Umeå University's logo

umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An in-depth analysis of Android’s Java class library: its evolution and security impact
Umeå University, Faculty of Science and Technology, Department of Computing Science.ORCID iD: 0000-0001-7486-0538
Umeå University, Faculty of Science and Technology, Department of Computing Science.ORCID iD: 0000-0003-1383-0372
2023 (English)In: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023, p. 133-144Conference paper, Published paper (Refereed)
Abstract [en]

Android is an operating system widely deployed especially on devices such as smartphones. In this paper, we study the evolution of OpenJDK Java Class Library (JCL) versions used as the basis of the Dalvik Virtual Machine (DVM) and the Android Runtime (ART). We also identify vulnerabilities impacting OpenJDK JCL versions and analyze their impact on Android. Our results indicate that the complexity of the Android JCL code imported from OpenJDK increases because:(1) there is an increase in the number of classes imported from OpenJDK,(2) there is an increase in the fragmentation of the JCL code in Android as code is increasingly imported from multiple OpenJDK versions at the same time, and (3) there is an increase in the distance between the JCL code in Android and OpenJDK as, for instance, Android developer introduce customizations to the imported code. We also observe that most OpenJDK vulnerabilities (80%) are not impacting Android because the vulnerable classes are not imported in Android. Nevertheless, Android does import vulnerable code and little is done to patch this vulnerable code which is only” patched” when a newer version of the vulnerable code is imported. This means that the code can stay vulnerable in Android for years. Most of the vulnerabilities impacting Android (77%) have a security impact on the availability of the system. By developing a proof-of-concept, we show that OpenJDK vulnerabilities imported in Android do have a security impact. We suggest to seriously take into account public information available about OpenJDK vulnerabilities to increase the security of the Android development pipeline.

Place, publisher, year, edition, pages
IEEE, 2023. p. 133-144
Keywords [en]
Android, external dependency, vulnerability management, managing code complexity, Java, OpenJDK, Simi- larity Analysis, Vulnerabilities, Security
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:umu:diva-216744DOI: 10.1109/SecDev56634.2023.00028ISI: 001103219600018Scopus ID: 2-s2.0-85179181698ISBN: 979-8-3503-3133-2 (print)ISBN: 979-8-3503-3132-5 (electronic)OAI: oai:DiVA.org:umu-216744DiVA, id: diva2:1812328
Conference
2023 IEEE Secure Development Conference (SecDev), Atlanta, USA, Octoberr 18-20, 2023
Funder
The Kempe FoundationsWallenberg AI, Autonomous Systems and Software Program (WASP)Available from: 2023-11-15 Created: 2023-11-15 Last updated: 2025-04-24Bibliographically approved

Open Access in DiVA

The full text will be freely available from 2025-11-15 07:00
Available from 2025-11-15 07:00

Other links

Publisher's full textScopus

Authority records

Riom, TimothéeBartel, Alexandre

Search in DiVA

By author/editor
Riom, TimothéeBartel, Alexandre
By organisation
Department of Computing Science
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 160 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf