Analyses for specific defects in android applications: a survey

被引:0
|
作者
Tianyong Wu
Xi Deng
Jun Yan
Jian Zhang
机构
[1] Chinese Academy of Sciences,State Key Laboratory of Computer Science, Institute of Software
[2] University of Chinese Academy of Sciences,Technology Center of Software Engineering, Institute of Software
[3] Chinese Academy of Sciences,undefined
来源
Frontiers of Computer Science | 2019年 / 13卷
关键词
Android apps; program analysis; security; functionality; performance;
D O I
暂无
中图分类号
学科分类号
摘要
Android applications (APPS) are in widespread use and have enriched our life. To ensure the quality and security of the apps, many approaches have been proposed in recent years for detecting bugs and defects in the apps, of which program analysis is a major one. This paper mainly makes an investigation of existing works on the analysis of Android apps. We summarize the purposes and proposed techniques of existing approaches, and make a taxonomy of these works, based on which we point out the trends and challenges of research in this field. From our survey, we sum up four main findings: (1) program analysis in Android security field has gained particular attention in the past years, the fields of functionality and performance should also gain proper attention; the infrastructure that supports detection of various defects should be enriched to meet the industry’s need; (2) many kinds of defects result from developers’ misunderstanding or misuse of the characteristics and mechanisms in Android system, thus the works that can systematically collect and formalize Android recommendations are in demand; (3) various program analysis approaches with techniques in other fields are applied in analyzing Android apps; however, they can be improved with more precise techniques to be more applicable; (4) The fragmentation and evolution of Android system blocks the usability of existing tools, which should be taken into consideration when developing new approaches.
引用
收藏
页码:1210 / 1227
页数:17
相关论文
共 50 条
  • [21] Android Smartphone Vulnerabilities : A Survey
    Joshi, Jignesh
    Parekh, Chandresh
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), 2016, : 27 - 31
  • [22] Cybersecurity for Android Applications: Permissions in Android 5 and 6
    Moore, Scott R.
    Ge, Huangyi
    Li, Ninghui
    Proctor, Robert W.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2019, 35 (07) : 630 - 640
  • [23] Survey of Android OS security
    National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing
    101408, China
    Jisuanji Yanjiu yu Fazhan, 7 (1385-1396):
  • [24] Recovering Android Bad Smells from Android Applications
    Ghulam Rasool
    Azhar Ali
    Arabian Journal for Science and Engineering, 2020, 45 : 3289 - 3315
  • [25] Recovering Android Bad Smells from Android Applications
    Rasool, Ghulam
    Ali, Azhar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3289 - 3315
  • [26] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices
    Meshram, P. D.
    Thool, R. C.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
  • [28] Android Applications Scanning: The Guide
    Almomani, Iman
    Khayer, Aala
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 357 - 361
  • [29] Certificate Reuse in Android Applications
    Nezhadian, Fatemeh
    Branca, Enrico
    Stakhanova, Natalia
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 226 - 245
  • [30] Certificate Pinning for Android Applications
    Bhor, Mahesh
    Karia, Deepak
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 527 - 530