Target Fragmentation in Android Apps

Patrick Mutchler, Yeganeh Safaei, Adam Doupe, John Mitchell

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93% of current apps target out-of-date platform versions and have a mean outdatedness of 686 days, 79% of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.

Original languageEnglish (US)
Title of host publicationProceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages204-213
Number of pages10
ISBN (Electronic)9781509008247
DOIs
StatePublished - Aug 1 2016
Event2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016 - San Jose, United States
Duration: May 23 2016May 25 2016

Other

Other2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016
CountryUnited States
CitySan Jose
Period5/23/165/25/16

Fingerprint

Application programs
Android (operating system)
Ecosystems

Keywords

  • Android Security
  • API Versions
  • Mobile Security
  • Target Fragmentation

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Artificial Intelligence

Cite this

Mutchler, P., Safaei, Y., Doupe, A., & Mitchell, J. (2016). Target Fragmentation in Android Apps. In Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016 (pp. 204-213). [7527771] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SPW.2016.31

Target Fragmentation in Android Apps. / Mutchler, Patrick; Safaei, Yeganeh; Doupe, Adam; Mitchell, John.

Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 204-213 7527771.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mutchler, P, Safaei, Y, Doupe, A & Mitchell, J 2016, Target Fragmentation in Android Apps. in Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016., 7527771, Institute of Electrical and Electronics Engineers Inc., pp. 204-213, 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, San Jose, United States, 5/23/16. https://doi.org/10.1109/SPW.2016.31
Mutchler P, Safaei Y, Doupe A, Mitchell J. Target Fragmentation in Android Apps. In Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 204-213. 7527771 https://doi.org/10.1109/SPW.2016.31
Mutchler, Patrick ; Safaei, Yeganeh ; Doupe, Adam ; Mitchell, John. / Target Fragmentation in Android Apps. Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 204-213
@inproceedings{ddf5fc11541e441f81dc0d45ced72ef1,
title = "Target Fragmentation in Android Apps",
abstract = "Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93{\%} of current apps target out-of-date platform versions and have a mean outdatedness of 686 days, 79{\%} of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.",
keywords = "Android Security, API Versions, Mobile Security, Target Fragmentation",
author = "Patrick Mutchler and Yeganeh Safaei and Adam Doupe and John Mitchell",
year = "2016",
month = "8",
day = "1",
doi = "10.1109/SPW.2016.31",
language = "English (US)",
pages = "204--213",
booktitle = "Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Target Fragmentation in Android Apps

AU - Mutchler, Patrick

AU - Safaei, Yeganeh

AU - Doupe, Adam

AU - Mitchell, John

PY - 2016/8/1

Y1 - 2016/8/1

N2 - Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93% of current apps target out-of-date platform versions and have a mean outdatedness of 686 days, 79% of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.

AB - Android apps declare a target version of the Android run-time platform. When run on devices with more recent Android versions, apps are executed in a compatibility mode that attempts to mimic the behavior of the older target version. This design has serious security consequences. Apps that target outdated Android versions disable important security changes to the Android platform. We call the problem of apps targeting outdated Android versions the target fragmentation problem. We analyze a dataset of 1,232,696 free Android apps collected between May, 2012 and December, 2015 and show that the target fragmentation problem is a serious concern across the entire app ecosystem and has not changed considerably in several years. In total, 93% of current apps target out-of-date platform versions and have a mean outdatedness of 686 days, 79% of apps are already out-of-date on the day they are uploaded to the app store. Finally, we examine seven security related changes to the Android platform that are disabled in apps that target outdated platform versions and show that target fragmentation hamstrings attempts to improve the security of Android apps.

KW - Android Security

KW - API Versions

KW - Mobile Security

KW - Target Fragmentation

UR - http://www.scopus.com/inward/record.url?scp=85008602492&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85008602492&partnerID=8YFLogxK

U2 - 10.1109/SPW.2016.31

DO - 10.1109/SPW.2016.31

M3 - Conference contribution

SP - 204

EP - 213

BT - Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -