An Empirical Study on Software Engineering in Mobile Applications and Future Research Directions

Authors

  • Balamurugan R Department of Computer Science, Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Coimbatore, India
  • Ravichandran M Department of Computer Science, Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Coimbatore, India

DOI:

https://doi.org/10.26438/ijcse/v7i1.680683

Keywords:

Mobile Application Software, Malware detection, Code Metric, Maintenance, Quality assurance

Abstract

Nowadays, mobile devices have reached its popularity in greater heights, specifically the usage of smart phones has extended its features in communication technology with rapid evolution. With regards to this, the developers are always passionate about providing the smart ways and approaches through the Mobile App for the common users so that they have smart lifestyle. To provide the smart apps which works on smart devices, the diversity is there in the usages of tools and technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most the needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today with different platforms and different market shares. Like all information systems, mobile systems are vulnerable to several issues. In this paper survey on software engineering paradigm in mobile applications are discussed by analyzing various existing approaches in the field of mobile software testing, mobile software quality assurance and mobile application security threats.

References

[1] D. Amalfitano, A. R. Fasolino, P. Tramontana, B. D. Ta and A. M. Memon, "MobiGUITAR: Automated Model-Based Testing of Mobile Apps," in IEEE Software, vol. 32, no. 5, pp. 53-59, Sept.-Oct. 2015.

[2] L. Uskov, "Mobile software engineering in mobile computing curriculum," 2013 3rd Interdisciplinary Engineering Design Education Conference, Santa Clara, CA, 2013, pp. 93-99.

[3] Kai Qian ; Yong Shi ; Lixin Tao ; Ying Qian, Hands-On Learning for Computer Network Security with Mobile Devices, 2017 26th International Conference on Computer Communication and Networks (ICCCN)

[4] X. Li, J. Liu, Y. Huo, R. Zhang, Y. Yao, `An Android malware detection method based on Android Manifest file`, International Conference on Cloud Computing and Intelligence Systems (CCIS), 2016, pp. 239-243.

[5] H. Fereidooni, M. Conti, D. Yao, A. Sperduti, `ANASTASIA: ANdroidmAlware detection using STaticanalySIs of Applications`, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016, pp. 1-5.

[6] N. B. Akhuseyinoglu, K. Akhuseyinoglu, `AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadata`, IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016, pp. 1-7

[7] Domenico Amalfitano, Anna Rita Fasolino, Portfirio Tramontana, “A GUI Crawling-based technique for Android mobile application Testing” – IEEE (2011)

[8] Pallavi Raut, Satyaveer Tomar, “Android Mobile Automation Framework” – IJECS (2014).

[9] Anuja Jain, Swarnalatha P, M R. Ghalib, S. Prabhu, “Web-Based Automation Testing Framework” – IJCA (2012)

[10] Asmau Usman, Noraini Ibrahim, Ibrahim Anka Salihu, Test Case Generation from Android Mobile Applications Focusing on Context Events, ICSCA 2018, 7th International Conference on Software and Computer Applications, pages 25-30, 2018

[11] Lianfa Li , Hareton Leung , Mining Static Code Metrics for a Robust Prediction of Software Defect-Proneness, International Symposium on Empirical Software Engineering and Measurement, Sept. 2011

[12] Claire Le Goues and Westley Weimer, Measuring Code Quality to Improve Specification Mining, IEEE Transactions on Software Engineering, Vol. 38, No. 1,2012.

[13] H.-S.Hamand M.-J.Choi, “Analysis of Android malware detection performance using machine learning classifiers,” in Proceedings of the 2013 International Conference on Information and Communication Technology Convergence, ICTC 2013, pp. 490– 495, October 2013.

[14] M. Z. Mas’ud, S. Sahib, M. F. Abdollah, S. R. Selamat, and R. Yusof, “Analysis of features selection andmachine learning classifier in android malware detection,” in Proceedings of the 5th International Conference on Information Science and Applications, ICISA ’14, pp. 1–5, IEEE, May 2014.

[15] K. O. Elish, X. Shu, D. D. Yao, B. G. Ryder, and X. Jiang, “Profiling user-trigger dependence for android malware detection,” Computers & Security, vol. 49, pp. 255–273, 2015.

[16] Z. Wang, C. Li, Z. Yuan, Y. Guan, and Y. Xue, “DroidChain: A novel Android malware detection method based on behavior chains,” Pervasive and Mobile Computing, vol. 32, pp. 3–14, 2016.

[17] Rahman, A., Pradhan, P., Partho, A., Williams, L.: Predicting Android application security and privacy risk with static code metrics. In: Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, pp. 149–153. IEEE Press (2017).

[18] Syer, M.D., Nagappan, M., Adams, B., Hassan, A.E.: Studying the relationship between source code quality and mobile platform dependence. Software Quality Journal, 23(3), 485–508 (2015)

[19] Belal Amro, Malware Detection Techniques for Mobile Devices, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.7, No.4/5/6, December 2017.

[20] Ana Rosario Espada, Marıa del Mar Gallardo, Alberto Salmeron, Pedro Merin, Using Model Checking to Generate Test Cases for Android Applications, Tenth Workshop on Model-Based Testing (MBT 2015, EPTCS 180, 2015, pp. 7–21, 2017 8th International Conference on Information Technology (ICIT), IEEE, 2017

[21] Ahmad A. Saifan, Areej Al-Rabadi, Evaluating Maintainability of Android Applications, 8th International Conference on Information Technology (ICIT), 2017

[22] Pardeep Kumar, Arora Rajesh Bhatia, Agent-Based Regression Test Case Generation using Class Diagram, Use cases and Activity Diagram, Procedia Computer Science, Volume 125, Pages 747-753, 2018.

[23] Tingting Yu , Wei Wen, Xue Han, Jane Huffman Hayes Member, ConPredictor: Concurrency Defect Prediction in Real-World Applications , IEEE Transactions on Software Engineering , 2018.

Downloads

Published

2019-01-31
CITATION
DOI: 10.26438/ijcse/v7i1.680683
Published: 2019-01-31

How to Cite

[1]
R. Balamurugan and M. Ravichandran, “An Empirical Study on Software Engineering in Mobile Applications and Future Research Directions”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 680–683, Jan. 2019.