An Empirical Study of Android Security Bulletins
in Different Vendors
Abstract.
Mobile devices encroach on almost every part of our lives, including work and leisure, and contain a wealth of personal and sensitive information. It is, therefore, imperative that these devices uphold high security standards. A key aspect is the security of the underlying operating system. In particular, Android plays a critical role due to being the most dominant platform in the mobile ecosystem with more than one billion active devices and due to its openness, which allows vendors to adopt and customize it. Similar to other platforms, Android maintains security by providing monthly security patches and announcing them via the Android security bulletin. To absorb this information successfully across the Android ecosystem, impeccable coordination by many different vendors is required.
In this paper, we perform a comprehensive study of 3,171 Android-related vulnerabilities and study to which degree they are reflected in the Android security bulletin, as well as in the security bulletins of three leading vendors: Samsung, LG, and Huawei. In our analysis, we focus on the metadata of these security bulletins (e.g., timing, affected layers, severity, and CWE data) to better understand the similarities and differences among vendors. We find that (i) the studied vendors in the Android ecosystem have adopted different structures for vulnerability reporting, (ii) vendors are less likely to react with delay for CVEs with Android Git repository references, (iii) vendors handle Qualcomm-related CVEs differently from the rest of external layer CVEs.
1. Introduction
Nowadays, smartphones are an indispensable part of our lives, and they are supersaturated with sensitive and personal information. As a result, high levels of security are crucial in the smartphone ecosystem. Android is the dominant operating system (OS) in the smartphone ecosystem with more than one billion active devices (IDC, [n. d.]). Android is released under an open-source license by the Android Open Source Project (AOSP). Due to the openness of the platform, many vendors and carriers adopted Android as their underlying platform. Within the Android ecosystem, Samsung, LG, and Huawei play important roles. In September 2019, Samsung’s market share was of mobile devices worldwide, while Huawei’s and LG’s market shares were and , respectively (statcounter, 2019).
Since August 2015, AOSP maintains the security of the Android platform by providing monthly security patches and publishing the details of each patch in the Android security bulletin (AOSP, [n. d.]). Other vendors like Samsung (Samsung, [n. d.]), LG (LG, [n. d.]), and Huawei (Huawei, [n. d.]a) subsequently also launched their own security bulletins.
In practice, when a vulnerability is found, disclosed, and patched, one can find the relevant information in a vulnerability database, the Android security bulletin, or a vendor’s security bulletin. However, due to customization and differences in hardware, a vulnerability in Android is not necessarily applicable to all vendors and devices (Farhang et al., 2018a; Wu et al., 2013; Aafer et al., 2016). Therefore, one has to search for a vulnerability in a vendor’s security bulletin to determine whether it is applicable to a vendor’s device. However, even if a vendor has a security bulletin, it is possible that a vulnerability has not been mentioned in the bulletin yet, but it may appear later. Misinformation or delays in different vendors’ security bulletins could mislead security practitioners. Moreover, the absence of relevant information in a vendor’s security bulletin is an important indicator that millions of smartphones may be unpatched and vulnerable.
In this paper, to the best of our knowledge, we perform the first comprehensive study of how vendors handle Android-related vulnerabilities in their security bulletins. We collect a total of 3,171 unique CVEs from Android, Samsung, LG, and Huawei security bulletins, as well as further data from Google Git repositories, and CVEDetails, which provides detailed information for each vulnerability. Thereby, we focus on the four vendors that regularly publish security bulletins. We shed light on the security practices in the broader Android ecosystem and, specifically, how vendors handle Android-related vulnerabilities. In summary, our paper makes the following key contributions:
-
•
We show that each vendor adopted a different approach for announcing CVEs in its security bulletins. Samsung is the only vendor mentioning CVEs that are not applicable to its devices. Therefore, the majority of CVEs originating from Android security bulletins appeared in Samsung’s bulletins (). In contrast, for LG and Huawei, the ratio of explicitly mentioned vulnerabilities is only and , respectively, creating significant uncertainty.
-
•
In terms of delay between Android security bulletins and a vendor’s security bulletins, we find that Huawei does not have any time differences for of its CVEs. In contrast, Samsung and LG do not have any time difference for only and of their CVEs, respectively.
-
•
We find that there is no delay for almost all CVEs that have an AOSP Git repository reference in Android security bulletins, which is true for all vendors.
-
•
Time differences among vendors appear mostly for CVEs of the external and kernel Android OS layers. Moreover, with respect to the average delay in the external layer, we find that Samsung and LG handle Qualcomm-related CVEs with longer delay than the rest of the external layer CVEs. In contrast, for Huawei the average delay for Qualcomm-related CVEs is lower than the rest of external layer CVEs.
2. Data Collection
Since each vendor publishes its vulnerability patches in its own security bulletin, each of them has its unique format and set of fields for describing vulnerabilities. Moreover, none of these vendors provide data in a standard, machine-readable format, such as JSON or XML. Therefore, we built a designated crawler and content parser for each vendor. To crawl the vendors’ websites, we used Selenium Browser Automation (Selenium Project, [n. d.]). We collected data until August 2019.
Android and Huawei security bulletins include only CVEs, while Samsung and LG security bulletins contain not only CVEs but also their unique vulnerability identifiers: LG Vulnerabilities and Exposures (LVE) and Samsung Vulnerabilities and Exposures (SVE).
On Android security bulletins, we scraped all CVEs from August 2015 (i.e., first published bulletin) until August 2019. Early versions of the Android security bulletin have different field names than the most recent version. For instance, the field Updated AOSP Versions has different names, such as Affected Versions in August 2015 (AOSP, 2015a) and Updated Versions in December 2015 (AOSP, 2015b). As a result, we needed different crawlers and content parsers even for a specific vendor’s security bulletins.
CVEs on Android security bulletins might also contain a field called References linking to the Android AOSP Git Repository (Google, [n. d.]), which shows all of the commit details. When a vulnerability patch has a reference field, we also scraped the commit details of that particular vulnerability patch.
We scraped LG and Samsung CVEs beginning from the start date of their security bulletins, May 2016 and October 2015, respectively. On Huawei, however, there are two different security bulletins; we scraped both. The first one appears as Huawei EMUI/Magic UI security updates, which started in December 2017 (Huawei, [n. d.]b). The second one is called Security Advisories (Huawei, [n. d.]c), which started in 2012. On these security advisories, there are also CVE IDs that reference the particular security advisory. However, not all of these security advisories are accompanied by the corresponding CVE. In total, 817 unique CVEs have been mentioned in these security advisories and only two of them are common with the first Huawei bulletins. Moreover, if we consider the official start date of Huawei security bulletins in December 2017, Huawei security advisory has only 6 common CVEs with the Android security bulletins, which does not impact our results. Here, we mainly focus on the difference between Android security bulletins and a vendor’s security bulletin. Hence, we do not consider the Huawei security advisory in our analysis.
Aside from these security bulletins, we also scraped CVEDetails (Özkan, [n. d.]) to gain additional attributes of the vulnerabilities. After scraping all of these vulnerabilities, we converted them to a common JSON (Wikipedia, [n. d.]) format and stored them in MongoDB (MongoDB, [n. d.]). Figure 1 shows the overall data collection process described above.111The dataset is available at https://github.com/culture67/Android-Bulletin-Data

Limitations: Our work has the following limitations. First, we focus only on Android security bulletins and on the three Android vendors that, to our knowledge, have established comprehensive security bulletins. Second, for each vendor, our analysis is limited to the time since the vendor started publishing its security bulletins. We cannot claim our results are valid from the Android commercialization date (i.e., 2008) til the start of a vendor’s security bulletins. But, our analysis is representative of the current ecosystem rather than the past. Third, the available information for each CVE varies. As an example, for some CVEs, we have a reference link; but for some, we do not have any. We use this type of information plus component and category names in Android security bulletins to perform our Android stack layer analysis. Hence, our analysis for Android stack layers is limited to those CVEs for which we have the corresponding information. Fourth, we are aware that many other factors can affect how a vendor manages its security bulletins or how a vendor mentions and describes them. In our analysis, we limit ourselves to only a vendor’s security bulletins and report what we observe from these. As such, we defer code analysis to future work, and instead focus on a high-level analysis of the security bulletins.
