Incorporating Android Code Smells into Java Static Code Metrics for Security Risk Prediction of Android Applications

Ai Gong,Yi Zhong,Weiqin Zou,Yangyang Shi,Chunrong Fang
DOI: https://doi.org/10.1109/qrs51102.2020.00017
2020-01-01
Abstract:With the wide-spread use of Android applications in people’s daily life, it becomes more and more important to timely identify the security problems of these applications. To enrich existing studies in guarding the security and privacy of Android applications, we attempted to predict the security risk levels of Android applications. Specifically, we proposed an approach that incorporated Android code smells into traditional Java code metrics to predict how secure an Android application is. With an evaluation of our technique on 3,680 Android applications, we found that: (1) Android code smells could help improve the performance of security risk prediction of Android applications; (2) By building a Random Forest model based on Android code smells and Java code metrics, we could achieve an Area Under Curve (AUC) of 0.97; (3) Android code smells such as member ignoring method (MIM) and leaking inner class (LIC) have a relatively-large influence on Android security risk prediction, to which developers should pay more attention during their application development.
What problem does this paper attempt to address?