SlideShare a Scribd company logo
1 of 32
Exposed! On the Vulnerability-
proneness of Google Play apps.
Andrea Sebastiano
Di Sorbo Panichella
https://spanichella.github.io/
https://www.unisannio.it/en/user/9355
ESEC/FSE - Journal First Presentation
14-18, November 2022, Singapore
OUTLINE
CONTEXT: User perception of risks when
installing mobile apps
RESEARCH DESIGN: data collection,
information extraction, and tools used
FINDINGS: Interesting stuff
CONCLUSIONS are drawn
CONTEXT
Are users aware of the risks?
Perception
Reality
PAST WORK
Factors affecting app
success
Vulnerabilities in mobile
apps
PAST WORK
Factors affecting app
success
Vulnerabilities in mobile
apps
“Fault- and change-prone APIs can
hinder the success of mobile apps”.
“High-rated apps have larger sizes, more
complex code, more requirements on
users, more marketing efforts, more
dependence on libraries, and adopt higher
quality Android APIs”.
“Roughly 70% of free apps and roughly
50% of paid apps with vulnerabilities
were vulnerable due to libraries”.
“For most vulnerability types, third-
party code (including common
libraries) represents the main carrier of
app vulnerabilities”.
“User feedback reporting bugs are negatively correlated with the
rating, while reviews reporting feature requests do not”.
RESEARCH GOALS
‘‘Vulnerability-proneness: the number of different types of
known security issues exhibited by the app’’
• Assess the vulnerability-
proneness levels of mobile
apps
• Evaluate the extent to which
users can perceive
vulnerability-proneness
• RQ1: Which are the different vulnerabilities
exhibited by Google market apps (belonging to
different app categories)?
• RQ2: Does the vulnerability-proneness of
Google market apps affect app success?
• RQ3: Is it possible to predict the level of
vulnerability-proneness of an app by using the
app’s contextual information?
GOALS RQs
DATASET
• About 1,000 apps spanning
23 different Play Store’s
categories
• For each category we have
both low- and high-rated
apps
• We only considered apps
having a reliable number of
user votes
DATA COLLECTION AND TOOLSET
AndroBugs
Framework
DATA COLLECTION AND TOOLSET
AndroBugs
Framework
Selenium
WebDriver
Google Play
DATA COLLECTION AND TOOLSET
R scripts Weka Framework
AndroBugs
Framework
Selenium
WebDriver
Google Play
ANDROBUGS
vulnerability type
severity
• State-of-the-art
vulnerability
scanner
• Static analysis of
apk files (without
executing them)
• Successfully used
to find
vulnerabilities in
popular Android
apps, such as
Facebook, eBay,
Twitter, etc.
https://github.com/AndroBugs/AndroBugs_Framework
EXAMPLES OF VULNERABILITIES
Vulns that may cause
MITM attacks
Vulns that may cause
injection attacks
Vulns that may allow
access to sensitive data
App (Market) Contextual Information
?
?
RQ1: Which are the different vulnerabilities exhibited by Google
market apps (belonging to different app categories)?
Approach:
Compare the vulnerability-proneness of apps
belonging to different app categories
(statistical analysis + qualitative analysis)
Categories adjusted p-value Cliff's d
Medical - Communication 0.0074 -0.5143
Medical - Entertainment 0.0011 -0.5283
Medical - Food & Drink 0.0023 -0.6402
Medical - News & Magazines 0.0026 -0.5859
Medical - Social 0.0081 -0.5201
RQ1: Which are the different vulnerabilities exhibited by Google
market apps (belonging to different app categories)?
• Medical apps exhibit less security
flaws than other categories
• Finance and Shopping apps exhibit
vulnerability-proneness levels
similar to other categories
Categories adjusted p-value Cliff's d
Medical - Communication 0.0074 -0.5143
Medical - Entertainment 0.0011 -0.5283
Medical - Food & Drink 0.0023 -0.6402
Medical - News & Magazines 0.0026 -0.5859
Medical - Social 0.0081 -0.5201
RQ1: Which are the different vulnerabilities exhibited by Google
market apps (belonging to different app categories)?
Vulnerability Communication Entertainment Food Medical News Social
<SSL_Security> SSL Connection Checking 100.00% 97.17% 100.00% 84.85% 100.00% 96.72%
<WebView><Remote Code
Execution><#CVE-2013-4710#> WebView
RCE Vulnerability Checking
73.13% 86.79% 81.25% 36.36% 86.67% 73.77%
<Implicit_Intent> Implicit Service Checking 52.24% 49.06% 46.88% 15.15% 35.56% 54.10%
App Sandbox Permission Checking 17.91% 27.36% 37.50% 24.24% 31.11% 27.87%
<SSL_Security> SSL Certificate Verification
Checking
16.42% 18.87% 21.88% 6.06% 40.00% 14.75%
<KeyStore><Hacker> KeyStore Protection
Checking
13.43% 9.43% 31.25% 9.09% 35.56% 19.67%
<Command> Runtime Command Checking 34.33% 13.21% 21.88% 12.12% 31.11% 9.84%
<#BID 64208 CVE-2013-6271#> Fragment
Vulnerability Checking
22.39% 11.32% 12.50% 3.03% 13.33% 8.20%
AndroidManifest ContentProvider Exported
Checking
19.40% 16.98% 18.75% 9.09% 24.44% 14.75%
<SSL_Security> SSL Implementation Checking
(Verifying Host Name in Custom Classes)
11.94% 17.92% 9.38% 12.12% 28.89% 21.31%
<SSL_Security> SSL Implementation
Checking (Verifying Host Name in Fields)
5.97% 8.49% 12.50% 9.09% 26.67% 11.48%
RQ1: Which are the different vulnerabilities exhibited by Google
market apps (belonging to different app categories)?
RQ2: Does the vulnerability-proneness
of Google market apps affect app success?
App
success
Average rating
Downloads
Compare apps with different
levels of success
No relations between vulnerability-proneness and app
rating are observed
RQ2: Does the vulnerability-proneness
of Google market apps affect app success?
RQ2: Does the vulnerability-proneness
of Google market apps affect app success?
No relations between vulnerability-proneness and
app rating are observed
Apps with higher number of downloads tend to
exhibit higher levels of vulnerability-proneness
(statistically significant)
RQ2: Does the vulnerability-proneness
of Google market apps affect app success?
Apps having a lower average rating tend to have a higher
vulnerability-proneness density
Apps with higher number of downloads tend to exhibit
