A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software

被引:91
作者
Sadeghi, Alireza [1 ]
Bagheri, Hamid [2 ]
Garcia, Joshua [1 ]
Malek, Sam [1 ]
机构
[1] Univ Calif Irvine, Sch Informat & Comp Sci, Irvine, CA 92612 USA
[2] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
基金
美国国家科学基金会;
关键词
Taxonomy and survey; security assessment; android platform; program analysis; MALWARE DETECTION; MOBILE; RISK; APP;
D O I
10.1109/TSE.2016.2615307
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In parallel with the meteoric rise of mobile software, we are witnessing an alarming escalation in the number and sophistication of the security threats targeted at mobile platforms, particularly Android, as the dominant platform. While existing research has made significant progress towards detection and mitigation of Android security, gaps and challenges remain. This paper contributes a comprehensive taxonomy to classify and characterize the state-of-the-art research in this area. We have carefully followed the systematic literature review process, and analyzed the results of more than 300 research papers, resulting in the most comprehensive and elaborate investigation of the literature in this area of research. The systematic analysis of the research literature has revealed patterns, trends, and gaps in the existing literature, and underlined key challenges and opportunities that will shape the focus of future research efforts.
引用
收藏
页码:492 / 530
页数:39
相关论文
共 501 条
[1]  
Aafer Y., 2015, 22 ACM SIGSAC C COMP
[2]  
Aafer Y., 2013, 9 INT ICST C SEC PRI
[3]  
Abraham A., 2015, 10 INT C MAL UNW SOF
[4]  
Achara J. P., 2014, 7 ACM C SEC PRIV WIR
[5]   Detecting privacy leaks in the RATP App: how we proceeded and what we found [J].
Achara, Jagdish Prasad ;
Lefruit, James-Douglass ;
Roca, Vincent ;
Castelluccia, Claude .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (04) :229-238
[6]  
Adebayo OS, 2014, 2014 4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), P123, DOI 10.1109/WICT.2014.7077314
[7]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[8]  
Ali-Gombe A., 2015, 5 PROGR PROT REV ENG
[9]  
Allix K., 2014, IEEE 38 ANN COMP SOF
[10]  
Almohri H. M. J., 2014, 4 ACM C DAT APPL C D