Target Fragmentation in Android Apps

被引:23
|
作者
Mutchler, Patrick [1 ]
Safaei, Yeganeh [2 ]
Doupe, Adam [2 ]
Mitchell, John [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Arizona State Univ, Tempe, AZ 85287 USA
关键词
D O I
10.1109/SPW.2016.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93% of current apps target out-of-date platform versions and have a mean outdatedness of 686 days; 79% of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.
引用
收藏
页码:204 / 213
页数:10
相关论文
共 50 条
  • [41] Confidentiality for Android apps: Specification and verification
    Ereth, Sarah
    Lortz, Steffen
    Perner, Matthias
    [J]. IT-INFORMATION TECHNOLOGY, 2014, 56 (06): : 288 - 293
  • [42] Studying TLS Usage in Android Apps
    Razaghpanah, Abbas
    Niaki, Arian Akhavan
    Vallina-Rodriguez, Narseo
    Sundaresan, Srikanth
    Amann, Johanna
    Gill, Philippa
    [J]. PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 5 - 5
  • [43] Mutation operators for testing Android apps
    Deng, Lin
    Offutt, Jeff
    Ammann, Paul
    Mirzaei, Nariman
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2017, 81 : 154 - 168
  • [44] Mining Android Apps to Recommend Permissions
    Karim, Md Yasser
    Kagdi, Huzefa
    Di Penta, Massimiliano
    [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 427 - 437
  • [45] Analysis of Malicious Behavior of Android Apps
    Singh, Pooja
    Tiwari, Pankaj
    Singh, Santosh
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 215 - 220
  • [46] Effective Risk Communication for Android Apps
    Gates, Christopher S.
    Chen, Jing
    Li, Ninghui
    Proctor, Robert W.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (03) : 252 - 265
  • [47] Detecting Connectivity Issues in Android Apps
    Mazuera-Rozo, Alejandro
    Escobar-Velasquez, Camilo
    Espitia-Acero, Juan
    Linares-Vasquez, Mario
    Bavota, Gabriele
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 697 - 708
  • [48] FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS
    Chen, Wenhao
    Wang, Yangxiao
    Guan, Yong
    Newman, Jennifer
    Lin, Li
    Reinders, Stephanie
    [J]. ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 293 - 312
  • [49] Tackling Android Stego Apps in the Wild
    Chen, Wenhao
    Lin, Li
    Wu, Min
    Newman, Jennifer
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 1564 - 1573
  • [50] Automatic Maturity Rating for Android Apps
    Zhou, Chenyu
    Zhan, Xian
    Li, Linlin
    Liu, Yepang
    [J]. 13TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2022, 2022, : 16 - 27