{"title":"Android Vulnerabilities: Taxonomy and nextGen Ecosystem","authors":"P. Tiwari, T. Velayutham","doi":"10.1109/IBSSC47189.2019.8973083","DOIUrl":null,"url":null,"abstract":"Popularity and openness of Android platform has attracted developers and attackers to find the loopholes in the Android based systems for exploitation. Listed Android vulnerabilities are the result of the sincere efforts made by Android users to make the platform robust. In this paper, we try to find the reasons, which causes this vulnerabilities to occur and become exploitable. We characterize the vulnerabilities based on their attributes and map them with specific issues. We have utilized the National Vulnerability Database (NVD) and crawled the CVEs (Common Vulnerability Exposures) specific to Android, from 2008 to 2018. This database helped in deducing and implicating the taxonomy of the Android vulnerabilities. In the end, we also propose a next generation Android ecosystem to protect and deter from the vulnerabilities.","PeriodicalId":148941,"journal":{"name":"2019 IEEE Bombay Section Signature Conference (IBSSC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Bombay Section Signature Conference (IBSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBSSC47189.2019.8973083","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Popularity and openness of Android platform has attracted developers and attackers to find the loopholes in the Android based systems for exploitation. Listed Android vulnerabilities are the result of the sincere efforts made by Android users to make the platform robust. In this paper, we try to find the reasons, which causes this vulnerabilities to occur and become exploitable. We characterize the vulnerabilities based on their attributes and map them with specific issues. We have utilized the National Vulnerability Database (NVD) and crawled the CVEs (Common Vulnerability Exposures) specific to Android, from 2008 to 2018. This database helped in deducing and implicating the taxonomy of the Android vulnerabilities. In the end, we also propose a next generation Android ecosystem to protect and deter from the vulnerabilities.