higher levels of vulnerability-proneness (statistically
significant)
Vulnerability-proneness density:
“we divided the number of vulnerability warnings
signaled by AndroBugs by the number of classes”
RQ2: Does the vulnerability-proneness
of Google market apps affect app success?
Apps having a lower average rating tend to have a higher
vulnerability-proneness density
Apps with higher number of downloads tend to exhibit
higher levels of vulnerability-proneness (statistically
significant)
Vulnerability-proneness density:
“we divided the number of vulnerability warnings
signaled by AndroBugs by the number of classes”
Perception
Reality
User could be not aware of the risks that they take when installing an app..
RQ3: Is it possible to predict the level of vulnerability-proneness of
an app by using the app’s contextual information?
App market
metrics
Textual features
(app description)
Static analysis
features
(number of libs,
classes, interfaces,
etc.)
Algorithm Precision Recall F-Measure
J48 0.691 0.687 0.686
Random Forest 0.760 0.751 0.751
Naive Bayes 0.660 0.657 0.652
Experiment 5 (app market features + static analysis)
Algorithm Precision Recall F-Measure
J48 0.664 0.665 0.664
Random Forest 0.723 0.720 0.719
Naive Bayes 0.592 0.590 0.590
Experiment 4 (app market features + text features + static analysis)
Algorithm Precision Recall F-Measure
J48 0.671 0.667 0.666
Random Forest 0.730 0.728 0.728
Naive Bayes 0.647 0.647 0.645
Experiment 2 (app market features)
Algorithm Precision Recall F-Measure
J48 0.619 0.620 0.619
Random Forest 0.660 0.660 0.658
Naive Bayes 0.581 0.577 0.576
Experiment 1 (app market features + text features)
Considering only app market info Considering also static analysis info
Random Forest outperforms the other ML algorithms
(low vs. high)
RQ3: Is it possible to predict the level of vulnerability-proneness of
an app by using the app’s contextual information?
Algorithm Precision Recall F-Measure
J48 0.691 0.687 0.686
Random Forest 0.760 0.751 0.751
Naive Bayes 0.660 0.657 0.652
Experiment 5 (app market features + static analysis)
Algorithm Precision Recall F-Measure
J48 0.671 0.667 0.666
Random Forest 0.730 0.728 0.728
Naive Bayes 0.647 0.647 0.645
Experiment 2 (app market features)
Algorithm Precision Recall F-Measure
J48 0.664 0.665 0.664
Random Forest 0.723 0.720 0.719
Naive Bayes 0.592 0.590 0.590
Experiment 4 (app market features + text features + static analysis)
Algorithm Precision Recall F-Measure
J48 0.619 0.620 0.619
Random Forest 0.660 0.660 0.658
Naive Bayes 0.581 0.577 0.576
Experiment 1 (app market features + text features)
Considering only app market info Considering also static analysis info
Textual features introduce noise affecting the classification performance
(low vs. high)
RQ3: Is it possible to predict the level of vulnerability-proneness of
an app by using the app’s contextual information?
Considering only static analysis info Considering also app market info
App market metrics provide complementary information
to the one related to code.
Algorithm Precision Recall F-Measure
J48 0.691 0.687 0.686
Random Forest 0.760 0.751 0.751
Naive Bayes 0.660 0.657 0.652
Experiment 5 (app market features + static analysis)
Algorithm Precision Recall F-Measure
J48 0.726 0.712 0.709
Random Forest 0.716 0.714 0.714
Naive Bayes 0.660 0.652 0.643
Experiment 3 (static analysis features)
(low vs. high)
RQ3: Is it possible to predict the level of vulnerability-proneness of
an app by using the app’s contextual information?
CONCLUSIONS
• RQ1: Which are the different vulnerabilities exhibited by Google market
apps (belonging to different app categories)?
Almost all apps have known security defects
Apps belonging to the Medical category exhibit less security flaws
than apps in the other categories
CONCLUSIONS
• RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to
different app categories)?
• Almost all apps have known security defects
• Apps belonging to the Medical category exhibit less security flaws than apps in the
other categories
• RQ2: Does the vulnerability-proneness of Google market apps
affect app success?
- Vulnerability-proneness levels are not reflected in app
ratings
- Vulnerability-proneness density levels are reflected in
app ratings
Popular apps tend to exhibit higher levels of
vulnerability-proneness
CONCLUSIONS
• RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to
different app categories)?
• Almost all apps have known security defects
• Apps belonging to the Medical category exhibit less security flaws than apps in the
other categories
• RQ2: Does the vulnerability-proneness of Google market apps affect app success?
• Vulnerability-proneness levels are not reflected in app ratings
• Popular apps tend to exhibit higher levels of vulnerability-proneness
• RQ3: Is it possible to predict the level of vulnerability-
proneness of an app by using the app’s contextual
information?
App market information is useful to predict the
vulnerability-proneness level of an app in about 3 out of
4 cases
App market information could be used in addition to
static analysis features to improve the prediction results
FUTURE WORK
• Surveying app users
• to better understand how they deal with privacy and security concerns
• and, to further validate our results
• Improve the prediction results
• Extract additional features from the app store (e.g., interactive
elements, developer’s information, last update, compatible devices,
etc.)
• Extract additional static analysis features (e.g., quality metrics,
intents, etc.)
• Investigate features weighting
• Investigate the possibility to predict specific type of security defects in other
domains
Exposed! On the Vulnerability-
proneness of Google Play apps.
Andrea Sebastiano
Di Sorbo Panichella
https://spanichella.github.io/
https://www.unisannio.it/en/user/9355
ESEC/FSE - Journal First Presentation
14-18, November 2022, Singapore
https://link.springer.com/article/10.1007/s10664-021-09978-0
Thanks for the Attention!

