ANN Modelling on Vulnerabilities Detection in Code Smells-Associated Android Applications

0Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

There has been a lot of software design concerns in recent years that come under the code smell. Android Applications Developments experiences more security issues related to code smells that lead to vulnerabilities in software. This research focuses on the vulnerability detection in Android applications which consists of code smells. A multi-layer perceptron-based ANN model is generated for detection of software vulnerabilities and has a precision value of 74.7% and 79.6% accuracy with 2 hidden layers. The focus is laid on 1390 Android classes and involves association mining of the software vulnerabilities with android code smells using APRIORI algorithm. The generated ANN model The findings represent that Member Ignoring Method (MIM) code smell shows an association with Bean Member Serialization (BMS) vulnerability having 86% confidence level and 0.48 support value. An algorithm has also been proposed that would help developers in detecting software vulnerability in the smelly source code of an android applications at early stages of development.

Cite

CITATION STYLE

APA

Gupta, A., Sharma, D., & Phulli, K. (2022). ANN Modelling on Vulnerabilities Detection in Code Smells-Associated Android Applications. Foundations of Computing and Decision Sciences, 47(1), 3–26. https://doi.org/10.2478/fcds-2022-0001

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free