Analyses for specific defects in android applications: a survey

被引:0
作者
Tianyong Wu
Xi Deng
Jun Yan
Jian Zhang
机构
[1] Chinese Academy of Sciences,State Key Laboratory of Computer Science, Institute of Software
[2] University of Chinese Academy of Sciences,Technology Center of Software Engineering, Institute of Software
[3] Chinese Academy of Sciences,undefined
来源
Frontiers of Computer Science | 2019年 / 13卷
关键词
Android apps; program analysis; security; functionality; performance;
D O I
暂无
中图分类号
学科分类号
摘要
Android applications (APPS) are in widespread use and have enriched our life. To ensure the quality and security of the apps, many approaches have been proposed in recent years for detecting bugs and defects in the apps, of which program analysis is a major one. This paper mainly makes an investigation of existing works on the analysis of Android apps. We summarize the purposes and proposed techniques of existing approaches, and make a taxonomy of these works, based on which we point out the trends and challenges of research in this field. From our survey, we sum up four main findings: (1) program analysis in Android security field has gained particular attention in the past years, the fields of functionality and performance should also gain proper attention; the infrastructure that supports detection of various defects should be enriched to meet the industry’s need; (2) many kinds of defects result from developers’ misunderstanding or misuse of the characteristics and mechanisms in Android system, thus the works that can systematically collect and formalize Android recommendations are in demand; (3) various program analysis approaches with techniques in other fields are applied in analyzing Android apps; however, they can be improved with more precise techniques to be more applicable; (4) The fragmentation and evolution of Android system blocks the usability of existing tools, which should be taken into consideration when developing new approaches.
引用
收藏
页码:1210 / 1227
页数:17
相关论文
共 50 条
  • [41] A Survey on Location Based Application Development for Android Platform
    Patel, Bhagyasri G.
    Dabhi, Vipul K.
    Tyagi, Utkarsh
    Shah, Pushpalata B.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 731 - 739
  • [42] Android Forensics Tools and Security Mechanism: Survey Paper
    Amer, Nisreen
    Al-Halabi, Yahia S.
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [43] Characterizing and Finding System Setting-Related Defects in Android Apps
    Sun, Jingling
    Su, Ting
    Liu, Kai
    Peng, Chao
    Zhang, Zhao
    Pu, Geguang
    Xie, Tao
    Su, Zhendong
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 2941 - 2963
  • [44] Repackaging Android Applications for Auditing Access to Private Data
    Berthome, P.
    Fecherolle, T.
    Guilloteau, N.
    Lalande, J. -F.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 388 - 396
  • [45] Driving Execution of Target Paths in Android Applications with (a) CAR
    Wong, Michelle Y.
    Lie, David
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 888 - 902
  • [46] Privacy Vulnerability Analysis for Android Applications A Practical Approach
    Argudo, Alejandro
    Lopez, Gabriel
    Sanchez, Franklin
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 256 - 260
  • [47] Explainable Machine Learning for Malware Detection on Android Applications
    Palma, Catarina
    Ferreira, Artur
    Figueiredo, Mario
    INFORMATION, 2024, 15 (01)
  • [48] EFSM Model-Based Testing for Android Applications
    Wang, Weiwei
    Guo, Junxia
    Li, Beite
    Shang, Ying
    Zhao, Ruilian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2024, 34 (04) : 597 - 621
  • [49] Assessment of Source Data Vulnerability to Reproduction in Android Applications
    Shafi, Muhammad
    Israr, Muhammad
    Khan, Muhammad Sohail
    Khattak, Muhammad Irfan
    Syed, Togeer Ali
    2017 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2017, : 122 - 126
  • [50] Signature Generation for Sensitive Information Leakage in Android Applications
    Kuzuno, Hiroki
    Tonami, Satoshi
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2013, : 112 - 119