Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022
DOI: 10.1145/3488932.3527290
|View full text |Cite
|
Sign up to set email alerts
|

Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning

Abstract: This document was downloaded from https://openair.rgu.ac.ukDeveloping secured android applications by mitigating code vulnerabilities with machine learning.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…30 For continuous integer experimental data, Lin's CCC will be better for measuring the agreement of two objects. 31 Assuming two random variables x and y, the formula for CCC 𝜌 C is given in Equation (4).…”
Section: Evaluation Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…30 For continuous integer experimental data, Lin's CCC will be better for measuring the agreement of two objects. 31 Assuming two random variables x and y, the formula for CCC 𝜌 C is given in Equation (4).…”
Section: Evaluation Methodsmentioning
confidence: 99%
“…By statistics, Android holds 71.55% of the market share, about 2.5 times greater than IOS 3 . The high market share makes Android more vulnerable to attacks by external sources, and security risks from poor programming selections within the code will expose users, and the platform, to varying levels of risk 4 . In this context, code smell emerged as a research hit to identify potentially poor design 5 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It includes high-risk shell Manuscript submitted to ACM command vulnerabilities, security code smells, and dangerous permissions. An Android code vulnerability dataset was proposed in [128], named LVDAndro [129], which contains vulnerable and non-vulnerable source code with their CWE [34] details. The proof-of-concept of this work identified the applicability of the dataset to train ML models to detect Android code vulnerabilities.…”
Section: Static Analysis Industrialmentioning
confidence: 99%
“…By statistics, Android occupies 71.55% market share, about 2.5 times more than IOS 3 . The high market share makes Android more vulnerable to attacks by external sources, and security risks from poor programming selections within the code will expose users, and the platform, to varying levels of risk 4 . In this context, code smell emerged as a research hit to identify potentially poor design 5 .…”
Section: Introductionmentioning
confidence: 99%