The lifetime of Android API vulnerabilities : case study on the JavaScript-to-Java interface
Thomas, Daniel R. and Beresford, Alastair R. and Coudray, Thomas and Sutcliffe, Tom and Taylor, Adrian; (2015) The lifetime of Android API vulnerabilities : case study on the JavaScript-to-Java interface. In: Cambridge International Workshop on Security Protocols. LNCS . Springer, pp. 126-138. ISBN 9783319260969 (https://doi.org/10.1007/978-3-319-26096-9_13)
Preview |
Text.
Filename: Thomas_etal_SP2015_The_lifetime_Android_API_vulnerabilities_case_study_JavaScript_to_Java_interface.pdf
Accepted Author Manuscript Download (390kB)| Preview |
Abstract
We examine the lifetime of API vulnerabilities on Android and propose an exponential decay model of the uptake of updates after the release of a fix. We apply our model to a case study of the JavaScript-to-Java interface vulnerability. This vulnerability allows untrusted JavaScript in a WebView to break out of the JavaScript sandbox allowing remote code execution on Android phones, this can often then be further exploited to gain root access. While this vulnerability was first reported in 2012-12-21 we predict that the fix will not have been deployed to 95% of devices until 2018-01-10, 5.2 years after the release of the fix. We show how this vulnerability is exploitable in many apps and the role that ad-libraries have in making this flaw so widespread.
ORCID iDs
Thomas, Daniel R. ORCID: https://orcid.org/0000-0001-8936-0683, Beresford, Alastair R., Coudray, Thomas, Sutcliffe, Tom and Taylor, Adrian;-
-
Item type: Book Section ID code: 69650 Dates: DateEvent1 April 2015PublishedSubjects: Science > Mathematics > Computer software Department: Faculty of Science > Computer and Information Sciences Depositing user: Pure Administrator Date deposited: 05 Sep 2019 09:28 Last modified: 11 Nov 2024 15:18 URI: https://strathprints.strath.ac.uk/id/eprint/69650