2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) 2017
DOI: 10.1109/msr.2017.23
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Origins of Mobile App Vulnerabilities: A Large-Scale Measurement Study of Free and Paid Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
24
2
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 15 publications
1
24
2
1
Order By: Relevance
“…Therefore more focus should be given on the analysis of libraries and market maintainers could draw policies rejecting apps using non-vetted libraries. Moreover, the claim made in [71] that more code and libraries imply more vulnerabilities may not be always true.…”
Section: Vulnerability Introduction Vehiclecontrasting
(Expert classified)
See 3 more Smart Citations
“…Therefore more focus should be given on the analysis of libraries and market maintainers could draw policies rejecting apps using non-vetted libraries. Moreover, the claim made in [71] that more code and libraries imply more vulnerabilities may not be always true.…”
Section: Vulnerability Introduction Vehiclecontrasting
(Expert classified)
“…In addition to new findings, this large scale study also confirms most of the conclusions from previous studies with relatively small datasets. However, the result of this study also suggests that the recent claim made by Watanabe et al [71] that more code and libraries imply more vulnerabilities may not be always true. Finally, 3 valuable artifacts produced by this study: 1) app lineages, 2) the complete dataset of vulnerability scanning reports, 3) recorded vulnerable pieces of code, are shared.…”
Section: Resultscontrasting
confidence: 41%
See 2 more Smart Citations
“…Issue: Many third-party libraries are unsafe by design i.e., introduce vulnerabilities and compromise user data [37]. Consequently, the ramification of adopting such libraries could be manifold.…”
Section: • Untrustworthy Librariesmentioning
confidence: 99%