2020
DOI: 10.1109/access.2020.2998043
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions

Abstract: Nowadays, people's lifestyle is more and more dependent on mobile applications (Apps), such as shopping, financial management and surfing the internet. However, developers mainly focus on the implementation of Apps and the improvement of user experience while ignoring security issues. In this paper, we perform the comprehensive study on vulnerabilities caused by misuse of APIs and form a methodology for this type of vulnerability analysis. We investigate the security of three types of Android Apps including fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…ApkAnalyzer [13], FlowDroid [17] Qin, et al, IEEE Access, 2020 [116] Alibaba Cloud OSS credential disclosure, Improper certificate validation, Web-View remote code execution, Web-View bypass certificate validation It can detect vulnerabilities in packed and unpacked apps with a low computing cost. The average accuracy, detection rate, efficiency, and scalability are also high.…”
Section: 23mentioning
confidence: 99%
See 3 more Smart Citations
“…ApkAnalyzer [13], FlowDroid [17] Qin, et al, IEEE Access, 2020 [116] Alibaba Cloud OSS credential disclosure, Improper certificate validation, Web-View remote code execution, Web-View bypass certificate validation It can detect vulnerabilities in packed and unpacked apps with a low computing cost. The average accuracy, detection rate, efficiency, and scalability are also high.…”
Section: 23mentioning
confidence: 99%
“…An increasing number of these supporting methods, such as [45,48,89,93] are based on machine learning and deep learning for automatic early detection of security issues and vulnerabilities, which can support the software engineers to improve software security. Studies in [10,18,116,164] employ alternative techniques, to identify vulnerabilities. A thorough understanding of these existing methods is essential for developing Android applications by applying security best practices.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Nowadays, people's lifestyles increasingly depend on mobile applications (apps), such as B. shopping, managing money, surfing the Internet, etc. However, developers mainly focus on application implementation and user experience improvement while ignoring security issues [10]. With the application of users to an application to support their productivity, irresponsible parties are often used to infiltrate malicious code in several applications.…”
Section: Introductionmentioning
confidence: 99%