Android security assessment: A review, taxonomy and research gap study

被引:19
作者
Garg, Shivi [1 ,2 ]
Baliyan, Niyati [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Informat Technol Dept, Delhi, India
[2] JC Bose Univ Sci & Technol YMCA, Fac Informat & Comp, Faridabad, India
关键词
Android; Dynamic analysis; Hybrid analysis; Machine learning; Security; Static analysis; Systematic literature review; COMBINING STATIC ANALYSIS; SENSITIVE DATA; MALWARE; FLOW; VULNERABILITY; FRAMEWORK; FEATURES; VERIFICATION; PARADIGM; REUSE;
D O I
10.1016/j.cose.2020.102087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security threats are escalating exponentially posing a serious challenge to mobile platforms, specifically Android. In recent years the number of attacks has not only increased but each attack has become more damaging to the platform. Therefore, it is important to develop more stringent counter-measures to defend the mobile systems. Although in the last few years significant research progress is seen in the field of the detection and mitigation of Android security, yet numerous challenges and gaps still exist. This paper presents a comprehensive and sound taxonomy to review the state-of-the-art approaches used in Android security. We have highlighted the trends and patterns of different analysis approaches, identified the key aspects in terms of objectives, analysis techniques, code representations, tools and frameworks used, etc. and enumerated the research areas for future work. To carry out this study, the proper systematic literature review process is followed and the results of nearly 200 research publications have been comprehended based on different security aspects. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:30
相关论文
共 218 条
  • [1] Identifying Android malware using dynamically obtained features
    Afonso, Vitor Monte
    de Amorim, Matheus Favero
    Abed Gregio, Andre Ricardo
    Junquera, Glauco Barroso
    de Geus, Paulo Licio
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01): : 9 - 17
  • [2] Agarwal M, 2017, INT J MOD ED COMPUT, V9
  • [3] DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code
    Alhanahnah, Mohannad
    Yan, Qiben
    Bagheri, Hamid
    Zhou, Hao
    Tsutano, Yutaka
    Srisa-an, Witawas
    Luo, Xiapu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2782 - 2797
  • [4] AlNidawi HSA, 2017, J THEOR APPL INF TEC, V95
  • [5] Alzaylaee M.K., 2016, communication presentee a 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), P1
  • [6] Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
  • [7] [Anonymous], 2013, P 20 NETW DISTR SYST
  • [8] [Anonymous], 2014, P 21 ANN NETW DISTR
  • [9] [Anonymous], 2020, ANDROID TIMELINE VER
  • [10] [Anonymous], 2020, EVOLUTION MOBILE PHO