Fuzzing for Android Application: Systematic
Literature Review
Journal:
GRENZE International Journal of Engineering and Technology
Authors:
Akash Labade, Hemant Ambulgekar
Volume:
6
Issue:
2
Grenze ID:
01.GIJET.6.2.1
Pages:
14-24
Abstract
Android application markets are making a crucial shift in the manner software
which was delivered to the end-users. Android applications face increasingly more security
threats. The fuzzing technique can be used to uncover the security threats of applications.
Fuzzing can be summarized similarly to the way toward sending irregular or invalid
information as a contribution to a framework, to crash the framework and uncovering
conceivable security vulnerabilities. Various research has been published in the android
application fuzzing domain, while not many researches have addressed the security
vulnerabilities in an android application by using external (another device used for
operations) fuzzing techniques. However, current research doesn't address the android
application fuzzing using an internal tool (or itself android device). The significance of the
area, this paper seeks after two targets: to give a complete systematic literature review
(SLR) of android application fuzzing, requirement’s for android application fuzzing. This
paper reviewed previous research study in android application fuzzing, also methods
dependent on necessities in Kitchenham’s systematic literature review guidelines. The
systematic literature review result has shown the following deficiencies: Internal tool is not
considered for fuzzing android application; and studies that are lacking in terms of
requirement types. Furthermore, we proposed strong future directions of fuzzing for
android application using internal tool. In particular, revealing threats of android
applications by fuzzing techniques enables developers to build more secure applications and
increases the mutual trust of its users.