Incorporating Android Code Smells into Java']Java Static Code Metrics for Security Risk Prediction of Android Applications

被引:5
|
作者
Gong, Ai [1 ]
Zhong, Yi [1 ,4 ]
Zou, Weiqin [2 ,3 ]
Shi, Yangyang [1 ]
Fang, Chunrong [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[3] Minist Ind & Informat Technol, Key Lab Safety Crit Software NUAA, Nanjing, Peoples R China
[4] Chongqing Univ Posts & Telecom, Coll Mobile Telecommun, Chongqing, Peoples R China
来源
2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020) | 2020年
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Android code smells; !text type='Java']Java[!/text] code metrics; Android security;
D O I
10.1109/QRS51102.2020.00017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the wide-spread use of Android applications in people's daily life, it becomes more and more important to timely identify the security problems of these applications. To enrich existing studies in guarding the security and privacy of Android applications, we attempted to predict the security risk levels of Android applications. Specifically, we proposed an approach that incorporated Android code smells into traditional Java code metrics to predict how secure an Android application is. With an evaluation of our technique on 3,680 Android applications, we found that: (1) Android code smells could help improve the performance of security risk prediction of Android applications; (2) By building a Random Forest model based on Android code smells and Java code metrics, we could achieve an Area Under Curve (AUC) of 0.97; (3) Android code smells such as member ignoring method (MIM) and leaking inner class (LIC) have a relatively-large influence on Android security risk prediction, to which developers should pay more attention during their application development.
引用
收藏
页码:30 / 40
页数:11
相关论文
empty
未找到相关数据