Mostrar el registro sencillo del ítem

dc.contributor.authorBandara, Vinuri 
dc.contributor.authorPletinckx, Stijn
dc.contributor.authorGrishchenko, Ilya
dc.contributor.authorKruegel, Christopher
dc.contributor.authorVigna, Giovanni
dc.contributor.authorTapiador, Juan
dc.contributor.authorVallina-Rodriguez, Narseo 
dc.date.accessioned2025-04-14T16:22:20Z
dc.date.available2025-04-14T16:22:20Z
dc.date.issued2025-06-30
dc.identifier.urihttps://hdl.handle.net/20.500.12761/1913
dc.description.abstractThe open-source nature of the Android Open Source Project (AOSP) allows Original Equipment Manufacturers (OEMs) to customize the Android operating system, contributing to what is known as Android fragmentation. Google has implemented the Compatibility Definition Document (CDD) and the Compatibility Test Suite (CTS) to ensure the integrity and security of the Android ecosystem. However, the effectiveness of these policies and measures in warranting OEM compliance remains uncertain. This paper empirically studies for the first time the nature of OEM customizations in the Android TLS protocol stack, and their security implications on user-installed mobile apps across thousands of Android models. We find that approximately 80% of the analyzed Android models deviate from the standard AOSP TLS codebase and that OEM customizations often involve code changes in functions used by app developers for enhancing TLS security, like end-point and certificate verification. Our analysis suggests that these customizations are likely influenced by factors such as manufacturers’ supply chain dynamics and patching prioritization tactics, including the need to support legacy components. We conclude by identifying potential root causes and emphasizing the need for stricter policy enforcement, better supply chain controls, and improved patching processes across the ecosystem.es
dc.description.sponsorshipSpanish National Cybersecurity Institute (INCIBE)es
dc.description.sponsorshipComunidad de Madrides
dc.language.isoenges
dc.titleBeneath the surface: An analysis of OEM customizations on the Android TLS protocol stackes
dc.typeconference objectes
dc.conference.date30 June - 4 July 2025es
dc.conference.placeVenice, Italyes
dc.conference.titleIEEE European Symposium on Security and Privacy *
dc.event.typeconferencees
dc.pres.typepaperes
dc.type.hasVersionAOes
dc.rights.accessRightsembargoed accesses
dc.acronymEuroS&P*
dc.rankNEW*
dc.relation.projectIDinfo:eu-repo/grantAgreement/PID2022/143304OB/I00es
dc.relation.projectIDinfo:eu-repo/grantAgreement/PIPF-2023/COM-31195es
dc.relation.projectIDinfo:eu-repo/grantAgreement/PID2022/140126OB/I00es
dc.relation.projectNameComunidad de Madrid predoctoral grantes
dc.relation.projectNamePARASITE: Methods and techniques for characterizing threats to the software supply chaines
dc.subject.keywordAndroid securityes
dc.subject.keywordSupply chain securityes
dc.subject.keywordAndroid fragmentationes
dc.description.refereedTRUEes
dc.description.statusinpresses


Ficheros en el ítem

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem