4.7 Review

Android Source Code Vulnerability Detection: A Systematic Literature Review

期刊

ACM COMPUTING SURVEYS
卷 55, 期 9, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3556974

关键词

Source code vulnerability; vulnerability detection; software security; Android security; machine learning

向作者/读者索取更多资源

With the increasing use of mobile devices and the continuous release of mobile applications, the security aspects of many Android applications are not being addressed properly. This article presents a systematic literature review that critically evaluates 118 technical studies published between 2016 and 2022, focusing on Android application analysis and source code vulnerability detection methods and tools. The review discusses both machine learning-based methods and conventional methods related to vulnerability detection, with special emphasis on machine learning-based methods.
The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not address the security aspects appropriately. This is often due to a lack of automated mechanisms to identify, test, and fix source code vulnerabilities at the early stages of design and development. Therefore, the need to fix such issues at the initial stages rather than providing updates and patches to the published applications is widely recognized. Researchers have proposed several methods to improve the security of applications by detecting source code vulnerabilities and malicious codes. This Systematic Literature Review (SLR) focuses on Android application analysis and source code vulnerability detection methods and tools by critically evaluating 118 carefully selected technical studies published between 2016 and 2022. It highlights the advantages, disadvantages, applicability of the proposed techniques, and potential improvements of those studies. Both Machine Learning (ML)-based methods and conventional methods related to vulnerability detection are discussed while focusing more on ML-based methods, since many recent studies conducted experiments with ML. Therefore, this article aims to enable researchers to acquire in-depth knowledge in secure mobile application development while minimizing the vulnerabilities by applying ML methods. Furthermore, researchers can use the discussions and findings of this SLR to identify potential future research and development directions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据