Incorporating Android Code Smells into Java']Java Static Code Metrics for Security Risk Prediction of Android Applications

被引:5
|
作者
Gong, Ai [1 ]
Zhong, Yi [1 ,4 ]
Zou, Weiqin [2 ,3 ]
Shi, Yangyang [1 ]
Fang, Chunrong [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[3] Minist Ind & Informat Technol, Key Lab Safety Crit Software NUAA, Nanjing, Peoples R China
[4] Chongqing Univ Posts & Telecom, Coll Mobile Telecommun, Chongqing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Android code smells; !text type='Java']Java[!/text] code metrics; Android security;
D O I
10.1109/QRS51102.2020.00017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the wide-spread use of Android applications in people's daily life, it becomes more and more important to timely identify the security problems of these applications. To enrich existing studies in guarding the security and privacy of Android applications, we attempted to predict the security risk levels of Android applications. Specifically, we proposed an approach that incorporated Android code smells into traditional Java code metrics to predict how secure an Android application is. With an evaluation of our technique on 3,680 Android applications, we found that: (1) Android code smells could help improve the performance of security risk prediction of Android applications; (2) By building a Random Forest model based on Android code smells and Java code metrics, we could achieve an Area Under Curve (AUC) of 0.97; (3) Android code smells such as member ignoring method (MIM) and leaking inner class (LIC) have a relatively-large influence on Android security risk prediction, to which developers should pay more attention during their application development.
引用
收藏
页码:30 / 40
页数:11
相关论文
共 50 条
  • [1] Model-based Static Source Code Analysis of Java']Java Programs with Applications to Android Security
    Lu, Zheng
    Mukhopadhyay, Supratik
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 322 - 327
  • [2] Code Reuse between Java']Java and Android Applications
    Cheon, Yoonsik
    Chavez, Carlos, V
    Castro, Ubaldo
    ICSOFT: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2019, : 246 - 253
  • [3] SootFX: A Static Code Feature Extraction Tool for Java']Java and Android
    Karakaya, Kadiray
    Bodden, Eric
    IEEE 21ST INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2021), 2021, : 181 - 186
  • [4] Efficiency Measurement of Java']Java Android Code
    Satrijandi, Nugroho
    Widyani, Yani
    2014 International Conference on Data and Software Engineering (ICODSE), 2014,
  • [5] Security code smells in Android ICC
    Pascal Gadient
    Mohammad Ghafari
    Patrick Frischknecht
    Oscar Nierstrasz
    Empirical Software Engineering, 2019, 24 : 3046 - 3076
  • [6] Security code smells in Android ICC
    Gadient, Pascal
    Ghafari, Mohammad
    Frischknecht, Patrick
    Nierstrasz, Oscar
    EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (05) : 3046 - 3076
  • [7] Understanding Code Smells in Android Applications
    Mannan, Umme Ayda
    Ahmed, Iftekhar
    Almurshed, Rana Abdullah M.
    Dig, Danny
    Jensen, Carlos
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 225 - 236
  • [8] Efficiency measurement of Java Android code
    Satrijandi, Nugroho
    Widyani, Yani
    Proceedings of 2014 International Conference on Data and Software Engineering, ICODSE 2014, 2014,
  • [9] Refactoring Android Source Code Smells From Android Applications
    Fawad, Muhammad
    Rasool, Ghulam
    Riaz, Muhammad Bilal
    IEEE ACCESS, 2025, 13 : 14122 - 14150
  • [10] Refactoring Android Java']Java Code for On-Demand Computation Offloading
    Zhang, Ying
    Huang, Gang
    Liu, Xuanzhe
    Zhang, Wei
    Mei, Hong
    Yang, Shunxiang
    ACM SIGPLAN NOTICES, 2012, 47 (10) : 233 - 247