4.7 Review

Android Source Code Vulnerability Detection: A Systematic Literature Review

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Theory & Methods

Deep Learning for Android Malware Defenses: A Systematic Literature Review

Yue Liu et al.

Summary: Malicious applications, especially those targeting Android, pose a serious threat to developers and end-users. Existing defense approaches based on manual rules or traditional machine learning may not be effective due to the rapid growth of Android malware and the advancement of evasion technologies. Deep learning (DL) techniques have shown promising performance in various domains, so applying DL to Android malware defenses has gained significant research attention. This article presents a systematic literature review that identifies 132 studies from 2014 to 2021, revealing the prevalence of DL-based Android malware detection and other defense approaches based on DL.

ACM COMPUTING SURVEYS (2023)

Proceedings Paper Computer Science, Information Systems

POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning

Janaka Senanayake et al.

Summary: Mobile application developers may not always prioritize source code security when publishing apps to the marketplaces. This research proposes a highly accurate method based on Machine Learning (ML) to detect Android source code vulnerabilities, aiming to integrate security-by-design into the development practices.

ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2022)

Review Computer Science, Information Systems

Android security assessment: A review, taxonomy and research gap study

Shivi Garg et al.

Summary: Security threats are escalating exponentially, especially to mobile platforms like Android. While significant research progress has been made in Android security, challenges and gaps still exist. This paper presents a comprehensive taxonomy to review state-of-the-art approaches used in Android security.

COMPUTERS & SECURITY (2021)

Article Multidisciplinary Sciences

Automatic Malicious Code Classification System through Static Analysis Using Machine Learning

Sungjoong Kim et al.

Summary: The development of information and communication technology has made daily life more convenient, but has also led to a proliferation of malicious code that is becoming increasingly complex. This paper proposes a static analysis automation technique using machine learning to classify normal and malicious files accurately.

SYMMETRY-BASEL (2021)

Article Computer Science, Hardware & Architecture

Understanding the Evolution of Android App Vulnerabilities

Jun Gao et al.

Summary: This study investigates vulnerabilities in Android apps by analyzing app lineages and examining how vulnerabilities are introduced, located, and whether they indicate potential malware. The findings provide valuable insights for developers and researchers to guide their vulnerability repair and research efforts, leveraging the knowledge gained from this study.

IEEE TRANSACTIONS ON RELIABILITY (2021)

Review Medicine, General & Internal

The PRISMA 2020 statement: an updated guideline for reporting systematic reviews

Matthew J. Page et al.

Summary: The PRISMA statement was designed to help systematic reviewers transparently report the purpose, methods, and findings of their reviews. The updated PRISMA 2020 statement includes new reporting guidance, a 27-item checklist, an abstract checklist, and revised flow diagrams for reviews.

BMJ-BRITISH MEDICAL JOURNAL (2021)

Article Computer Science, Information Systems

The Android Platform Security Model

Rene Mayrhofer et al.

Summary: As the most widely deployed end-user focused operating system, Android's security model must strike a balance between security, privacy, and usability to protect end users and provide assurances for app developers while ensuring system performance under hardware constraints. This article systematically documents the abstract model of Android security and discusses its implications.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2021)

Review Computer Science, Information Systems

Comparative analysis of Android and iOS from security viewpoint

Shivi Garg et al.

Summary: This paper provides a comparative analysis of Android and iOS in terms of security aspects, revealing that Android is more susceptible to security breaches and malware attacks compared to iOS. Therefore, researchers should focus on solving security issues related to Android to provide a safer mobile operating system for users.

COMPUTER SCIENCE REVIEW (2021)

Article Computer Science, Information Systems

Vulnerabilities in Android webview objects: Still not the end!

Mohamed A. El-Zawawy et al.

Summary: WebView objects allow rendering web content in Android apps and interacting with the Android framework. Security issues related to WebViewClient objects in Android apps need further investigation beyond the focus on JavaScript interfaces. WebV Sec, a static analysis system, was designed to detect new types of vulnerabilities in WebView objects and outperformed BabelView in terms of efficiency and accuracy in vulnerability detection.

COMPUTERS & SECURITY (2021)

Review Computer Science, Information Systems

Android Mobile Malware Detection Using Machine Learning: A Systematic Review

Janaka Senanayake et al.

Summary: With the increasing use of mobile devices, especially Android phones, malware attacks are on the rise. Machine learning-based methods have proven to be effective in detecting these attacks and a systematic review of ML-based Android malware detection techniques has been provided in this paper. The aim is to help researchers acquire in-depth knowledge in the field and identify potential future research and development directions.

ELECTRONICS (2021)

Proceedings Paper Automation & Control Systems

SO{U}RCERER : Developer-Driven Security Testing Framework for Android Apps

Muhammad Sajidur Rahman et al.

Summary: Frequently recommended secure development practices often lack effectiveness for app developers, as tool-driven and process-driven approaches have limitations. The SO{U}RCERER framework is proposed as a guiding tool for Android app developers, helping them identify and address vulnerabilities effectively.

2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021) (2021)

Proceedings Paper Computer Science, Software Engineering

ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications

Xian Zhan et al.

Summary: The study introduces a system called ATVHUNTER for accurately pinpointing in-app TPL versions and providing detailed information, demonstrating its superior performance over existing TPL detection tools. It can be used for large-scale TPL detection and identification of vulnerable TPL versions.

2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021) (2021)

Article Computer Science, Information Systems

A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection

Vasileios Kouliaridis et al.

Summary: Year after year, mobile malware attacks continue to grow in sophistication and diffusion. Most current mobile malware detection solutions utilize machine learning, but utilize different metrics, models, datasets, and analysis techniques, making cross-comparison challenging. This research attempts to systematize ML-powered malware detection approaches through categorizing them based on age of dataset, analysis type, ML techniques, and performance metrics, to guide future Android malware detection techniques.

