Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code

被引:18
作者
Almanee, Sumaya [1 ]
Unal, Arda [1 ]
Payer, Mathias [2 ]
Garcia, Joshua [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92717 USA
[2] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
来源
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021) | 2021年
基金
美国国家科学基金会; 欧盟地平线“2020”; 欧洲研究理事会;
关键词
D O I
10.1109/ICSE43902.2021.00122
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Android apps include third-party native libraries to increase performance and to reuse functionality. Native code is directly executed from apps through the Java Native Interface or the Android Native Development Kit. Android developers add precompiled native libraries to their projects, enabling their use. Unfortunately, developers often stniggle or simply neglect to update these libraries in a timely manner. This results in the continuous use of outdated native libraries with unpatched security vulnerabilities years after patches became available. To further understand such phenomena, we study the security updates in native libraries in the most popular 200 free apps on Google Play from Sept. 2013 to May 2020. A core difficulty we face in this study is the identification of libraries and their versions. Developers often rename or modify libraries, making their identification challenging. We create an approach called LibRARIAN (LibRAry veRsion IdentificAtioN) that accurately identifies native libraries and their versions as found in Android apps based on our novel similarity metric bin(2)sim. LibRARIAN leverages different features extracted from libraries based on their metadata and identifying strings in read-only sections. We discovered 53/200 popular apps (26.5%) with vulnerable versions with known CVEs between Sept. 2013 and May 2020, with 14 of those apps remaining vulnerable. We find that app developers took, on average, 528.71 +/- 40.20 days to apply security patches, while library developers release a security patch after 54.59 +/- 8.12 days-a 10 times slower rate of update.
引用
收藏
页码:1347 / 1359
页数:13
相关论文
共 32 条
[1]   DroidNative: Automating and optimizing detection of Android native code malware variants [J].
Alam, Shahid ;
Qu, Zhengyang ;
Riley, Ryan ;
Chen, Yan ;
Rastogi, Vaibhav .
COMPUTERS & SECURITY, 2017, 65 :230-246
[2]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[3]  
[Anonymous], 2017, 2017 International Conference of Electrical and Electronic Technologies for Automotive, DOI DOI 10.23919/EETA.2017.7993206
[4]   Exploring the Security Awareness of the Python']Python and Java']JavaScript Open Source Communities [J].
Antal, Gabor ;
Keleti, Marton ;
Hegedus, Peter .
2020 IEEE/ACM 17TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2020, :16-20
[5]   Reliable Third-Party Library Detection in Android and its Security Applications [J].
Backes, Michael ;
Bugiel, Sven ;
Derr, Erik .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :356-367
[6]  
Book T., 2013, ARXIV PREPRINT ARXIV
[7]   Open Source Vulnerability Notification [J].
Carlson, Brandon ;
Leach, Kevin ;
Marinov, Darko ;
Nagappan, Meiyappan ;
Prakash, Atul .
OPEN SOURCE SYSTEMS, OSS 2019, 2019, 556 :12-23
[8]   On the impact of security vulnerabilities in the npm package dependency network [J].
Decan, Alexandre ;
Mens, Tom ;
Constantinou, Eleni .
2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, :181-191
[9]   Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [J].
Derr, Erik ;
Bugiel, Sven ;
Fahl, Sascha ;
Acar, Yasemin ;
Backes, Michael .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2187-2200
[10]   Identifying Open-Source License Violation and 1-day Security Risk at Large Scale [J].
Duan, Ruian ;
Bijlani, Ashish ;
Xu, Meng ;
Kim, Taesoo ;
Lee, Wenke .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2169-2185