3. Results
Next, we analyze the data that we have collected to understand how Android vendors manage their security bulletins.
3.1. Data Characterization
In total, we scraped 3,171 unique CVEs from the four different vendors’ security bulletins (see Table 1).
Android | Samsung | LG | Huawei | |
---|---|---|---|---|
No. of CVEs | 2,705 | 2,587 | 2,023 | 816 |
Unique to | 202 | 157 | 12 | 31 |
Launch Date | Aug. 2015 | Oct. 2015 | May 2016 | Dec. 2017 |
3.2. Bulletin Management



Different vendors have adopted different approaches for handling their security bulletins. LG announces CVEs with their corresponding severity levels monthly. Huawei employs the same practice, but it also has a part for CVEs that are already included in previous updates222We use already included hereafter. without mentioning the exact date of bulletin. In addition to severity levels and already included CVEs, Samsung utilizes the labels Not applicable to Samsung devices333We use N/A or not applicable hereafter. and in addition (which only has been used by Samsung only once, in February 2018).
Figure 2 summarizes how these three vendors announce CVEs in their security bulletins and includes a comparison to Android. In this figure, for each month, we consider the CVEs that have been announced on the Android security bulletin of that month. CVEs mentioned in the bulletins with a severity level or in addition are considered as Normal Mention. Already Included and N/A represent CVEs mentioned in the already included part and not applicable part of a vendor’s security bulletin, respectively. Not Mentioned represents those CVEs that have not been mentioned at a vendor’s security bulletin so far compared to the Android security bulletins.
According to Figure 2, Samsung has mentioned most of the CVEs (), that previously appeared in the Android security bulletins, which stands in contrast to LG and Huawei ( and , respectively). As we can see in Figure 2(a), there is a rise in not mentioned CVEs in August 2019. One likely explanation is that Samsung will announce them in the upcoming months beyond the date we gathered our data. Moreover, in April 2018, there are many CVEs that have not been mentioned in both LG and Huawei contrary to Samsung. The reason leading to this is how Android announces Qualcomm related CVEs. In that month, the Android security bulletin had a section for 225 cumulative updates for Qualcomm components to associate them with a patch level. These CVEs were shared by Qualcomm with their partners between 2014 and 2016. Samsung mentioned all these CVEs two months earlier in its security bulletin as in addition (the only time Samsung has used this label so far).
Samsung started using the label not applicable in January 2016. Now, there are 537 CVEs associated with this label. For example, from the beginning of LG security bulletins, i.e., May 2016, Samsung announced 527 CVEs with a not applicable label. From these 527, 265 have not been mentioned in the LG security bulletins so far. From December 2017 (Huawei bulletin’s start date), there are 233 such CVEs and 159 of them have not been mentioned in Huawei’s security bulletins, yet. Due to vendors’ customization practices, it is expected that some CVEs are not applicable for all vendors. Nonetheless, the difference is surprising. For Samsung, due to the not applicable label, we have some assurance that these CVEs indeed are not relevant. But, for LG and Huawei, we are left with a large degree of uncertainty. Therefore, a key reporting suggestion is that all vendors should introduce a section or label for not applicable CVEs (and references to their devices).
3.3. Time Comparison and Android Layers
We further investigated the timeline of normal mentions in these vendors compared to Android (see Figure 3). Figure 3(a) represents the absolute number of CVEs for each vendor’s security bulletin with the corresponding time difference from the Android security bulletin (CVEs appeared in a vendor’s security bulletins once). The positive (negative) number means that a vendor is slower (faster) than Android to mention a CVE in its security bulletins. Figure 3(b) represents the ratio of the time difference. As we see in Figure 3, Huawei does not have any time differences with Android for of CVEs compared to Samsung and LG, and , respectively. LG mentions CVEs one month after the Android security bulletin for of its CVEs, while this number is for Samsung. For Samsung, there exists a considerable number of CVEs that are mentioned in Samsung security bulletins two months earlier than Android. Note that all these CVEs are those that have been mentioned with the label in addition in February 2018.


