SACH: A Tool for Assisting Secure Android Application Development

被引:0
|
作者
Abernathy, Aakiel [1 ]
Yuan, Xiaohong [1 ]
Hill, Edward [1 ]
Xu, Jinsheng [1 ]
Bryant, Kelvin [1 ]
Williams, Kenneth [1 ]
机构
[1] North Carolina Agr & Tech State Univ, Dept Comp Sci, Greensboro, NC 27401 USA
来源
SOUTHEASTCON 2017 | 2017年
基金
美国国家科学基金会;
关键词
Android application development; secure coding; CERT [!text type='Java']Java[!/text] secure coding rules; INFORMATION LEAKAGE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To mitigate the risk of attacks to mobile applications, it is important for mobile application developers to develop secure mobile applications. There have been tools that statically analyze the mobile applications to determine whether there are data leakage or access control vulnerabilities The Software Engineering Institute at Carnegie Melon University published CERT Java secure coding rules applicable to developing android applications. This paper describes SACH (Secure Android Coding Helper) - a tool we implemented to help developers identify security vulnerabilities in Android application. The tool analyzes Android application source code to detect violations of CERT Java secure coding rules. This tool will help Android developers to write Android code that comply with CERT Java secure coding rules. It can also be used in the classroom to teach students about Android secure coding.
引用
收藏
页数:4
相关论文
共 7 条
  • [1] Application and Research of Blended Teaching Model in Programming Courses - Android Application Development Course as an Example
    Ye, Yong-fei
    Liu, Ming-he
    Zhang, Xiao
    Sun, Xing-hua
    Liu, Nai-di
    PROCEEDINGS OF THE 3D INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE RESEARCH, 2016, 105 : 348 - 351
  • [2] Design and Development of Android Mobile Application for Students of Engineering Education in Saudi Arabia
    Ali, Zulfiqar
    Ismail, Raslan
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2013), 2013, : 228 - 233
  • [3] Adaption of Integrated Secure Guide for Secure Software Development Lifecycle
    Lee, Ki-Hyun
    Park, Young B.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 145 - 154
  • [4] Towards the application of recommender systems to secure coding
    Fitzroy D. Nembhard
    Marco M. Carvalho
    Thomas C. Eskridge
    EURASIP Journal on Information Security, 2019
  • [5] Towards the application of recommender systems to secure coding
    Nembhard, Fitzroy D.
    Carvalho, Marco M.
    Eskridge, Thomas C.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2019, 2019 (1)
  • [6] Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks
    Tamaddon, Sohail
    Ahmad, Atif
    Bosua, Rachelle
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (02) : 1 - 20
  • [7] A Design and Development of Secure-Coding Check System Based on CVE and CWE
    Kim, Hyungjoo
    Jun, Moon-seog
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURE INFORMATION TECHNOLOGY, VOL 2, 2016, 354 : 457 - 463