Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019
DOI: 10.1145/3321705.3329831
|View full text |Cite
|
Sign up to set email alerts
|

Towards Understanding Android System Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 43 publications
0
10
0
Order By: Relevance
“…There can be various ways to collect vulnerability data from project outsiders' perspectives. One is to leverage the CVE (Common Vulnerabilities and Exposures) or Bulletin (i.e., bug bounty) information in a way similar to some other vulnerability studies [35,56,65]. However, we found that there is very little CVE/Bulletin information about most blockchains because blockchain vulnerabilities are critical and often patched directly via the reports from bug bounty programs without releasing a CVE.…”
Section: Systematic Data Collectionmentioning
confidence: 88%
See 1 more Smart Citation
“…There can be various ways to collect vulnerability data from project outsiders' perspectives. One is to leverage the CVE (Common Vulnerabilities and Exposures) or Bulletin (i.e., bug bounty) information in a way similar to some other vulnerability studies [35,56,65]. However, we found that there is very little CVE/Bulletin information about most blockchains because blockchain vulnerabilities are critical and often patched directly via the reports from bug bounty programs without releasing a CVE.…”
Section: Systematic Data Collectionmentioning
confidence: 88%
“…As depicted in Figure 1, the first step and challenge of our study is to effectively collect vulnerable issues and their patches of those four blockchains. This is difficult because there is very little CVE information associated with blockchain projects (unlike other vulnerability mining studies [35,56,65]), and the large number (over 34K) of raw blockchain bugs in our crawled database makes manual vulnerability filtering 1 ineffective. To address this, we propose a vulnerability filtering framework based on the intuition that vulnerabilities have unique characteristics at different levels of bug attributes, and we can gradually identify candidate vulnerabilities by analyzing bug attributes from coarse-grained to fine-grained levels.…”
Section: Introductionmentioning
confidence: 99%
“…5, we try to uncover the root causes underneath those vulnerabilities. Among the nine vulnerabilities we discovered, three of them have previously known root causes, i.e., no protection of exported components in V1 [13,15], no checking of system APIs in V2 [26,27], and missed error handling in V4 [28]. For the rest of six vulnerabilities, we identify a new root cause that is dedicated to Android VoIP and not known before.…”
Section: A New Root Causementioning
confidence: 95%
“…Existing code defects or issues provide attackers an attack surface to launch their attacks. Research in the direction of malware analysis includes studying the different components of Android OS and an Android application [4]. The analysis encompasses the usage of features obtained statically or dynamically and then using state of art technologies, to name a few, machine learning algorithms, or deep learning [5].…”
Section: Introductionmentioning
confidence: 99%