It is useful to further break down vendors’ behaviors in terms of Android stack layers to better understand the source of differences among vendors. To achieve that, we first need to find the corresponding layer for a CVE since this information is not publicly available in security bulletins. In doing so, we use three attributes (which is discussed in detail in our previous work (Farhang et al., 2019)), component name (a column for some CVEs in Android security bulletins), category name (in an Android security bulletin, CVEs appear under specific category), and the combination of a branch path with the changed file patch for CVEs that have an Android Git repository. These three attributes are not available for all CVEs. As a result, we can only find layer information for some CVEs and remove the rest from our analysis. Only two CVEs relate to the Android runtime layer. Therefore, we exclude them from our analysis. In the following, we consider each layer separately.
External Layer. This layer has 1772 unique CVEs in total. Samsung has 1761 (1216 Qualcomm-related) CVEs in the external layer in which 80 and 5 of them have two or three mentions in the Samsung security bulletins, respectively. The majority of CVEs with N/A are in this layer (357 out of 537) and Samsung mentions them within one month after the Android security bulletins. LG has 1213 (821 Qualcomm-related) unique CVEs and 21 of them are mentioned twice. 291 unique CVEs (218 Qualcomm-related) belong to Huawei and 10 of them are mentioned twice in Huawei security bulletins.
Contrary to Huawei, Samsung and LG are faster in announcing non-Qualcomm CVEs in their security bulletins than Qualcomm-related CVEs444For this analysis and the rest, we only focus on normal CVEs with one mention. We exclude already included CVEs since we do not know the exact time of the corresponding bulletin. The reasons we do not consider multiple mentions are (i) it is not common among vendors and (ii) it is not clear which delay we should consider. (see Table 2). The difference for Huawei is not significant (Mann-Whitney test, ), but the difference is significant for both Samsung (Mann-Whitney test, ) and LG (Mann-Whitney test, ). We also perform an analysis of variance (ANOVA) test for both Qualcomm-related CVEs () and the rest of external layer CVEs (). These show that the average delay for these three vendors is significantly different for both Qualcomm-related CVEs and the rest of the external layer CVEs.
Qualcomm | Rest of External Layer | Application Layer | |
---|---|---|---|
Samsung | 1.753 | 0.837 | 0.571 |
LG | 0.957 | 0.428 | -0.0541 |
Huawei | -0.0588 | 0.0152 | 0 |
Application Layer. We find 50 unique CVEs in the application layer. All of them are mentioned in Samsung, but 9 of them are N/A to Samsung. 44 of them are mentioned once. LG mentioned 37 of them once in its security bulletins and only one of them twice. Huawei mentioned 16 CVEs of this layer once. For both Samsung and Huawei, there is no already included mention for this layer. See application column of Table 2 for the average delay. LG and Huawei do not introduce any delay for CVEs in this layer.
Application Framework Layer (AFL). There are 128 unique CVEs in this layer. Samsung mentioned 126 of them. For LG and Huawei, we have 108 and 41, respectively. The AFL column in Table 3 shows the average delay of this layer.
AFL | NL | HAL | Kernel | |
Samsung | 0.241 | 0.0766 | 0.0515 | 1.296 |
LG | 0.1373 | 0.139 | 0.0522 | 0.972 |
Huawei | 0 | 0.811 | 0 | 0.0357 |
Native Library (NL). In Android, there are 266 unique CVEs. 247 of them are mentioned in the Samsung bulletins. LG has mentioned 191 of them and 45 of them are mentioned in Huawei so far. Samsung has the lowest average delay in this layer compared to other layers, i.e., 0.0766 months. On the other hand, Huawei has the highest average delay for CVEs of this layer, i.e., 0.811 (see Table 3).
Hardware Abstraction Layer (HAL). In this layer, we find 146 unique CVEs. 145 of them are mentioned in Samsung. 137 of them are mentioned in LG security bulletins and Huawei has mentioned 106 of them. For average delay, see Table 3.
Kernel Layer. We have 213 unique CVEs in the Kernel layer. Samsung has mentioned 211 of them in its security bulletins in which 43 of them are “not applicable” to Samsung devices. LG mentioned 186 of them and 40 of them are mentioned in Huawei. It is the only layer in which other vendors have never been mentioning any CVEs sooner than Android security bulletins. In other words, there does not exist any negative delay for CVEs of this layer. We also perform an ANOVA test on the delay of these three vendors and the difference among them is significant ().
