Total views : 1255

Finding Bugs in Android Application using Genetic Algorithm and Apriori Algorithm


  • Computer Science and Engineering Department, Chandigarh University, Mohali - 140413, Punjab, India


Android is the leading operating system that is currently being used in the smart phones. In this approach apriori algorithm and genetic algorithm is used to find the bugs in the application which will be eventually be helpful for developer in order to resolve those errors and make application more efficient. It is believed that this study is unique in its own kind and it enhances the security of Android app in its development phase only.


Android Operating System, Apriori Algorithm, Android Applications, Bugs, Genetic Algorithm, Google Application Store.

Full Text:

 |  (PDF views: 909)


  • Max L. Managing smart phone security risks. Information Security Curriculum Development Conference. ACM; 2010.
  • David T, Sørensen C, Lyytinen K. Change and control paradoxes in mobile infrastructure innovation: The android and iOS mobile operating systems cases. 45th Hawaii International Conference on System Science (HICSS); Maui, HI. 2012. p. 1324–33.
  • Hoang TD, et al. A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing. 2013; 13(18):1587–611.
  • Jerry G, et al. Mobile application testing: A tutorial. Computer. 2014; 47(2):46–55.
  • Pau G, et al. Developing mobile workflow support in the internet of things. IEEE Pervasive Computing. 2010; 9(2):18–26.
  • Apple announces new trade up with installments 24. MacRumors. Available from:
  • Nicolai K, et al. Secure mobile business information processing. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC); Hong Kong. 2010. p. 672–8.
  • Matthias L, et al. L4 android: A generic operating system framework for secure smartphones. Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices ACM; NY, USA. 2011. p. 39–50.
  • Marcel S, et al. Towards a trusted mobile desktop. Trust and trustworthy computing. Springer Berlin Heidelberg; 2010. p. 78–94.
  • Nicolas S, Ciordia I. Bugzilla, ITracker, and other bug trackers. IEEE Software. 2005; 22(2):11–3.
  • Mengtao S, Tan G. Native guard: Protecting android applications from third-party native libraries. Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks; NY, USA. 2014. p. 165–76.
  • Eeshan S, Tilevich E. Reverse-engineering user interfaces to facilitate porting to and across mobile devices and platforms. Proceedings of the compilation of the co-located workshops on DSM’11, TMC’11, AGERE! 2011, AOOPES’11, NEAT’11, and VMIL’11 ACM; NY, USA. 2011. p. 255–60.
  • Syed A, Kumar A. Android application analysis using reverse engineering techniques and taint-aware slicing. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT; 2014.
  • Sudipta G, Tandan SR, Lahre K. Shielding android application against reverse engineering. International Journal of Engineering Research and Technology. ESRSA Publications. 2013 Jun; 2(6):1–9.
  • Sébastien S, Zafimiharisoa SR. APSET, an android application security testing tool for detecting intent-based vulnerabilities. International Journal on Software Tools for Technology Transfer. 2015; 17(2):201–21.
  • Junfeng X, Li S, Zhang T. Security analysis and protection based on smali injection for android applications. Algorithms and Architectures for Parallel Processing. Springer International Publishing. 2014; 8630:577–86.
  • Ji-Soo O, Park MW, Chung TM. Enhancing security of the android platform via multi-level security model. Applications and Techniques in Information Security. Springer Berlin Heidelberg; 2014. p. 13–24.
  • Zhongwen Z, et al. Once root always a threat: Analyzing the security threats of android permission system. Information Security and Privacy. Springer International Publishing; 2014.
  • Hamid B, et al. Detection of design flaws in the android permission protocol through bounded verification. FM: Formal Methods. Springer International Publishing; 2015. p. 73–89.
  • Chanhee L, et al. Unified security enhancement framework for the Android operating system. The Journal of Supercomputing. 2014; 67(3):738–56.
  • Garima B, et al. Unintentional bugs to vulnerability mapping in Android applications. IEEE International Conference on Intelligence and Security Informatics (ISI); MD. 2015. p. 176–8.
  • Bernhard JB, Bunke M, Sohr K. An android security case study with bauhaus. 18th Working Conference on Reverse Engineering (WCRE); Limerick. 2011. p. 179–83.
  • Aleksandrina K. Efficient code obfuscation for android. Advances in Information Technology. Springer International Publishing; 2013. p. 104–19.
  • Mario LV. Supporting evolution and maintenance of android apps. Companion Proceedings of the 36th International Conference on Software Engineering ACM; VA, USA, 2014, p. 1–4.
  • Yepang L, Xu C, Cheung SC. Characterizing and detecting performance bugs for smartphone applications. ACM Proceedings of the 36th International Conference on Software Engineering; New York. 2014. p. 1013–24.
  • Faisal N, et al. Uncovering self code modification in android. Codes, Cryptology, and Information Security. Springer International Publishing; 2015. p. 297–313.
  • How people build software. GitHub. Available from:
  • Lawrence D. Handbook of genetic algorithms; 1991.
  • Xindong W, et al. Top 10 algorithms in data mining. Knowledge and information systems. 2008; 14(1):1.
  • William E, et al. A study of android application security. USENIX Security Symposium. 2011; p. 21.
  • Chris H. Android essentials. A Press; 2008.
  • Jeff F. Java for android; 2010.
  • Joshua JD, et al. Android hacker’s handbook. John Wiley and Sons; 2014.
  • Anders G. Efficient android threading: Asynchronous processing techniques for android applications. O’Reilly Media Inc; 2014.
  • Frank AW, et al. Android in action; 2011.
  • Khan F, Mallika R. Analysis of various types of bugs in the object oriented javascript language coding. Indian Journal of Science and Technology. 2015 Sep; 8(21). DOI: 10.17485/ijst/2015/v8i21/699581.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.