2021
DOI: 10.1016/j.cose.2020.102087
|View full text |Cite
|
Sign up to set email alerts
|

Android security assessment: A review, taxonomy and research gap study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 57 publications
0
14
0
Order By: Relevance
“…They are data extraction, data preprocessing, feature selection, model training, model evaluation, and model deployment [9]. Supervised learning, unsupervised learning, semisupervised learning, reinforcement learning, and deep learning are the different subcategories of ML [28]. The supervised learning approach uses a labelled dataset to train the model to solve classification and regression problems depend on the output variable type (continuous or discreet).…”
Section: Machine Learning Processmentioning
confidence: 99%
See 1 more Smart Citation
“…They are data extraction, data preprocessing, feature selection, model training, model evaluation, and model deployment [9]. Supervised learning, unsupervised learning, semisupervised learning, reinforcement learning, and deep learning are the different subcategories of ML [28]. The supervised learning approach uses a labelled dataset to train the model to solve classification and regression problems depend on the output variable type (continuous or discreet).…”
Section: Machine Learning Processmentioning
confidence: 99%
“…Under the static analysis, four aspects were proposed [28] which are analysis techniques, sensitivity analysis, data structure, and code representation. Under the analysis techniques, Symbolic execution, taint analysis, program slicing, abstract interpretation, type checking, and code instrumentation were identified.…”
Section: Static Dynamic and Hybrid Analysismentioning
confidence: 99%
“…As far as we know, there are no recent secondary studies focused on the intersection of the three domains of our scope (i.e., privacy, software quality, and Android applications). The related work is either outdated [6,7] or has a different scope, e.g., by focusing on security instead of privacy [9,10] or missing the overall set of quality assessment techniques we have covered [46,47]. We analyse these studies next.…”
Section: Related Workmentioning
confidence: 99%
“…Further, the contributions are scattered in different domains such as software engineering, cybersecurity, or computer networks, resulting in a growing but dispersed body of knowledge. Some previous works have provided insight into the topic but were carried out more than five years ago [6,7] or addressed security instead of privacy [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…Primary security services like authentication and authorization are usually implemented within access control systems (ACSs). Frequently, ACSs are only used as an entrance barrier to a system, but others adopt a continuous monitoring approach, where some kind of detection procedures are used to both determine the occurrence of undesired activities or behaviors [7], [8] during the lifetime operation of devices as well as to carry out some kind of countermeasures.…”
Section: Introductionmentioning
confidence: 99%