Taxonomy of security weaknesses in Java and Kotlin Android apps

نویسندگان

چکیده

Android is nowadays the most popular operating system in world, not only realm of mobile devices, but also when considering desktop and laptop computers. Such a popularity makes it an attractive target for security attacks, due to sensitive information often manipulated by apps. The latter are going through transition which ecosystem moving from usage Java as official language developing apps, adoption Kotlin first choice supported Google. While previous studies have partially studied weaknesses affecting there no comprehensive empirical investigation studying software apps (and comparing) two main languages used their development, namely Kotlin. We present study we: (i) manually analyze 681 commits including fixed developers with goal defining taxonomy highlighting types apps; (ii) survey 43 validate complement our taxonomy. Based on findings, we propose list future actions that could be performed researchers practitioners improve

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensic Taxonomy of Popular Android mHealth Apps

Mobile health applications (or mHealth apps, as they are commonly known) are increasingly popular with both individual end users and user groups such as physicians. Due to their ability to access, store and transmit personally identifiable and sensitive information (e.g. geolocation information and personal details), they are potentially an important source of evidentiary materials in digital i...

متن کامل

An Android Cloud Storage Apps Forensic Taxonomy

Mobile phones have been playing a very significant role in our daily activities for the last decade. With the increase need for these devices, people are now more reliant on their smartphone applications for their daily tasks and many prefer to save their mobile data on a cloud platform to access them anywhere on any device. Cloud technology is the new way for better data storage, as it offers ...

متن کامل

Studying Security Weaknesses of Android System

As smartphones are generalized, various technologies and services have been introduced and are in wide use. From simply using calling or texting services, Internet banking and transaction system that require sensitive personal information emerged. Google’s Android, one of the representative OS of smartphones, was developed based on an open source, having various weaknesses and exposed to securi...

متن کامل

Security Concerns in Android mHealth Apps

Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of...

متن کامل

A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Apps

In parallel with the meteoric rise of mobile software, we are witnessing an alarming escalation in the number and sophistication of the security threats targeted at mobile platforms, particularly Android, as the dominant platform. While existing research has made significant progress towards detection and mitigation of Android security, gaps and challenges remain. This paper contributes a compr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Systems and Software

سال: 2022

ISSN: ['0164-1212', '1873-1228']

DOI: https://doi.org/10.1016/j.jss.2022.111233