Главная
Study mode:
on
1
Intro
2
Third-party Code - A Double-edged Sword
3
Risk Estimation
4
Quantify Security Impact
5
Detection Challenges on Android
6
Common Analysis Approach
7
Code Structure Detection
8
Profiling Apps & Libraries
9
Method Hashing
10
Profile Matching
11
Measuring Library Outdatedness
12
Vulnerability Lifetime
13
Call for Action
14
Takeaways
Description:
Explore the impact of third-party code on Android app security in this 19-minute conference talk from USENIX Enigma 2018. Delve into the challenges of detecting third-party libraries in Android applications, especially when faced with code obfuscation and minification techniques. Learn about a novel library detection approach that can pinpoint exact library versions, and discover the implications of outdated libraries on app vulnerability. Examine the slow adoption of new library versions by app developers and the persistence of known security vulnerabilities in popular libraries. Investigate the potential for automatic patching of vulnerable versions and consider the obstacles to improving the current security landscape in Android app development. Gain valuable insights into the double-edged nature of third-party libraries, balancing code reuse benefits against increased attack surface risks.

The Impact of Third-party Code on Android App Security

USENIX Enigma Conference
Add to list
0:00 / 0:00