**Conflict of interest**

The authors declare that there is no "conflict of interest" in regard to publishing this book chapter.

**57**

**Author details**

Iman Almomani1,2\* and Mamdouh Alenezi1

2 The University of Jordan, Amman, Jordan

provided the original work is properly cited.

\*Address all correspondence to: imomani@psu.edu.sa

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,

1 Prince Sultan University, Riyadh, KSA

*Android Application Security Scanning Process DOI: http://dx.doi.org/10.5772/intechopen.86661* *Android Application Security Scanning Process DOI: http://dx.doi.org/10.5772/intechopen.86661*

*Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies*

This chapter highlighted the booming of Android technologies and their applications which make them more attractive to security attackers. Recent statistics of Android malwares and their impact were presented. Additionally, this chapter has provided the main phases required to apply security scanning to Android applications. The purpose is to protect Android users and their devices from the threats of different security attacks. These phases include the way of downloading Android apps, decoding them to generate the source code, and how this code is screened to extract the required features to apply either static analysis or dynamic analysis or both. The feature extraction process resulted in constructing different datasets. Proper data analysis and data mining techniques could be applied to examine the app and classify it as benign or malware with high accuracy. The malware detection service could be implemented and provided in terms of a mobile application that will communicate the scanning results to the user in a friendly way. The chapter was concluded by presenting a statistical study that showed the most used tools and

datasets throughout the scanning process for the last 2 years 2017 and 2018.

We would like to acknowledge the Security Engineering Lab (sel.psu.edu.sa) team and Prince Sultan University for supporting this work. Special thanks go to

The authors declare that there is no "conflict of interest" in regard to publishing

**56**

**6. Conclusions**

*Dataset frequency in 2017–2018 research work.*

**Figure 7.**

**Acknowledgements**

**Conflict of interest**

this book chapter.

Ms. Samah Alsoghyer and Ms. Aala Khayer.
