Australian Information Security Management Conference 2018
DOI: 10.25958/5c5274d466691
|View full text |Cite
|
Sign up to set email alerts
|

Security vulnerabilities in android applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…To each detected vulnerability a severity score (e.g., Critical in Listing 1) and a type (e.g., Runtime Command Checking in Listing 1) is assigned. It is worth noticing that we only collected vulnerabilities which are marked as Critical, Warning, or Notice by AndroBugs, as vulnerabilities with a Info categorization indicate that the specific issue was not found on the specific apk [59]. Some of the potential security weaknesses that the AndroBugs static analyzer is able to detect are related to: (i) SSL connections, implementation and certificate validation, (ii) WebView-and Fragment-related vulnerabilities, (iii) implicit intents, (iv) data storage, (v) KeyStore protection, (vi) Android Manifest settings, and (vii) entry points for command injection.…”
Section: Context Selection and Dataset Constructionmentioning
confidence: 99%
“…To each detected vulnerability a severity score (e.g., Critical in Listing 1) and a type (e.g., Runtime Command Checking in Listing 1) is assigned. It is worth noticing that we only collected vulnerabilities which are marked as Critical, Warning, or Notice by AndroBugs, as vulnerabilities with a Info categorization indicate that the specific issue was not found on the specific apk [59]. Some of the potential security weaknesses that the AndroBugs static analyzer is able to detect are related to: (i) SSL connections, implementation and certificate validation, (ii) WebView-and Fragment-related vulnerabilities, (iii) implicit intents, (iv) data storage, (v) KeyStore protection, (vi) Android Manifest settings, and (vii) entry points for command injection.…”
Section: Context Selection and Dataset Constructionmentioning
confidence: 99%