2022
DOI: 10.1155/2022/4908134
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Reverse-Engineering Tools for Android Mobile Devices

Abstract: With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users’ sensitive information. Dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Albakri et al (2022) advise against installing software from untrustworthy sources. Users should also only download applications from reliable sources.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Albakri et al (2022) advise against installing software from untrustworthy sources. Users should also only download applications from reliable sources.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Therefore, security-conscious users are aware of security practices, including preserving data confidentiality, use of firewalls and data encryption. Albakri et al (2022) advise against installing software from untrustworthy sources. Users should also only download applications from reliable sources.…”
Section: Mobile Devicesmentioning
confidence: 99%
“…The first way is to analyse the code by reverse-engineering the developed Android Application Packages (APKs). It is the most popular and the easiest way, but a pre-build application is required to follow this approach [1]. The second way is to analyse the source code simultaneously as the code is being written, which is more valuable to the developers.…”
Section: Background and Related Workmentioning
confidence: 99%