More Related Content

Similar to Exposed! Vulnerability-proneness of Google Play Apps

MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
 
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdfTop Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdfElanusTechnologies
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionhearme limited company
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
 
Attacking Proprietary Android Vendor Customizations
Attacking Proprietary Android Vendor CustomizationsAttacking Proprietary Android Vendor Customizations
Attacking Proprietary Android Vendor CustomizationsRoberto Natella
 
Thorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiaThorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiacharan Teja
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиSergey Ulankin
 
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...Chakkrit (Kla) Tantithamthavorn
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Semi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsSemi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsRam G Athreya
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionhearme limited company
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...csandit
 
iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...
iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...
iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...Concordia University
 
What are the Characteristics of High-rated Apps
What are the Characteristics of High-rated AppsWhat are the Characteristics of High-rated Apps
What are the Characteristics of High-rated AppsSAIL_QU
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSIJNSA Journal
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system forIJNSA Journal
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 

Similar to Exposed! Vulnerability-proneness of Google Play Apps (20)

MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdfTop Mobile Application Penetration Testing Tools for Android and iOS.pdf
Top Mobile Application Penetration Testing Tools for Android and iOS.pdf
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solution
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
Attacking Proprietary Android Vendor Customizations
Attacking Proprietary Android Vendor CustomizationsAttacking Proprietary Android Vendor Customizations
Attacking Proprietary Android Vendor Customizations
 
Thorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiaThorsignia - Custom software development services in india
Thorsignia - Custom software development services in india
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
 
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
Explainable Artificial Intelligence (XAI) 
to Predict and Explain Future Soft...
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Semi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsSemi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applications
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solution
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
 
iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...
iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...
iPerfDetector: Characterizing and Detecting Performance Anti-patterns in iOS ...
 
