基于反向工程渗透测试的Android应用安全性分析

Shweta Katoch, Vaneet Garg
{"title":"基于反向工程渗透测试的Android应用安全性分析","authors":"Shweta Katoch, Vaneet Garg","doi":"10.1109/ICSMDI57622.2023.00048","DOIUrl":null,"url":null,"abstract":"Every person is using smartphones these days, and most of the users are Android users, with this Android applications are running on a huge scale. In the final quarter of 2022, Android is considered as the market leader among other mobile operating systems, holding a market share of over 71.8 percent, which leads to the mass development of Android applications and also leads to a problem where some applications are developed by young developers without considering the security factor and are easily downloadable from Google Play Store and open source. Since Android is open source and allows developers to create applications without restriction, some inexperienced developers create numerous apps without being aware of the most recent Android security challenges. As a result, these apps have an open attack surface that hackers can use to steal user data. Installing such apps can put other secure apps and system in danger, and once a bad app is installed, it will have an impact on the entire system. The goal of this research is to identify vulnerabilities in Android applications and the techniques used to find and inspect vulnerabilities. Penetration testing identifies security flaws and aids in network security. This paper will help future authors to understand several elements of penetration testing, including tools, attack methodologies and defence strategies. More particularly, this study has performed reverse engineering by performing penetration tests using a private network, devices and tools. The results are then summarised and discussed. This study also described about the specific procedures and techniques used to carry out these attacks.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Analysis on Android Application Through Penetration Testing using Reverse Engineering\",\"authors\":\"Shweta Katoch, Vaneet Garg\",\"doi\":\"10.1109/ICSMDI57622.2023.00048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Every person is using smartphones these days, and most of the users are Android users, with this Android applications are running on a huge scale. In the final quarter of 2022, Android is considered as the market leader among other mobile operating systems, holding a market share of over 71.8 percent, which leads to the mass development of Android applications and also leads to a problem where some applications are developed by young developers without considering the security factor and are easily downloadable from Google Play Store and open source. Since Android is open source and allows developers to create applications without restriction, some inexperienced developers create numerous apps without being aware of the most recent Android security challenges. As a result, these apps have an open attack surface that hackers can use to steal user data. Installing such apps can put other secure apps and system in danger, and once a bad app is installed, it will have an impact on the entire system. The goal of this research is to identify vulnerabilities in Android applications and the techniques used to find and inspect vulnerabilities. Penetration testing identifies security flaws and aids in network security. This paper will help future authors to understand several elements of penetration testing, including tools, attack methodologies and defence strategies. More particularly, this study has performed reverse engineering by performing penetration tests using a private network, devices and tools. The results are then summarised and discussed. This study also described about the specific procedures and techniques used to carry out these attacks.\",\"PeriodicalId\":373017,\"journal\":{\"name\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSMDI57622.2023.00048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

现在每个人都在使用智能手机,大多数用户都是Android用户,因此Android应用程序正在大规模运行。在2022年最后一个季度,安卓被认为是其他移动操作系统的市场领导者,拥有超过71.8%的市场份额,这导致了安卓应用程序的大规模开发,也导致了一些应用程序由年轻开发者开发而不考虑安全因素,并且很容易从谷歌Play商店和开源下载的问题。由于Android是开源的,允许开发人员不受限制地创建应用程序,一些没有经验的开发人员创建了大量的应用程序,却没有意识到最新的Android安全挑战。因此,这些应用程序有一个开放的攻击面,黑客可以利用它来窃取用户数据。安装这样的应用程序会使其他安全的应用程序和系统处于危险之中,一旦安装了一个不好的应用程序,它将对整个系统产生影响。本研究的目的是识别Android应用程序中的漏洞,以及用于发现和检查漏洞的技术。渗透测试可以识别安全漏洞,并有助于网络安全。本文将帮助未来的作者理解渗透测试的几个要素,包括工具、攻击方法和防御策略。更具体地说,本研究通过使用专用网络、设备和工具进行渗透测试,进行了逆向工程。然后总结和讨论结果。本研究还描述了用于实施这些攻击的具体程序和技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security Analysis on Android Application Through Penetration Testing using Reverse Engineering
Every person is using smartphones these days, and most of the users are Android users, with this Android applications are running on a huge scale. In the final quarter of 2022, Android is considered as the market leader among other mobile operating systems, holding a market share of over 71.8 percent, which leads to the mass development of Android applications and also leads to a problem where some applications are developed by young developers without considering the security factor and are easily downloadable from Google Play Store and open source. Since Android is open source and allows developers to create applications without restriction, some inexperienced developers create numerous apps without being aware of the most recent Android security challenges. As a result, these apps have an open attack surface that hackers can use to steal user data. Installing such apps can put other secure apps and system in danger, and once a bad app is installed, it will have an impact on the entire system. The goal of this research is to identify vulnerabilities in Android applications and the techniques used to find and inspect vulnerabilities. Penetration testing identifies security flaws and aids in network security. This paper will help future authors to understand several elements of penetration testing, including tools, attack methodologies and defence strategies. More particularly, this study has performed reverse engineering by performing penetration tests using a private network, devices and tools. The results are then summarised and discussed. This study also described about the specific procedures and techniques used to carry out these attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信