Detection of SQLite database vulnerabilities in android apps

3Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we conduct a thorough study to analyze SQLite databases in android apps. These databases are inherently private and reside in the internal memory of an android device (restricting the access to users and other apps). Considering the SQLite database safe from external access i.e. users or other apps, developers pay less attention towards their security settings. This exposes them to vulnerabilities which may be utilized by attackers or malware writers to launch attacks such as stealing of data, tampering, etc. This paper reveals two such vulnerabilities detected in SQLite databases of android apps - storing sensitive data in plain-text and synchronization. This paper attempts to expose vulnerabilities of SQLite databases in android apps through demonstrating attacks. To evaluate the ubiquity of these vulnerabilities, we conducted the analysis of 18 popular android apps belonging to various categories by modeling the SQLite database of these apps. This study also contributes to the enhancement of future app development process by providing an insight to the developers regarding the deployment of better security settings. After a detailed assessment of risks involved in using databases, we also propose preliminary mitigation strategies.

Cite

CITATION STYLE

APA

Jain, V., Gaur, M. S., Laxmi, V., & Mosbah, M. (2016). Detection of SQLite database vulnerabilities in android apps. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10063 LNCS, pp. 521–531). Springer Verlag. https://doi.org/10.1007/978-3-319-49806-5_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free