What are the Characteristics of High-rated Apps
What are the Characteristics of High-rated AppsWhat are the Characteristics of High-rated Apps
What are the Characteristics of High-rated Apps
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 

More from Sebastiano Panichella

The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...
Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...
Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...Sebastiano Panichella
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSebastiano Panichella
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
COSMOS: DevOps for Complex Cyber-physical Systems
COSMOS: DevOps for Complex Cyber-physical SystemsCOSMOS: DevOps for Complex Cyber-physical Systems
COSMOS: DevOps for Complex Cyber-physical SystemsSebastiano Panichella
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Sebastiano Panichella
 
An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...
An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...
An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...Sebastiano Panichella
 
Automated Identification and Qualitative Characterization of Safety Concerns ...
Automated Identification and Qualitative Characterization of Safety Concerns ...Automated Identification and Qualitative Characterization of Safety Concerns ...
Automated Identification and Qualitative Characterization of Safety Concerns ...Sebastiano Panichella
 
The 2nd Intl. Workshop on NL-based Software Engineering
The 2nd Intl. Workshop on NL-based Software EngineeringThe 2nd Intl. Workshop on NL-based Software Engineering
The 2nd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
The 16th Intl. Workshop on Search-Based and Fuzz Testing
The 16th Intl. Workshop on Search-Based and Fuzz TestingThe 16th Intl. Workshop on Search-Based and Fuzz Testing
The 16th Intl. Workshop on Search-Based and Fuzz TestingSebastiano Panichella
 
Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...
Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...
Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...Sebastiano Panichella
 
Search-based Software Testing (SBST) '22
Search-based Software Testing (SBST) '22Search-based Software Testing (SBST) '22
Search-based Software Testing (SBST) '22Sebastiano Panichella
 
NL-based Software Engineering (NLBSE) '22
NL-based Software Engineering (NLBSE) '22NL-based Software Engineering (NLBSE) '22
NL-based Software Engineering (NLBSE) '22Sebastiano Panichella
 
"An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.
 "An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.  "An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.
"An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021. Sebastiano Panichella
 
An Empirical Investigation of Relevant Changes and Automation Needs in Modern...
An Empirical Investigation of Relevant Changes and Automation Needs in Modern...An Empirical Investigation of Relevant Changes and Automation Needs in Modern...
An Empirical Investigation of Relevant Changes and Automation Needs in Modern...Sebastiano Panichella
 
Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...
Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...
Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...Sebastiano Panichella
 
A Framework for Multi-source Studies based on Unstructured Data.
A Framework for Multi-source Studies based on Unstructured Data.A Framework for Multi-source Studies based on Unstructured Data.
A Framework for Multi-source Studies based on Unstructured Data.Sebastiano Panichella
 

More from Sebastiano Panichella (20)

The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...
Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...
Diversity-guided Search Exploration for Self-driving Cars Test Generation thr...
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
COSMOS: DevOps for Complex Cyber-physical Systems
COSMOS: DevOps for Complex Cyber-physical SystemsCOSMOS: DevOps for Complex Cyber-physical Systems
COSMOS: DevOps for Complex Cyber-physical Systems
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
 
An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...
An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...
An Empirical Characterization of Software Bugs in Open-Source Cyber-Physical ...
 
Automated Identification and Qualitative Characterization of Safety Concerns ...
Automated Identification and Qualitative Characterization of Safety Concerns ...Automated Identification and Qualitative Characterization of Safety Concerns ...
Automated Identification and Qualitative Characterization of Safety Concerns ...
 
The 2nd Intl. Workshop on NL-based Software Engineering
The 2nd Intl. Workshop on NL-based Software EngineeringThe 2nd Intl. Workshop on NL-based Software Engineering
The 2nd Intl. Workshop on NL-based Software Engineering
 
The 16th Intl. Workshop on Search-Based and Fuzz Testing
The 16th Intl. Workshop on Search-Based and Fuzz TestingThe 16th Intl. Workshop on Search-Based and Fuzz Testing
The 16th Intl. Workshop on Search-Based and Fuzz Testing
 
Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...
Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...
Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Nei...
 
Search-based Software Testing (SBST) '22
Search-based Software Testing (SBST) '22Search-based Software Testing (SBST) '22
Search-based Software Testing (SBST) '22
 
NL-based Software Engineering (NLBSE) '22
NL-based Software Engineering (NLBSE) '22NL-based Software Engineering (NLBSE) '22
NL-based Software Engineering (NLBSE) '22
 
NLBSE’22: Tool Competition
NLBSE’22: Tool CompetitionNLBSE’22: Tool Competition
NLBSE’22: Tool Competition
 
"An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.
 "An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.  "An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.
"An NLP-based Tool for Software Artifacts Analysis" at @ICSME2021.
 
An Empirical Investigation of Relevant Changes and Automation Needs in Modern...
An Empirical Investigation of Relevant Changes and Automation Needs in Modern...An Empirical Investigation of Relevant Changes and Automation Needs in Modern...
An Empirical Investigation of Relevant Changes and Automation Needs in Modern...
 
Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...
Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...
Search-Based Software Testing Tool Competition 2021 by Sebastiano Panichella,...
 
A Framework for Multi-source Studies based on Unstructured Data.
A Framework for Multi-source Studies based on Unstructured Data.A Framework for Multi-source Studies based on Unstructured Data.
A Framework for Multi-source Studies based on Unstructured Data.
 

Recently uploaded

CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 

Recently uploaded (20)

CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 

Exposed! Vulnerability-proneness of Google Play Apps

  • 1. Exposed! On the Vulnerability- proneness of Google Play apps. Andrea Sebastiano Di Sorbo Panichella https://spanichella.github.io/ https://www.unisannio.it/en/user/9355 ESEC/FSE - Journal First Presentation 14-18, November 2022, Singapore
  • 2. OUTLINE CONTEXT: User perception of risks when installing mobile apps RESEARCH DESIGN: data collection, information extraction, and tools used FINDINGS: Interesting stuff CONCLUSIONS are drawn
  • 3. CONTEXT Are users aware of the risks? Perception Reality
  • 4. PAST WORK Factors affecting app success Vulnerabilities in mobile apps
  • 5. PAST WORK Factors affecting app success Vulnerabilities in mobile apps “Fault- and change-prone APIs can hinder the success of mobile apps”. “High-rated apps have larger sizes, more complex code, more requirements on users, more marketing efforts, more dependence on libraries, and adopt higher quality Android APIs”. “Roughly 70% of free apps and roughly 50% of paid apps with vulnerabilities were vulnerable due to libraries”. “For most vulnerability types, third- party code (including common libraries) represents the main carrier of app vulnerabilities”. “User feedback reporting bugs are negatively correlated with the rating, while reviews reporting feature requests do not”.
  • 6. RESEARCH GOALS ‘‘Vulnerability-proneness: the number of different types of known security issues exhibited by the app’’ • Assess the vulnerability- proneness levels of mobile apps • Evaluate the extent to which users can perceive vulnerability-proneness • RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)? • RQ2: Does the vulnerability-proneness of Google market apps affect app success? • RQ3: Is it possible to predict the level of vulnerability-proneness of an app by using the app’s contextual information? GOALS RQs
  • 7. DATASET • About 1,000 apps spanning 23 different Play Store’s categories • For each category we have both low- and high-rated apps • We only considered apps having a reliable number of user votes
  • 8. DATA COLLECTION AND TOOLSET AndroBugs Framework
  • 9. DATA COLLECTION AND TOOLSET AndroBugs Framework Selenium WebDriver Google Play
  • 10. DATA COLLECTION AND TOOLSET R scripts Weka Framework AndroBugs Framework Selenium WebDriver Google Play
  • 11. ANDROBUGS vulnerability type severity • State-of-the-art vulnerability scanner • Static analysis of apk files (without executing them) • Successfully used to find vulnerabilities in popular Android apps, such as Facebook, eBay, Twitter, etc. https://github.com/AndroBugs/AndroBugs_Framework
  • 12. EXAMPLES OF VULNERABILITIES Vulns that may cause MITM attacks Vulns that may cause injection attacks Vulns that may allow access to sensitive data
  • 13. App (Market) Contextual Information ? ?
  • 14.
  • 15. RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)? Approach: Compare the vulnerability-proneness of apps belonging to different app categories (statistical analysis + qualitative analysis)
  • 16. Categories adjusted p-value Cliff's d Medical - Communication 0.0074 -0.5143 Medical - Entertainment 0.0011 -0.5283 Medical - Food & Drink 0.0023 -0.6402 Medical - News & Magazines 0.0026 -0.5859 Medical - Social 0.0081 -0.5201 RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)?
  • 17. • Medical apps exhibit less security flaws than other categories • Finance and Shopping apps exhibit vulnerability-proneness levels similar to other categories Categories adjusted p-value Cliff's d Medical - Communication 0.0074 -0.5143 Medical - Entertainment 0.0011 -0.5283 Medical - Food & Drink 0.0023 -0.6402 Medical - News & Magazines 0.0026 -0.5859 Medical - Social 0.0081 -0.5201 RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)?
  • 18. Vulnerability Communication Entertainment Food Medical News Social <SSL_Security> SSL Connection Checking 100.00% 97.17% 100.00% 84.85% 100.00% 96.72% <WebView><Remote Code Execution><#CVE-2013-4710#> WebView RCE Vulnerability Checking 73.13% 86.79% 81.25% 36.36% 86.67% 73.77% <Implicit_Intent> Implicit Service Checking 52.24% 49.06% 46.88% 15.15% 35.56% 54.10% App Sandbox Permission Checking 17.91% 27.36% 37.50% 24.24% 31.11% 27.87% <SSL_Security> SSL Certificate Verification Checking 16.42% 18.87% 21.88% 6.06% 40.00% 14.75% <KeyStore><Hacker> KeyStore Protection Checking 13.43% 9.43% 31.25% 9.09% 35.56% 19.67% <Command> Runtime Command Checking 34.33% 13.21% 21.88% 12.12% 31.11% 9.84% <#BID 64208 CVE-2013-6271#> Fragment Vulnerability Checking 22.39% 11.32% 12.50% 3.03% 13.33% 8.20% AndroidManifest ContentProvider Exported Checking 19.40% 16.98% 18.75% 9.09% 24.44% 14.75% <SSL_Security> SSL Implementation Checking (Verifying Host Name in Custom Classes) 11.94% 17.92% 9.38% 12.12% 28.89% 21.31% <SSL_Security> SSL Implementation Checking (Verifying Host Name in Fields) 5.97% 8.49% 12.50% 9.09% 26.67% 11.48% RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)?
  • 19. RQ2: Does the vulnerability-proneness of Google market apps affect app success? App success Average rating Downloads Compare apps with different levels of success
  • 20. No relations between vulnerability-proneness and app rating are observed RQ2: Does the vulnerability-proneness of Google market apps affect app success?
  • 21. RQ2: Does the vulnerability-proneness of Google market apps affect app success? No relations between vulnerability-proneness and app rating are observed Apps with higher number of downloads tend to exhibit higher levels of vulnerability-proneness (statistically significant)
  • 22. RQ2: Does the vulnerability-proneness of Google market apps affect app success? Apps having a lower average rating tend to have a higher vulnerability-proneness density Apps with higher number of downloads tend to exhibit higher levels of vulnerability-proneness (statistically significant) Vulnerability-proneness density: “we divided the number of vulnerability warnings signaled by AndroBugs by the number of classes”
  • 23. RQ2: Does the vulnerability-proneness of Google market apps affect app success? Apps having a lower average rating tend to have a higher vulnerability-proneness density Apps with higher number of downloads tend to exhibit higher levels of vulnerability-proneness (statistically significant) Vulnerability-proneness density: “we divided the number of vulnerability warnings signaled by AndroBugs by the number of classes” Perception Reality User could be not aware of the risks that they take when installing an app..
  • 24. RQ3: Is it possible to predict the level of vulnerability-proneness of an app by using the app’s contextual information? App market metrics Textual features (app description) Static analysis features (number of libs, classes, interfaces, etc.)
  • 25. Algorithm Precision Recall F-Measure J48 0.691 0.687 0.686 Random Forest 0.760 0.751 0.751 Naive Bayes 0.660 0.657 0.652 Experiment 5 (app market features + static analysis) Algorithm Precision Recall F-Measure J48 0.664 0.665 0.664 Random Forest 0.723 0.720 0.719 Naive Bayes 0.592 0.590 0.590 Experiment 4 (app market features + text features + static analysis) Algorithm Precision Recall F-Measure J48 0.671 0.667 0.666 Random Forest 0.730 0.728 0.728 Naive Bayes 0.647 0.647 0.645 Experiment 2 (app market features) Algorithm Precision Recall F-Measure J48 0.619 0.620 0.619 Random Forest 0.660 0.660 0.658 Naive Bayes 0.581 0.577 0.576 Experiment 1 (app market features + text features) Considering only app market info Considering also static analysis info Random Forest outperforms the other ML algorithms (low vs. high) RQ3: Is it possible to predict the level of vulnerability-proneness of an app by using the app’s contextual information?