INFORMATION (2021)

Article Engineering, Multidisciplinary

Extracting rules for vulnerabilities detection with static metrics using machine learning

Aakanshi Gupta et al.

Summary: The study focuses on evaluating the utility of machine learning algorithms in vulnerability detection, achieving high accuracy results through experimental research, with the core use of supervised machine learning algorithms. Additionally, validation was done through tenfold cross validation, and various statistical parameters were used for result analysis.

INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2021)

Article Computer Science, Software Engineering

Are free Android app security analysis tools effective in detecting known vulnerabilities?

Venkatesh-Prasad Ranganath et al.

EMPIRICAL SOFTWARE ENGINEERING (2020)

Article Computer Science, Software Engineering

Interventions for long-term software security creating a lightweight program of assurance techniques for developers

Charles Weir et al.

SOFTWARE-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Software Engineering

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis

Yingjie Wang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2020)

Article Computer Science, Information Systems

A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications

Junwei Tang et al.

TSINGHUA SCIENCE AND TECHNOLOGY (2020)

Article Computer Science, Information Systems

A TAN based hybrid model for android malware detection

Roopak Surendran et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Proceedings Paper Automation & Control Systems

Enforcing Green Code With Android Lint

Olivier Le Goaer

2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Ex-vivo dynamic analysis framework for Android device drivers

Ivan Pustogarov et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Article Computer Science, Information Systems

Effectiveness of Kotlin vs. Java in android app development tasks

Luca Ardito et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2020)

Article Computer Science, Information Systems

Vulnerability Prediction From Source Code Using Machine Learning

Zeki Bilgin et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions

Jiawei Qin et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

A Review of Android Malware Detection Approaches Based on Machine Learning

Kaijun Liu et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

Automated Testing of Android Apps: A Systematic Literature Review

Pingfan Kong et al.

IEEE TRANSACTIONS ON RELIABILITY (2019)

Article Computer Science, Information Systems

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

Lucky Onwuzurike et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

A novel parallel classifier scheme for vulnerability detection in Android

Shivi Garg et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Proceedings Paper Computer Science, Software Engineering

A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms

Ebtesam J. Alqahtani et al.

2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS) (2019)

Proceedings Paper Computer Science, Information Systems

Overview of machine learning methods for Android malware identification

Joao Lopes et al.

2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS) (2019)

Proceedings Paper Computer Science, Software Engineering

Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis

Carlos Renato Salim Campos et al.

2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

ReCDroid: Automatically Reproducing Android Application Crashes from Bug Reports

Yu Zhao et al.

2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)

Review Computer Science, Information Systems

A Systematic Review on Code Clone Detection

Qurat Ul Ain et al.

IEEE ACCESS (2019)

Article Computer Science, Software Engineering

A formal approach for detection of security flaws in the android permission system

Hamid Bagheri et al.

FORMAL ASPECTS OF COMPUTING (2018)

Article Automation & Control Systems

Significant Permission Identification for Machine-Learning-Based Android Malware Detection

Jin Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Proceedings Paper Computer Science, Software Engineering

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

Claudio Rizzo et al.

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018 (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Automated Vulnerability Detection in Source Code Using Deep Representation Learning

Rebecca L. Russell et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) (2018)

Proceedings Paper Computer Science, Information Systems

Machine Learning Methods for Software Vulnerability Detection

Boris Chernis et al.

IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (2018)

Proceedings Paper Computer Science, Software Engineering

AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps

Biniam Fisseha Demissie et al.

2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT) (2018)

Article Computer Science, Information Systems

Network-based detection of Android malicious apps

Shree Garg et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2017)

Review Computer Science, Information Systems

Static analysis of android apps: A systematic literature review

Li Li et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Article Computer Science, Information Systems

Characterizing malicious Android apps by mining topic-specific data flow signatures

Xinli Yang et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Article Telecommunications

Towards a threat assessment framework for apps collusion

Harsha Kumara Kalutarage et al.

TELECOMMUNICATION SYSTEMS (2017)

Proceedings Paper Computer Science, Information Systems

An Android Vulnerability Detection System

Jiayuan Zhang et al.

NETWORK AND SYSTEM SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

A Stitch in Time: Supporting Android Developers in Writing Secure Code

Duc Cuong Nguyen et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Software Engineering

An Empirical Study on Android-related Vulnerabilities

Mario Linares-Vasquez et al.

2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017) (2017)

Article Computer Science, Theory & Methods

Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey

Seyed Mohammad Ghaffarian et al.

ACM COMPUTING SURVEYS (2017)

Proceedings Paper Computer Science, Software Engineering

OASIS: Prioritizing Static Analysis Warnings for Android Apps Based on App User Reviews

Lili Wei et al.

ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING (2017)

Proceedings Paper Computer Science, Information Systems

Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications

Amiangshu Bosu et al.

PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) (2017)

Proceedings Paper Computer Science, Theory & Methods

A Comparison of Features for Android Malware Detection

Matthew Leeds et al.

PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17 (2017)

Proceedings Paper Computer Science, Information Systems

Toward Large-Scale Vulnerability Discovery using Machine Learning

Gustavo Grieco et al.

CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (2016)

Proceedings Paper Computer Science, Information Systems

AndroZoo: Collecting Millions of Android Apps for the Research Community

Kevin Allix et al.

13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016) (2016)

Proceedings Paper Computer Science, Theory & Methods

HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving

Stefano Calzavara et al.

1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (2016)

Article Computer Science, Software Engineering

COVERT: Compositional Analysis of Android Inter-App Permission Leakage

Hamid Bagheri et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2015)