Survey on Reverse-Engineering Tools for Android Mobile Devices

被引:6
|
作者
Albakri, Ashwag [1 ]
Fatima, Huda [2 ]
Mohammed, Maram [1 ]
Ahmed, Aisha [1 ]
Ali, Aisha [1 ]
Ali, Asala [1 ]
Elzein, Nahla Mohammed [3 ]
机构
[1] Jazan Univ, Dept Comp Sci, Jazan, Saudi Arabia
[2] Jazan Univ, Dept Informat Technol & Secur, Jazan, Saudi Arabia
[3] Futur Univ, Fac Comp Sci, Khartoum, Sudan
关键词
Mobile computing;
D O I
10.1155/2022/4908134
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users' sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [2] Reverse-engineering user interfaces to facilitateporting to and across mobile devices and platforms
    Dept. of Computer Science, Virginia Tech., United States
    SPLASH Workshops - Compil. Proc. Co-Located Workshops: DSM, TMC, AGERE, AOOPES, NEAT, VMIL, 1600, (255-259):
  • [3] Reverse-engineering of XML Schemas: A Survey
    Klimek, Jakub
    Necasky, Martin
    PROCEEDINGS OF THE DATESO 2010 WORKSHOP - DATESO DATABASES, TEXTS, SPECIFICATIONS, AND OBJECTS, 2010, 567 : 96 - 107
  • [4] Survey on Reverse-engineering Artificial Intelligence
    Li C.-S.
    Wang S.-Y.
    Li Y.-M.
    Zhang C.-Z.
    Yuan Y.
    Wang G.-R.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 712 - 732
  • [5] Reverse-engineering Reverse Mathematics
    Sanders, Sam
    ANNALS OF PURE AND APPLIED LOGIC, 2013, 164 (05) : 528 - 541
  • [6] Reverse-engineering tissues
    Madhura Mukhopadhyay
    Nature Methods, 2021, 18 : 1450 - 1450
  • [7] Reverse-Engineering Risk
    O'Sullivan, Angela
    Mace, Lilith
    ERKENNTNIS, 2024,
  • [8] Specifications and reverse-engineering
    Brown, A.J.
    Journal of Software Maintenance, 1993, 5 (03):
  • [9] REVERSE-ENGINEERING MURPHY
    Hellem, Aaron
    SOUTH DAKOTA REVIEW, 2008, 46 (03): : 78 - 88
  • [10] Reverse-engineering tissues
    Mukhopadhyay, Madhura
    NATURE METHODS, 2021, 18 (12) : 1450 - 1450