Survey on Reverse-Engineering Tools for Android Mobile Devices

被引:6
|
作者
Albakri, Ashwag [1 ]
Fatima, Huda [2 ]
Mohammed, Maram [1 ]
Ahmed, Aisha [1 ]
Ali, Aisha [1 ]
Ali, Asala [1 ]
Elzein, Nahla Mohammed [3 ]
机构
[1] Jazan Univ, Dept Comp Sci, Jazan, Saudi Arabia
[2] Jazan Univ, Dept Informat Technol & Secur, Jazan, Saudi Arabia
[3] Futur Univ, Fac Comp Sci, Khartoum, Sudan
关键词
Mobile computing;
D O I
10.1155/2022/4908134
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users' sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Reverse-engineering instruction encodings
    Hsich, WC
    Engler, DR
    Back, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 2001 USENIX ANNUAL TECHNICAL CONFERENCE, 2001, : 133 - 145
  • [22] REVERSE-ENGINEERING BLAME1
    Sliwa, Paulina
    PHILOSOPHICAL PERSPECTIVES, 2019, 33 (01) : 200 - 219
  • [23] Reverse-engineering of polynomial dynamical systems
    Jarrah, Abdul Salam
    Laubenbacher, Reinhard
    Stigler, Brandilyn
    Stillman, Michael
    ADVANCES IN APPLIED MATHEMATICS, 2007, 39 (04) : 477 - 489
  • [24] Defending Genealogy as Conceptual Reverse-Engineering
    Queloz, Matthieu
    ANALYSIS, 2024, 84 (02) : 385 - 400
  • [25] Data requirements of reverse-engineering algorithms
    Just, Winfried
    REVERSE ENGINEERING BIOLOGICAL NETWORKS: OPPORTUNITIES AND CHALLENGES IN COMPUTATIONAL METHODS FOR PATHWAY INFERENCE, 2007, 1115 : 142 - 153
  • [26] Rethinking the Reverse-engineering of Trojan Triggers
    Wang, Zhenting
    Mei, Kai
    Ding, Hailun
    Zhai, Juan
    Ma, Shiqing
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [27] INTERPRETING REVERSE-ENGINEERING LAW - RESPONSE
    SAMUELSON, P
    IEEE SOFTWARE, 1990, 7 (04) : 8 - &
  • [28] Reverse-engineering the locomotion of a stem amniote
    Nyakatura, John A.
    Melo, Kamilo
    Horvat, Tomislav
    Karakasiliotis, Kostas
    Allen, Vivian R.
    Andikfar, Amir
    Andrada, Emanuel
    Arnold, Patrick
    Laustroeer, Jonas
    Hutchinson, John R.
    Fischer, Martin S.
    Ijspeert, Auke J.
    NATURE, 2019, 565 (7739) : 351 - +
  • [29] Reverse-engineering ecological then from data
    Martin, Benjamin T.
    Munch, Stephan B.
    Hein, Andrew M.
    PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2018, 285 (1878)
  • [30] Reverse-engineering the locomotion of a stem amniote
    John A. Nyakatura
    Kamilo Melo
    Tomislav Horvat
    Kostas Karakasiliotis
    Vivian R. Allen
    Amir Andikfar
    Emanuel Andrada
    Patrick Arnold
    Jonas Lauströer
    John R. Hutchinson
    Martin S. Fischer
    Auke J. Ijspeert
    Nature, 2019, 565 : 351 - 355