Vendor | Huawei vs. Samsung | LG vs. Huawei | Samsung vs. LG | ||||||
---|---|---|---|---|---|---|---|---|---|
Layer | H <S | H = S | H >S | L <H | L = H | L >H | S <L | S = L | S >L |
External | 71 (1.014) | 62 | 1 (1) | 2 (1) | 62 | 103 (1.097) | 29 (1) | 610 | 218 (2.95) |
Application | 0 | 14 | 0 | 0 | 15 | 0 | 0 | 29 | 3 (1.33) |
Application Framework | 1 (2) | 34 | 0 | 0 | 33 | 1 (1) | 4 (1) | 89 | 11 (1.545) |
Native Library | 1 (2) | 38 | 0 | 0 | 38 | 1 (2) | 1 (1) | 180 | 6 (1) |
Hardware Abstraction | 3 (1.33) | 101 | 0 | 0 | 98 | 6 (1.667) | 4 (1) | 131 | 2 (1) |
Kernel | 24 (1) | 1 | 0 | 0 | 1 | 27 (1) | 9 (1) | 106 | 35 (1.6) |
We also compare the response time of two vendors in each layer for common CVEs between them (see Table 4). In this table, each entry represents the number of times a vendor is faster compared to another one in announcing a CVE in its security bulletins and the number in parenthesis shows the average difference in a month. As an example, means that Huawei is faster than Samsung in announcing CVEs of a layer. As we can see in this table, Huawei is rarely slower than Samsung and LG in all layers. This was expected as we see Huawei mentions CVEs in its bulletins mostly without delay (see Figure 3(b)). Furthermore, all three vendors treat CVEs from all layers almost the same except External and Kernel layers. Huawei is faster than both Samsung and LG for and of external layer CVEs, respectively. LG is faster than Samsung for of the external layer’s CVEs. In other words, the external layer CVEs in Samsung are rarely mentioned sooner than the corresponding CVEs in Huawei and LG security bulletins. For Kernel layer CVEs, Huawei is almost always faster than both Samsung and LG. LG is faster than Samsung for of the CVEs. This shows that vendors handle CVEs originating from Kernel and External layers differently in terms of announcements in their security bulletins. Huawei is the fastest one, while Samsung is the slowest.
The above analysis also suggests that CVEs with external references/repositories like Qualcomm and Kernel may introduce some delay for vendors to announce these CVEs in their security bulletins. Further, in Android security bulletins, some CVEs have an AOSP Git repository. Hence, we investigate whether vendors handle CVEs with the AOSP Git repository differently in terms of a delay from the Android security bulletin. In total, 825 CVEs have an AOSP Git repository reference. Note that we restrict our analysis to those CVEs that are only mentioned once in a vendor’s security bulletins. According to Table 5, for most CVEs with an AOSP Git repository reference, there is no delay in a vendor’s security bulletin to mention a CVE.
Delay | Without Delay | Already Included | |
---|---|---|---|
Samsung | 25 | 611 | 3 |
Huawei | 4 | 173 | 10 |
LG | 24 | 535 | - |
3.4. Severity Level and Vulnerability Type
The time comparison of different vendors only represents one aspect of how vendors manage their security bulletins. It is also worth looking at the CVEs’ severity level (CVSS score) and delay. Figure 4 shows a cumulative histogram of CVSS score for different vendors for CVEs with and without delay. Samsung performs better for CVEs of high CVSS scores compared to LG. When there is no delay, Samsung has more CVEs with a high CVSS score than LG. On the other hand, in the presence of delay, we are observing a higher number of CVEs with a high CVSS score in LG compared to Samsung. Furthermore, Samsung has more CVEs with a high CVSS score that have been already included compared to Huawei.



