Fuzzing for Android Application: Systematic Literature Review

Journal: GRENZE International Journal of Engineering and Technology
Authors: Akash Labade, Hemant Ambulgekar
Volume: 6 Issue: 2
Grenze ID: 01.GIJET.6.2.1 Pages: 14-24

Abstract

Android application markets are making a crucial shift in the manner software which was delivered to the end-users. Android applications face increasingly more security threats. The fuzzing technique can be used to uncover the security threats of applications. Fuzzing can be summarized similarly to the way toward sending irregular or invalid information as a contribution to a framework, to crash the framework and uncovering conceivable security vulnerabilities. Various research has been published in the android application fuzzing domain, while not many researches have addressed the security vulnerabilities in an android application by using external (another device used for operations) fuzzing techniques. However, current research doesn't address the android application fuzzing using an internal tool (or itself android device). The significance of the area, this paper seeks after two targets: to give a complete systematic literature review (SLR) of android application fuzzing, requirement’s for android application fuzzing. This paper reviewed previous research study in android application fuzzing, also methods dependent on necessities in Kitchenham’s systematic literature review guidelines. The systematic literature review result has shown the following deficiencies: Internal tool is not considered for fuzzing android application; and studies that are lacking in terms of requirement types. Furthermore, we proposed strong future directions of fuzzing for android application using internal tool. In particular, revealing threats of android applications by fuzzing techniques enables developers to build more secure applications and increases the mutual trust of its users.

Download Now << BACK

GIJET