Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code
 
conference paper

Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code

Almanee, Sumaya
•
Unal, Arda
•
Payer, Mathias  
Show more
January 1, 2021
2021 Ieee/Acm 43Rd International Conference On Software Engineering: Companion Proceedings (Icse-Companion 2021)
IEEE/ACM 43rd International Conference on Software Engineering (ICSE)

Android apps include third-party native libraries to increase performance and to reuse functionality. Native code is directly executed from apps through the Java Native Interface or the Android Native Development Kit. Android developers add precompiled native libraries to their projects, enabling their use. Unfortunately, developers often struggle or simply neglect to update these libraries in a timely manner. This results in the continuous use of outdated native libraries with unpatched security vulnerabilities years after patches became available. To further understand such phenomena, we study the security updates in native libraries in the most popular 200 free apps on Google Play from Sept. 2013 to May 2020. A core difficulty we face in this study is the identification of libraries and their versions. Developers often rename or modify libraries, making their identification challenging. We create an approach called LibRARIAN (LibRAry veRsion IdentificAtioN) that accurately identifies native libraries and their versions as found in Android apps based on our novel similarity metric bin(2)sim. LibRARIAN leverages different features extracted from libraries based on their metadata and identifying strings in read-only sections. We discovered 53/200 popular apps (26.5%) with vulnerable versions with known CVEs between Sept. 2013 and May 2020, with 14 of those apps remaining vulnerable. We find that app developers took, on average, 528.71 +/- 40.20 days to apply security patches, while library developers release a security patch after 54.59 +/- 8.12 days-a 10 times slower rate of update.To further understand such phenomena, we study the security updates in native libraries in the most popular 200 free apps on Google Play from Sept. 2013 to May 2020. A core difficulty we face in this study is the identification of libraries and their versions. Developers often rename or modify libraries, making their identification challenging. We create an approach called LibRARIAN (LibRAry veRsion IdentificAtioN) that accurately identifies native libraries and their versions as found in Android apps based on our novel similarity metric bin(2)sim. LibRARIAN leverages different features extracted from libraries based on their metadata and identifying strings in read-only sections. We discovered 53/200 popular apps (26.5%) with vulnerable versions with known CVEs between Sept. 2013 and May 2020, with 14 of those apps remaining vulnerable. We find that app developers took, on average, 528.71 +/- 40.20 days to apply security patches, while library developers release a security patch after 54.59 +/- 8.12 days-a 10 times slower rate of update.

  • Details
  • Metrics
Type
conference paper
DOI
10.1109/ICSE43902.2021.00122
Web of Science ID

WOS:000684601800109

Author(s)
Almanee, Sumaya
Unal, Arda
Payer, Mathias  
Garcia, Joshua
Date Issued

2021-01-01

Publisher

IEEE COMPUTER SOC

Publisher place

Los Alamitos

Published in
2021 Ieee/Acm 43Rd International Conference On Software Engineering: Companion Proceedings (Icse-Companion 2021)
ISBN of the book

978-0-738113-19-7

Series title/Series vol.

Proceedings of the IEEE-ACM International Conference on Software Engineering Companion

Start page

1347

End page

1359

Subjects

Computer Science, Software Engineering

•

Computer Science, Theory & Methods

•

Computer Science

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent placeEvent date
IEEE/ACM 43rd International Conference on Software Engineering (ICSE)

ELECTR NETWORK

May 25-28, 2021

Available on Infoscience
September 25, 2021
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/181655
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés