论文标题

对不同供应商的Android安全公告的实证研究

An Empirical Study of Android Security Bulletins in Different Vendors

论文作者

Farhang, Sadegh, Kirdan, Mehmet Bahadir, Laszka, Aron, Grossklags, Jens

论文摘要

移动设备侵占了我们生活的几乎每个部分,包括工作和休闲,并包含大量的个人和敏感信息。因此,这些设备必须维护高安全标准。一个关键方面是基础操作系统的安全性。特别是,Android起着至关重要的作用,因为它是移动生态系统中最主要的平台,具有超过十亿个活动设备,并且由于其开放性,这使供应商可以采用和自定义。与其他平台类似,Android通过提供每月的安全补丁并通过Android Security Bulletin宣布来维护安全性。为了在整个Android生态系统中成功吸收这些信息,需要许多不同供应商的无可挑剔的协调。 在本文中,我们对3171个与Android相关的漏洞进行了全面研究,并研究了它们在Android Security Bulletin以及三个主要供应商的安全公告中反映了哪些程度:三星,LG和Huawei。在我们的分析中,我们专注于这些安全公告的元数据(例如时间,受影响的层,严重性和CWE数据),以更好地了解供应商之间的相似性和差异。我们发现(i)Android生态系统中研究的供应商采用了不同的结构来进行脆弱性报告,(ii)供应商不太可能随着Android GIT存储库参考的CVE延迟反应,(III)供应商处理Qualcomm的CVES与外部层CVE的其余部分不同。

Mobile devices encroach on almost every part of our lives, including work and leisure, and contain a wealth of personal and sensitive information. It is, therefore, imperative that these devices uphold high security standards. A key aspect is the security of the underlying operating system. In particular, Android plays a critical role due to being the most dominant platform in the mobile ecosystem with more than one billion active devices and due to its openness, which allows vendors to adopt and customize it. Similar to other platforms, Android maintains security by providing monthly security patches and announcing them via the Android security bulletin. To absorb this information successfully across the Android ecosystem, impeccable coordination by many different vendors is required. In this paper, we perform a comprehensive study of 3,171 Android-related vulnerabilities and study to which degree they are reflected in the Android security bulletin, as well as in the security bulletins of three leading vendors: Samsung, LG, and Huawei. In our analysis, we focus on the metadata of these security bulletins (e.g., timing, affected layers, severity, and CWE data) to better understand the similarities and differences among vendors. We find that (i) the studied vendors in the Android ecosystem have adopted different structures for vulnerability reporting, (ii) vendors are less likely to react with delay for CVEs with Android Git repository references, (iii) vendors handle Qualcomm-related CVEs differently from the rest of external layer CVEs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源