A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software

作者: Alireza Sadeghi , Hamid Bagheri , Joshua Garcia , Sam Malek

DOI: 10.1109/TSE.2016.2615307

关键词:

摘要: In parallel with the meteoric rise of mobile software, we are witnessing an alarming escalation in number and sophistication security threats targeted at platforms, particularly Android, as dominant platform. While existing research has made significant progress towards detection mitigation Android security, gaps challenges remain. This paper contributes a comprehensive taxonomy to classify characterize state-of-the-art this area. We have carefully followed systematic literature review process, analyzed results more than 300 papers, resulting most elaborate investigation area research. The analysis revealed patterns, trends, literature, underlined key opportunities that will shape focus future efforts.

参考文章(489)
Fu Song, Tayssir Touili, Model-Checking for Android Malware Detection asian symposium on programming languages and systems. pp. 216- 235 ,(2014) , 10.1007/978-3-319-12736-1_12
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Devdatta Akhawe, Matthew Finifter, Adrienne Porter Felt, David Wagner, Serge Egelman, How to ask for permission usenix conference on hot topics in security. pp. 7- 7 ,(2012)
Yajin Zhou, Kapil Singh, Xuxian Jiang, Owner-Centric Protection of Unstructured Data on Smartphones trust and trustworthy computing. pp. 55- 73 ,(2014) , 10.1007/978-3-319-08593-7_4
Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai, Detection of Android API Call Using Logging Mechanism within Android Framework international conference on security and privacy in communication systems. pp. 393- 404 ,(2013) , 10.1007/978-3-319-04283-1_25
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh, Taming information-stealing smartphone applications (on Android) trust and trustworthy computing. pp. 93- 107 ,(2011) , 10.1007/978-3-642-21599-5_7
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets international conference on detection of intrusions and malware, and vulnerability assessment. pp. 51- 71 ,(2014) , 10.1007/978-3-319-08509-8_4
Erika Chin, David Wagner, Bifocals: Analyzing WebView Vulnerabilities in Android Applications workshop on information security applications. pp. 138- 159 ,(2013) , 10.1007/978-3-319-05149-9_9
Xiao Zhang, Wenliang Du, Attacks on Android Clipboard international conference on detection of intrusions and malware, and vulnerability assessment. pp. 72- 91 ,(2014) , 10.1007/978-3-319-08509-8_5
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky, AppGuard: enforcing user requirements on android apps tools and algorithms for construction and analysis of systems. pp. 543- 548 ,(2013) , 10.1007/978-3-642-36742-7_39