  • 26. Algorithm Precision Recall F-Measure J48 0.691 0.687 0.686 Random Forest 0.760 0.751 0.751 Naive Bayes 0.660 0.657 0.652 Experiment 5 (app market features + static analysis) Algorithm Precision Recall F-Measure J48 0.671 0.667 0.666 Random Forest 0.730 0.728 0.728 Naive Bayes 0.647 0.647 0.645 Experiment 2 (app market features) Algorithm Precision Recall F-Measure J48 0.664 0.665 0.664 Random Forest 0.723 0.720 0.719 Naive Bayes 0.592 0.590 0.590 Experiment 4 (app market features + text features + static analysis) Algorithm Precision Recall F-Measure J48 0.619 0.620 0.619 Random Forest 0.660 0.660 0.658 Naive Bayes 0.581 0.577 0.576 Experiment 1 (app market features + text features) Considering only app market info Considering also static analysis info Textual features introduce noise affecting the classification performance (low vs. high) RQ3: Is it possible to predict the level of vulnerability-proneness of an app by using the app’s contextual information?
  • 27. Considering only static analysis info Considering also app market info App market metrics provide complementary information to the one related to code. Algorithm Precision Recall F-Measure J48 0.691 0.687 0.686 Random Forest 0.760 0.751 0.751 Naive Bayes 0.660 0.657 0.652 Experiment 5 (app market features + static analysis) Algorithm Precision Recall F-Measure J48 0.726 0.712 0.709 Random Forest 0.716 0.714 0.714 Naive Bayes 0.660 0.652 0.643 Experiment 3 (static analysis features) (low vs. high) RQ3: Is it possible to predict the level of vulnerability-proneness of an app by using the app’s contextual information?
  • 28. CONCLUSIONS • RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)? Almost all apps have known security defects Apps belonging to the Medical category exhibit less security flaws than apps in the other categories
  • 29. CONCLUSIONS • RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)? • Almost all apps have known security defects • Apps belonging to the Medical category exhibit less security flaws than apps in the other categories • RQ2: Does the vulnerability-proneness of Google market apps affect app success? - Vulnerability-proneness levels are not reflected in app ratings - Vulnerability-proneness density levels are reflected in app ratings Popular apps tend to exhibit higher levels of vulnerability-proneness
  • 30. CONCLUSIONS • RQ1: Which are the different vulnerabilities exhibited by Google market apps (belonging to different app categories)? • Almost all apps have known security defects • Apps belonging to the Medical category exhibit less security flaws than apps in the other categories • RQ2: Does the vulnerability-proneness of Google market apps affect app success? • Vulnerability-proneness levels are not reflected in app ratings • Popular apps tend to exhibit higher levels of vulnerability-proneness • RQ3: Is it possible to predict the level of vulnerability- proneness of an app by using the app’s contextual information? App market information is useful to predict the vulnerability-proneness level of an app in about 3 out of 4 cases App market information could be used in addition to static analysis features to improve the prediction results
  • 31. FUTURE WORK • Surveying app users • to better understand how they deal with privacy and security concerns • and, to further validate our results • Improve the prediction results • Extract additional features from the app store (e.g., interactive elements, developer’s information, last update, compatible devices, etc.) • Extract additional static analysis features (e.g., quality metrics, intents, etc.) • Investigate features weighting • Investigate the possibility to predict specific type of security defects in other domains
  • 32. Exposed! On the Vulnerability- proneness of Google Play apps. Andrea Sebastiano Di Sorbo Panichella https://spanichella.github.io/ https://www.unisannio.it/en/user/9355 ESEC/FSE - Journal First Presentation 14-18, November 2022, Singapore https://link.springer.com/article/10.1007/s10664-021-09978-0 Thanks for the Attention!

