Telecommunication Systems - Principles and Applications of Wireless-Optical Technologies 2019
DOI: 10.5772/intechopen.86661
|View full text |Cite
|
Sign up to set email alerts
|

Android Application Security Scanning Process

Abstract: This chapter presents the security scanning process for Android applications. The aim is to guide researchers and developers to the core phases/steps required to analyze Android applications, check their trustworthiness, and protect Android users and their devices from being victims to different malware attacks. The scanning process is comprehensive, explaining the main phases and how they are conducted including (a) the download of the apps themselves; (b) Android application package (APK) reverse engineering… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“…From the application developers' perspective, it is considered the most important layer because their work is mainly to develop applications that could run on top of the application framework layer and utilize the services provided by this application framework layer. More specifically, the framework layer provides access to all the APIs of the lower layer, to various hardware and software resources [11].…”
Section: Application Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…From the application developers' perspective, it is considered the most important layer because their work is mainly to develop applications that could run on top of the application framework layer and utilize the services provided by this application framework layer. More specifically, the framework layer provides access to all the APIs of the lower layer, to various hardware and software resources [11].…”
Section: Application Frameworkmentioning
confidence: 99%
“…e applications are generally coded with the Java language that allows developers to code the program once and run it on multiple platforms. Along with applications developed by software developers, there are many systemlevel applications such as desktops, contacts, e-mail, and browsers [11]. e Android application mainly contains four components which are Activities, Services, Content Providers, and Broadcast receivers that provide a strong link among each other to build up the Android application.…”
Section: Applications Layermentioning
confidence: 99%
“…plication can be customized for a particular device model by the manufacturers based on the vendors requirements. Whereas the user applications, the third-party apps, can be downloaded from various market stores such as Google Play, Anzhi, and AppChina [30], [31]. The third-party applications are developed by individual developers, that can include benign and malicious applications.…”
Section: Android Applicationsmentioning
confidence: 99%
“…Static analysis is an effective mechanism in any Android malware or ransomware detection system [28] and API calls feature is a key static metric that is utilized to identify malicious behaviors [29][30][31]. Therefore, this paper provides a deep analysis of API calls to investigate the extent of their influence on the accuracy of the detection process.…”
Section: Introductionmentioning
confidence: 99%