, P641, DOI [10.1145/2509136.2509549, 10.1145/2544173.2509549]
[26]   Reliable Third-Party Library Detection in Android and its Security Applications [J].
Backes, Michael ;
Bugiel, Sven ;
Derr, Erik .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :356-367
[27]   Towards Understanding and Reasoning about Android Interoperations [J].
Bae, Sora ;
Lee, Sungho ;
Ryu, Sukyoung .
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, :223-233
[28]  
Bagheri Hamid, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P514, DOI 10.1109/DSN.2016.53
[29]   Efficient, Evolutionary Security Analysis of Interacting Android Apps [J].
Bagheri, Hamid ;
Wang, Jianghao ;
Aerts, Jarod ;
Malek, Sam .
PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, :357-368
[30]   COVERT: Compositional Analysis of Android Inter-App Permission Leakage [J].
Bagheri, Hamid ;
Sadeghi, Alireza ;
Garcia, Joshua ;
Malek, Sam .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2015, 41 (09) :866-886