Article (Périodiques scientifiques)
Understanding the Evolution of Android App Vulnerabilities
GAO, Jun; li, li; BISSYANDE, Tegawendé François D Assise et al.
2020In IEEE Transactions on Reliability
Peer reviewed vérifié par ORBi
 

Documents


Texte intégral
article.pdf
Preprint Auteur (1.8 MB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Android; vulnerability; Evolution
Résumé :
[en] The Android ecosystem today is a growing universe of a few billion devices, hundreds of millions of users and millions of applications targeting a wide range of activities where sensitive information is collected and processed. Security of communication and privacy of data are thus of utmost importance in application development. Yet, regularly, there are reports of successful attacks targeting Android users. While some of those attacks exploit vulnerabilities in the Android OS, others directly concern application-level code written by a large pool of developers with varying experience. Recently, a number of studies have investigated this phenomenon, focusing however only on a specific vulnerability type appearing in apps, and based on only a snapshot of the situation at a given time. Thus, the community is still lacking comprehensive studies exploring how vulnerabilities have evolved over time, and how they evolve in a single app across developer updates. Our work fills this gap by leveraging a data stream of 5 million app packages to re-construct versioned lineages of Android apps and finally obtained 28;564 app lineages (i.e., successive releases of the same Android apps) with more than 10 app versions each, corresponding to a total of 465;037 apks. Based on these app lineages, we apply state-of- the-art vulnerability-finding tools and investigate systematically the reports produced by each tool. In particular, we study which types of vulnerabilities are found, how they are introduced in the app code, where they are located, and whether they foreshadow malware. We provide insights based on the quantitative data as reported by the tools, but we further discuss the potential false positives. Our findings and study artifacts constitute a tangible knowledge to the community. It could be leveraged by developers to focus verification tasks, and by researchers to drive vulnerability discovery and repair research efforts.
Centre de recherche :
University of Luxembourg: Interdisciplinary Centre for Security, Reliability and Trust
Disciplines :
Sciences informatiques
Auteur, co-auteur :
GAO, Jun ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
li, li;  Monash University > Faculty of Information Technology
BISSYANDE, Tegawendé François D Assise  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
KLEIN, Jacques  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Understanding the Evolution of Android App Vulnerabilities
Date de publication/diffusion :
2020
Titre du périodique :
IEEE Transactions on Reliability
eISSN :
0018-9529
Maison d'édition :
Institute of Electrical and Electronics Engineers, Etats-Unis
Peer reviewed :
Peer reviewed vérifié par ORBi
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR10621687 - Security And Privacy For System Protection, 2015 (01/01/2017-30/06/2023) - Sjouke Mauw
Disponible sur ORBilu :
depuis le 12 janvier 2020

Statistiques


Nombre de vues
400 (dont 28 Unilu)
Nombre de téléchargements
1154 (dont 15 Unilu)

citations Scopus®
 
36
citations Scopus®
sans auto-citations
32
citations OpenAlex
 
56
citations WoS
 
39

Bibliographie


Publications similaires



Contacter ORBilu