An Empirical Study on Android-related Vulnerabilities

被引:46
|
作者
Linares-Vasquez, Mario [1 ]
Bavota, Gabriele [2 ]
Escobar-Velasquez, Camilo [1 ]
机构
[1] Univ Los Andes, Syst & Comp Engn Dept, Bogota, Colombia
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
来源
2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017) | 2017年
关键词
D O I
10.1109/MSR.2017.60
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket. For this and other reasons, mobile devices, and in particular the software that runs on them, are considered first-class citizens in the software-vulnerabilities landscape. Several studies investigated the software-vulnerabilities phenomenon in the context of mobile apps and, more in general, mobile devices. Most of these studies focused on vulnerabilities that could affect mobile apps, while just few investigated vulnerabilities affecting the underlying platform on which mobile apps run: the Operating System (OS). Also, these studies have been run on a very limited set of vulnerabilities. In this paper we present the largest study at date investigating Android-related vulnerabilities, with a specific focus on the ones affecting the Android OS. In particular, we (i) define a detailed taxonomy of the types of Android-related vulnerability; (ii) investigate the layers and subsystems from the Android OS affected by vulnerabilities; and (iii) study the survivability of vulnerabilities (i.e., the number of days between the vulnerability introduction and its fixing). Our findings could help OS and apps developers in focusing their verification & validation activities, and researchers in building vulnerability detection tools tailored for the mobile world.
引用
收藏
页码:2 / 13
页数:12
相关论文
共 50 条
  • [41] Android application vulnerabilities static mining technology
    Tang J.
    Liu J.
    Li R.
    Li W.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 44 : 20 - 24
  • [42] Unveiling the Security Vulnerabilities in Android Operating System
    Renjith, G.
    Aji, S.
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 89 - 100
  • [43] Bifocals: Analyzing WebView Vulnerabilities in Android Applications
    Chin, Erika
    Wagner, David
    INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 138 - 159
  • [44] A Survey of Vulnerabilities Mining Based on Android System
    Wang, Xiao-xi
    Wu, Xian-da
    Zhang, Xiao-min
    Li, Hao
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, MACHINERY AND MATERIALS (IIMM 2015), 2015, : 355 - 359
  • [45] Vulnerabilities in Android webview objects: Still not the end!
    El-Zawawy, Mohamed A.
    Losiouk, Eleonora
    Conti, Mauro
    COMPUTERS & SECURITY, 2021, 109
  • [46] An Empirical Study of Docker Vulnerabilities and of Static Code Analysis Applicability
    Duarte, Ana
    Antunes, Nuno
    2018 EIGHTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2018, : 27 - 36
  • [47] An Empirical Study of High-Risk Vulnerabilities in IoT Systems
    Chen, Xiang
    Yang, Changlin
    Nan, Yuhong
    Zheng, Zibin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1590 - 1601
  • [48] An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
    Yi, Xiao
    Wu, Daoyuan
    Jiang, Lingxiao
    Fang, Yuzhou
    Zhang, Kehuan
    Zhang, Wei
    PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 709 - 721
  • [49] Software systems at risk: An empirical study of cloned vulnerabilities in practice
    Kim, Seulbae
    Lee, Heejo
    COMPUTERS & SECURITY, 2018, 77 : 720 - 736