Android Applications Scanning: The Guide

被引:7
|
作者
Almomani, Iman [1 ,2 ]
Khayer, Aala [1 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, Dept Comp Sci, Amman, Jordan
关键词
Android; application; Security; apk; malware; scanning; detection; survey; guide; MALWARE DETECTION;
D O I
10.1109/iccisci.2019.8716380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming of Android technology makes Android users and their devices with all running applications targeted by many security attackers. These attackers intent to inject malicious software in these applications to obtain the user's data for several purposes. Nowadays, Android users are keen to install clean apps in their devices. At the same time, security solutions have been proposed to detect malware apps. This paper presents a general framework for Android applications scanning process. The aim is to guide researchers and developers to the main phases/steps required to analyze Android applications, check their trustworthiness and protect Android users from being victims to serious malware attacks. Moreover, this research highlights the metrics, tools, mechanisms and datasets that are mostly used throughout the scanning process.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [21] BehaviorDroid: Monitoring Android Applications
    Silva, Alexis
    Simmonds, Jocelyn
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 19 - 20
  • [22] Attacks on Android Banking Applications
    Kouraogo, Yacouba
    Zkik, Karim
    Noreddine, El Janati El Idrissi
    Orhanou, Ghizlane
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [23] Migrating Android Applications to the Cloud
    Hung, Shih-Hao
    Shieh, Jeng-Peng
    Lee, Chen-Pang
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2011, 3 (02) : 14 - 28
  • [24] On the Automatic Categorisation of Android Applications
    Sanz, Borja
    Santos, Igor
    Laorden, Carlos
    Ugarte-Pedrero, Xabier
    Garcia Bringas, Pablo
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 149 - 153
  • [25] Android Applications and Security Breach
    Noemi Benitez-Mejia, Diana Gabriela
    Sanchez-Perez, Gabriel
    Karina Toscano-Medina, Linda
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 164 - 169
  • [26] Real Time Android Ransomware Detection by Analyzed Android Applications
    Ko, Ju-Seong
    Jo, Jeong-Seok
    Kim, Deuk-Hun
    Choi, Seul-Ki
    Kwak, Jin
    2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 375 - 379
  • [27] Data Security of Android Applications
    Obiri-Yeboah, Jesse
    Qi, Man
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1716 - 1721
  • [28] Securing Interactions of Android Applications
    Marcela Jimenez, Lina
    Julieta Rueda, Sandra
    2015 10TH COMPUTING COLOMBIAN CONFERENCE (10CCC), 2015, : 31 - 38
  • [29] Decomposable Trust for Android Applications
    Fernandes, Earlence
    Aluri, Ajit
    Crowell, Alexander
    Prakash, Atul
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 343 - 354
  • [30] Race Detection for Android Applications
    Maiya, Pallavi
    Kanade, Aditya
    Majumdar, Rupak
    ACM SIGPLAN NOTICES, 2014, 49 (06) : 316 - 325