Survey on Reverse-Engineering Tools for Android Mobile Devices

被引:6
|
作者
Albakri, Ashwag [1 ]
Fatima, Huda [2 ]
Mohammed, Maram [1 ]
Ahmed, Aisha [1 ]
Ali, Aisha [1 ]
Ali, Asala [1 ]
Elzein, Nahla Mohammed [3 ]
机构
[1] Jazan Univ, Dept Comp Sci, Jazan, Saudi Arabia
[2] Jazan Univ, Dept Informat Technol & Secur, Jazan, Saudi Arabia
[3] Futur Univ, Fac Comp Sci, Khartoum, Sudan
关键词
Mobile computing;
D O I
10.1155/2022/4908134
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users' sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Reverse-engineering transcription control networks
    Gardner, Timothy S.
    Faith, Jeremiah J.
    PHYSICS OF LIFE REVIEWS, 2005, 2 (01) : 65 - 88
  • [32] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [33] Reverse-engineering human regulatory networks
    Lefebvre, Celine
    Rieckhof, Gabrielle
    Califano, Andrea
    WILEY INTERDISCIPLINARY REVIEWS-SYSTEMS BIOLOGY AND MEDICINE, 2012, 4 (04) : 311 - 325
  • [34] Reverse-Engineering EFSMs with Data Dependencies
    Foster, Michael
    Derrick, John
    Walkinshaw, Neil
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2021, 2022, 13045 : 37 - 54
  • [35] Toumai: Reverse-engineering a human ancestor
    Gorder, PF
    COMPUTING IN SCIENCE & ENGINEERING, 2005, 7 (04) : 10 - 13
  • [36] A fast interactive reverse-engineering system
    Beccari, C. V.
    Farella, E.
    Liverani, A.
    Morigi, S.
    Rucci, M.
    COMPUTER-AIDED DESIGN, 2010, 42 (10) : 860 - 873
  • [37] Reverse-engineering growth and form in Heidelberg
    Levin, Michael
    Arias, Alfonso Martinez
    DEVELOPMENT, 2019, 146 (14):
  • [38] Reverse-engineering a detector with false alarms
    Craver, Scott
    Yu, Jun
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [39] PHOTOVOLTAIC EFFECTS IN BIOMEMBRANES - REVERSE-ENGINEERING NATURALLY-OCCURRING MOLECULAR OPTOELECTRONIC DEVICES
    HONG, FT
    IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE, 1994, 13 (01): : 75 - 93
  • [40] REVERSE-ENGINEERING SOMEONE ELSES SOFTWARE - IS IT LEGAL
    SAMUELSON, P
    IEEE SOFTWARE, 1990, 7 (01) : 90 - 96