Skip to main content
Log in

Research on Credible Demand Analysis Method Based on Risk Driven Mobile Application Software

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the rapid development of mobile Internet, its content and applications are becoming more and more abundant, and android system occupies an important share of the mobile application software market. Due to Android’s own openness, more and more malicious software and imitative software have appeared, and users are also facing more and more risks in operating the software. Therefore, the credibility of the mobile application becomes a pivotal measure of its quality . Credible demand analysis analysis is one of the key steps in the process of software construction. This paper presents a credible demand analysis method driven based on risk driven.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Mawston, N. (2016). Strategy analytics. Android shipped 1 billion smartphones worldwide in 2016. http://www.strategyanalytics.com/default.aspx?mod=reportabstractviewer&a0=10539.

  2. China Mobile Internet Survey Report 2013–2014 [OL][2015-05-01]. http://www.cnnic.cn/hlwfzyj/hlwxzbg/ydhlwbg/201408/t20140826_47880.htm.

  3. Yuelin, C. (2016). Research and application of reliability test of mobile application based on behavior declaration. Beijing University of Technology, 2016.

  4. Arzt, S., Rasthofer, S., Fritz, C., et al. (2014). Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices, 49(6), 259–269.

    Article  Google Scholar 

  5. Gao, C. (2014). The research and application of credibility measurement model based on software behavior. Beijing university of technology, 2014.

  6. Lenzini, G., & Tokmakoff, A. (2007). Managing trustworthiness in component based embedded systems. Electronic Notes in Theoretical Computer Science, 179, 143–155.

    Article  Google Scholar 

  7. Chen, Y. (2005). Research on requirements prioritization management of trustworthy software product. In The 2nd international conference on e-business and e-government (EI:20112914160478), 2011,5.

  8. Li, W., Dai, Y.-X., & Lian, Y.-F. (2009). Context sensitive host-based IDS using hybrid automaton. Journal of Software, 20, 138–151.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Dan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, X., Feng, D. Research on Credible Demand Analysis Method Based on Risk Driven Mobile Application Software. Wireless Pers Commun 103, 785–796 (2018). https://doi.org/10.1007/s11277-018-5477-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5477-z

Keywords

Navigation