The lifetime of android API vulnerabilities: Case study on the JavaScript-to-Java interface

16Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We examine the lifetime of API vulnerabilities on Android and propose an exponential decay model of the uptake of updates after the release of a fix. We apply our model to a case study of the JavaScript-to-Java interface vulnerability. This vulnerability allows untrusted JavaScript in a WebView to break out of the JavaScript sandbox allowing remote code execution on Android phones; this can often then be further exploited to gain root access. While this vulnerability was first publicly disclosed in December 2012, we predict that the fix will not have been deployed to 95% of devices until December 2017, 5.17 years after the release of the fix. We show how this vulnerability is exploitable in many apps and the role that ad-libraries have in making this flaw so widespread.

Cite

CITATION STYLE

APA

Thomas, D. R., Beresford, A. R., Coudray, T., Sutcliffe, T., & Taylor, A. (2015). The lifetime of android API vulnerabilities: Case study on the JavaScript-to-Java interface. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9379, pp. 126–138). Springer Verlag. https://doi.org/10.1007/978-3-319-26096-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free