An Empirical Study on Android-related Vulnerabilities

被引:46
|
作者
Linares-Vasquez, Mario [1 ]
Bavota, Gabriele [2 ]
Escobar-Velasquez, Camilo [1 ]
机构
[1] Univ Los Andes, Syst & Comp Engn Dept, Bogota, Colombia
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
来源
2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017) | 2017年
关键词
D O I
10.1109/MSR.2017.60
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket. For this and other reasons, mobile devices, and in particular the software that runs on them, are considered first-class citizens in the software-vulnerabilities landscape. Several studies investigated the software-vulnerabilities phenomenon in the context of mobile apps and, more in general, mobile devices. Most of these studies focused on vulnerabilities that could affect mobile apps, while just few investigated vulnerabilities affecting the underlying platform on which mobile apps run: the Operating System (OS). Also, these studies have been run on a very limited set of vulnerabilities. In this paper we present the largest study at date investigating Android-related vulnerabilities, with a specific focus on the ones affecting the Android OS. In particular, we (i) define a detailed taxonomy of the types of Android-related vulnerability; (ii) investigate the layers and subsystems from the Android OS affected by vulnerabilities; and (iii) study the survivability of vulnerabilities (i.e., the number of days between the vulnerability introduction and its fixing). Our findings could help OS and apps developers in focusing their verification & validation activities, and researchers in building vulnerability detection tools tailored for the mobile world.
引用
收藏
页码:2 / 13
页数:12
相关论文
共 50 条
  • [1] The Android OS stack and its vulnerabilities: an empirical study
    Alejandro Mazuera-Rozo
    Jairo Bautista-Mora
    Mario Linares-Vásquez
    Sandra Rueda
    Gabriele Bavota
    Empirical Software Engineering, 2019, 24 : 2056 - 2101
  • [2] The Android OS stack and its vulnerabilities: an empirical study
    Mazuera-Rozo, Alejandro
    Bautista-Mora, Jairo
    Linares-Vasquez, Mario
    Rueda, Sandra
    Bavota, Gabriele
    EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (04) : 2056 - 2101
  • [3] Revisiting the impact of common libraries for android-related investigations
    Li, Li
    Riom, Timothee
    Bissyande, Tegawende F.
    Wang, Haoyu
    Klein, Jacques
    Yves, Le Traon
    JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 154 : 157 - 175
  • [4] An empirical study of tactical vulnerabilities
    Santos, Joanna C. S.
    Tarrit, Katy
    Sejfia, Adriana
    Mirakhorli, Mehdi
    Galster, Matthias
    JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 149 : 263 - 284
  • [5] A Study of Android Security Vulnerabilities and Their Future Prospects
    Alsumayt, Albandari
    Elbeh, Heba
    Elkawkagy, Mohamed
    Alfawaer, Zeyad
    Alghamedy, Fatemah H.
    Alshammari, Majid
    Aljameel, Sumayh S.
    Albassam, Sarah
    Alghareeb, Shahad
    Alamoudi, Khadijah
    HighTech and Innovation Journal, 2024, 5 (03): : 854 - 869
  • [6] An Empirical Study of Vulnerabilities in Robotics
    Cottrell, Kaitlyn
    Bose, Dibyendu Brinto
    Shahriar, Hossain
    Rahman, Akond
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 735 - 744
  • [7] Profiling Android Vulnerabilities
    Jimenez, Matthieu
    Papadakis, Mike
    Bissyande, Tegawende F.
    Klein, Jacques
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016), 2016, : 222 - 229
  • [8] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [9] Taxonomy of Security-related Issues in Android Apps: An Empirical Study
    Das, Teerath
    Ali, Adam
    Mikkonen, Tommi
    PROCEEDINGS OF THE 2024 WORKSHOP ON REPLICATIONS AND NEGATIVE RESULTS, RENE 2024, 2024, : 8 - 14
  • [10] Android Smartphone Vulnerabilities : A Survey
    Joshi, Jignesh
    Parekh, Chandresh
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), 2016, : 27 - 31