Survey on Reverse-Engineering Tools for Android Mobile Devices

被引:6
|
作者
Albakri, Ashwag [1 ]
Fatima, Huda [2 ]
Mohammed, Maram [1 ]
Ahmed, Aisha [1 ]
Ali, Aisha [1 ]
Ali, Asala [1 ]
Elzein, Nahla Mohammed [3 ]
机构
[1] Jazan Univ, Dept Comp Sci, Jazan, Saudi Arabia
[2] Jazan Univ, Dept Informat Technol & Secur, Jazan, Saudi Arabia
[3] Futur Univ, Fac Comp Sci, Khartoum, Sudan
关键词
Mobile computing;
D O I
10.1155/2022/4908134
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users' sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Reverse-Engineering a Watermark Detector Using an Oracle
    Craver, Scott
    Atakli, Idris
    Yu, Jun
    EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):
  • [42] A reverse-engineering methodology for medical enhancement processes
    Labbene Ayachi, Faten
    Boussi Rahmouni, Hanene
    Ben Ammar, Marwa
    Mahjoubi, Halima
    CENTERIS2019--INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/PROJMAN2019--INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/HCIST2019--INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, 164 : 714 - 723
  • [43] REVERSE-ENGINEERING OF THE 3RD KIND
    LEIBSON, SH
    EDN, 1994, 39 (15) : 31 - 31
  • [44] Reverse-Engineering BitTorrent: A Markov Approximation Perspective
    Shao, Ziyu
    Zhang, Hao
    Chen, Minghua
    Ramchandran, Kannan
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2996 - 3000
  • [45] Legacy software reverse-engineering and comprehension by interpretations
    Dugerdil, Philippe
    Proceedings of the 10th IASTED International Conference on Software Engineering and Applications, 2006, : 276 - 281
  • [46] REVERSE-ENGINEERING EVALUATION AND MONITORING OF NEMRUT MONUMENTS
    Turer, Ahmet
    Aktas Erdem, Yasemin Didem
    Sahin Guchan, Neriman
    INTERNATIONAL JOURNAL OF ARCHITECTURAL HERITAGE, 2012, 6 (04) : 373 - 395
  • [47] Reverse-Engineering the Physical Configuration of Smart Homes
    Vivian, Martin
    Sadre, Ramin
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1763 - 1770
  • [48] Reverse-Engineering Strain in Nanocrystallites by Tracking Trimerons
    Nickel, Rachel
    Chi, C. -C.
    Ranjan, Ashok
    Ouyang, Chuenhou
    Freeland, John W.
    van Lierop, Johan
    ADVANCED MATERIALS, 2021, 33 (16)
  • [49] Automatic instruction scheduler retargeting by reverse-engineering
    Bridges, Matthew J.
    Vachharajani, Neil
    Ottoni, Guilherme
    August, David I.
    ACM SIGPLAN NOTICES, 2006, 41 (06) : 228 - 238
  • [50] Reverse-engineering lift control in fruit flies
    Graetzel, Chauncey F.
    Nelson, Bradley J.
    Fry, Steven N.
    2008 2ND IEEE RAS & EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL ROBOTICS AND BIOMECHATRONICS (BIOROB 2008), VOLS 1 AND 2, 2008, : 402 - +