2018
DOI: 10.1007/978-3-319-78753-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Analysis of Static Code Metrics for Predicting Risk Scores in Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…In a recent work, Rahman et al find that static code metrics, extracted from the source code of Android applications (eg, number of lines, functional complexity, and McCabe's complexity), might be used effectively to predict multiple levels of security and privacy risk for Android applications. In a similar effort, Alenezi and colleagues use SonarQube to extract code metrics from 1407 Android applications and study the most influential static code metrics that contribute in predicting security vulnerabilities. Wei et al demonstrate that component cohesion and coupling metrics are also effective in predicting vulnerabilities at component level.…”
Section: Related Workmentioning
confidence: 99%
“…In a recent work, Rahman et al find that static code metrics, extracted from the source code of Android applications (eg, number of lines, functional complexity, and McCabe's complexity), might be used effectively to predict multiple levels of security and privacy risk for Android applications. In a similar effort, Alenezi and colleagues use SonarQube to extract code metrics from 1407 Android applications and study the most influential static code metrics that contribute in predicting security vulnerabilities. Wei et al demonstrate that component cohesion and coupling metrics are also effective in predicting vulnerabilities at component level.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the findings of the surveys and interviews conducted in [111] related to intervention for long-term software security, the importance of having an automated code analysis tool to identify vulnerabilities of the written codes has been identified. The empirical analysis conducted in [112] identified the static software metrics' correlation and the most informative metrics which can be used to find code vulnerability related to Android source codes.…”
Section: Machine Learning Methods To Detect Code Vulnerabilitiesmentioning
confidence: 99%
“…(i) the minimum API Level required for the application to run (min sdk), (ii) the specific API Level that the application targets (target sdk), (iii) the number of classes (classes), (iv) the number of packages (packages), (v) the number of interfaces (interfaces), (vi) the number of annotated classes (annotations), and (vii) the number of public classes (public classes). While the numbers of classes of different types determine the size of an app, which plays an important role in determining the security of the app (i.e., more classes mean a larger attack surface [3]), the API Levels indicators are strictly connected with the app security [60].…”
Section: Photosmentioning
confidence: 99%