Security Smells in Android

06/01/2020
by   Mohammad Ghafari, et al.
0

The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and privacy mechanisms, vulnerabilities continue to proliferate. Research has shown that many vulnerabilities are due to insecure programming practices. However, each study has often dealt with a specific issue, making the results less actionable for practitioners. To promote secure programming practices, we have reviewed related research, and identified avoidable vulnerabilities in Android-run devices and the "security code smells" that indicate their presence. In particular, we explain the vulnerabilities, their corresponding smells, and we discuss how they could be eliminated or mitigated during development. Moreover, we develop a lightweight static analysis tool and discuss the extent to which it successfully detects several vulnerabilities in about 46,000 apps hosted by the official Android market.

READ FULL TEXT

page 6

page 7

page 8

research
11/30/2018

Security Code Smells in Android ICC

Android Inter-Component Communication (ICC) is complex, largely unconstr...
research
11/08/2020

An Approach for the Identification of Information Leakage in Automotive Infotainment systems

The advancements in the digitization world has revolutionized the automo...
research
06/27/2020

XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices

Kubernetes is an open-source software for automating management of compu...
research
04/12/2022

ASVAAN: Semi-automatic side-channel analysis of Android NDK

Android is the most popular operating systems for smartphones and is als...
research
10/03/2019

Comments on a recently proposed Privacy Preserving Lightweight Biometric Authentication System for IoT Security

In this paper, we show that a recently published lightweight adaptation ...
research
08/27/2019

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode

To defeat security threats such as man-in-the-middle (MITM) attacks, Blu...
research
04/14/2022

Making Markets for Information Security: The Role of Online Platforms in Bug Bounty Programs

Security is an essential cornerstone of functioning digital marketplaces...

Please sign up or login with your details

Forgot password? Click here to reset