Editor's Notes

  1. In particular, in this presentation, I will first introduce the CONTEXT of this study and the related literature. Afterwards, I will state the goal the research questions, and the analysis done. The achieved results and the answers to our research questions are then used for drawing the conclusions outlining future research directions.
  2. Mobile applications are used for several everyday life activities, such as shopping, banking, social communications, and so on. However, users share a lot of sensitive data to use these apps and recent research demonstrated that the majority of mobile applications present critical security defects. In this study we try to better understand if and the extent to which app users could perceive these security risks and if these security risks can undermine the success of mobile apps
  3. Previous studies have explored some of the factors influencing the app success, as well as mobile app vulnerabilities have been investigated from many research perspectives.
  4. In particular, previous work observed that the app success is related to the adoption of higher numbers of libraries, but libraries also represent the main carriers of app vulnerabilities.
  5. In our work, we define the vulnerability-proneness of an app as the number of the different types of security issues that the app exhibits. The underlying hypothesis is that a higher vulnerability-proneness may increase the probability of being attacked, as a wider attack surface is offered. Thus, we (i) investigate the vulnerability-proneness of mobile apps belonging to different categories. (ii) evaluate if users can perceive the risks of installing vulnerable apps (iii) explore the extent to which the app-related information provided by the store can be used to predict the vulnerability-proneness levels of apps.
  6. To carry out the study we extracted data from about one thousand apps spanning 23 different Play Store categories. Note that for each category we have both low and high-rated apps.
  7. For extracting information related to vulnerabilities, all the collected apks, have been inspected through AndroBugs a state-of-the-art vulnerability scanner. In the next slides, I will also discuss the vulnerabilities that this tool is able to detect.
  8. In addition, we also extracted metadata related to the app from the Google play store using ad-hoc scripts and browser automation capabilities.
  9. Once all the data were collected, we analyzed them through statistical tools, and these data were used for training machine learning algorithms enabling the prediction of vulnerability-proneness levels of apps.
  10. In the slide you can see an example of report provided by Androbugs, which marks each identified vulnerability with a type and a severity level. Androbugs is fast and accurate and can statically analyze apk files (without executing them). It was successfully used to find vulnerabilities in many popular Android apps, such as Facebook and Twitter.
  11. As highlighted in the slide, Androbugs can statically detect a lot of different types of vulnerabilities: such as (i) vulnerabilities that could be exploited for performing man-in-the-middle attacks, (ii) vulnerabilities that could be exploited for code injection, or (iii) vulnerabilities that may allow access to sensitive data.
  12. We also extracted contextual information related to the apps and provided by the app store. Some of these data, as the ones related to the Permission, Monetization and Richness of functionalities aspects can be easily associated with security and privacy issues, while we argue that the ones related to Behavior and Success aspects need further investigation.
  13. And now I will present the preliminary results we obtained to answer our research question. For each research question I will briefly discuss the analysis done and the findings.
  14. For answering RQ1 we compared the vulnerability-proneness of apps belonging to different app categories through non-parametric statistical tools (as we deal with distribution that are not normal). To corroborate the quantitative results we also more-in depth investigate the specific types of vulnerabilities detected in apps of different categories.
  15. As evidenced in the slide, we can observe that in terms of vulnerability-proneness apps in the Medical category differ from apps in other categories, with statistical evidence and large effect-size.
  16. The good news is that we can affirm that Medical apps (that usually handle very sensitive information) tend to exhibit less security flaws than all the other considered categories. The bad news is that we cannot say the same thing about for example Finance and Shopping apps in which we usually share bank account details.
  17. A confirmation of these results is given by the table in the slide, in which we can see that apps belonging to Medical category are more rarely affected by most of the recurrent vulnerability types.
  18. To answer RQ2, as in previous work, we use two different proxy metrics for estimating app success: average rating and number of downloads. Thus, we compared the vulnerability-proneness of apps belonging to different rating and download groups.
  19. As quite expected, no relations could be observed between the app rating and app vulnerability-proneness.
  20. While a counterintuitive result is observed for what concerning the number of downloads. Apps with higher number of downloads tend to exhibit higher levels of vulnerability-proneness.
  21. Normalized results can lead to different outomes… as shown in the the slides, left side, apps having a lower average rating tend to have a higher vulnerability-proneness density.
  22. Normalized results can lead to different outomes… as shown in the the slides, left side, apps having a lower average rating tend to have a higher vulnerability-proneness density.
  23. To answer RQ3 and better understand if the information provided by the app store can be used to predict the level of an app’s vulnerability-proneness we trained 3 different machine learning algorithms using different combinations of features, namely: app market metrics (as downloads, rating, so on), textual features extracted from app descriptions using text analysis techniques simple static analysis features (such as number of 3rd party libraries, number of classes, and so on) And evaluate the classification perfomance of these algorithms in identifying apps with both low and high vulnerability-proneness levels.
  24. The first result is that Random Forest is the best performing algorithm for this task.
  25. The Random forest algorithm trained with only app market information is effective in identifying low or high risk apps, in about 3 out of 4 cases. As expected the best performance is achieved by using both app market and static analysis features. Surprisingly, while textual features have been successfully used in bug prediction/classification tasks, in this context they seem to introduce noise that affects the classification results.
  26. The first result is that Random Forest is the best performing algorithm for this task.
  27. Thus, we can summarize the findings of this presentation as follows: Almost all apps present known security defects, but apps belonging to the medical category are less vulnerability-prone than apps in the other categories.
  28. Vulnerability-proneness does not affect app ratings. Indeed, more popular apps tend to exhibit higher levels of vulnerability-proneness.
  29. App market could provide useful information to predict, in early stages, the vulnerability-proneness level of an app. Such information could be complementary to the ones provided by metrics related to app code. Textual descriptions do not provide useful information for this task.
  30. In the future we plan to explore several research directions. In particular, we want to survey app users to better understand how they deal with privacy and security concerns. We want to improve the prediction results by considering additional features, and tunings And we also want to investigate the possibility of predicting the specific type of security defects.