In addition to the CVSS score, we also study the Common Weakness Enumeration (CWE), a standard for identifying the class of software weakness, of CVEs in our dataset. A CWE ID has been assigned to of our dataset. Table 6 shows, for each vendor, the top 10 CWE IDs by the number of CVEs for three different categories, i.e., delayed CVEs, CVEs without delay, and “already included” CVEs. CVEs with delay in both LG and Samsung have the same top 10 CWE IDs with little changes in their order. This is mostly true for CVEs without delay in these vendors with only one difference (CWE ID 476 and CWE ID 399). But, we see a significant difference in Huawei in terms of both type and rank of CWE IDs. One of the reasons for this is that the prevalence of CWE IDs changes over time. For example, from December 2017, CWE ID 787 and CWE ID 264 correspond to around the same number of CVEs (89 and 74, respectively). Second, as we see in Figure 2, Huawei does not mention a considerable amount of CVEs in its security bulletins (e.g., after December 2017, only of CWE ID 284 have been mentioned in Huawei security bulletins).
Samsung | Huawei | LG | |||||||
---|---|---|---|---|---|---|---|---|---|
CWE ID | Weakness Summary | Delay | WO Delay | Already Included | Delay | WO Delay | Already Included | Delay | WO Delay |
264 | Access Control Error | 233 (1) | 213 (1) | 37 (2) | 4 (1) | 36 (4) | 9 (5) | 336 (1) | 191 (1) |
119 | Buffer Overflow | 116 (2) | 185 (2) | 41 (1) | 3 (2) | 43 (3) | 35 (1) | 168 (2) | 70 (4) |
200 | Information Disclosure | 94 (3) | 100 (3) | 11 (5) | - | 16 (7) | 5 (7) | 124 (3) | 88 (2) |
284 | Improper Access Conrol | 49 (4) | 89 (4) | 12 (4) | - | - | 3 (9) | 69 (4) | 83 (3) |
20 | Improper Input Validation | 42 (5) | 81 (5) | 25 (3) | - | 23 (6) | 10 (3) | 62 (6) | 50 (6) |
416 | Use After Free | 38 (6) | 19 (10) | 6 (8) | 1 (3) | 27 (5) | 10 (3) | 66 (5) | 15 (8) |
125 | Out of Band Reads | 30 (7) | 48 (7) | - | - | 61 (2) | 8 (6) | 40 (8) | 48 (7) |
190 | Integer Overflow or Wraparound | 25 (8) | 25 (8) | 8 (7) | 1 (3) | 10 (8) | 12 (2) | 42 (7) | 8 (9) |
362 | Race Condition | 22 (9) | - | - | - | - | - | 29 (9) | - |
787 | Out of Band Writes | 12 (10) | 70 (6) | - | - | 69 (1) | - | 17 (10) | 68 (5) |
476 | Null Pointer Dereference | - | 24 (9) | 9 (6) | - | - | 3 (9) | - | - |
399 | Resource Management Error | - | - | - | - | - | - | - | 8 (9) |
400 | Uncontrolled Resource Consumption | - | - | - | - | 7 (9) | - | - | - |
129 | Improper Validation of Array Index | - | - | 5 (9) | - | 6 (10) | 4 (8) | - | - |
191 | Integer Underflow | - | - | - | - | - | 3 (9) | - | - |
285 | Improper Authorization | - | - | 3 (10) | - | - | - | - | - |
4. Discussion
Our work sheds light at the security practices of different vendors in the Android ecosystem and it provides an important first step for better security policy recommendations. Here, we summarize some important takeaways from our study.
4.1. Security Bulletins Structure
Consider a case in which a CVE has been mentioned in the Android security bulletins, but it has not appeared in a vendor’s security bulletins. A security practitioner cannot infer whether this CVE applies to the vendor’s Android device solely by looking at the vendor’s security bulletins due to the possibility of delay in the CVE announcement and the possibility that the vendor’s patch has already included that CVE. As a result, we suggest that all vendors follow Samsung and have a section that mentions which CVEs are not applicable to their devices. Based on Section 3.2, we do not have a bulletin reference for already included CVEs. It might be better if a vendor can provide that information, enabling security practitioners to associate CVEs to a patch correctly.
4.2. Public Repositories vs. SVE and LVE
As mentioned in Section 2, Samsung has SVE and LG has LVE. The number of SVEs and LVEs are 295 and 63, respectively. For SVEs, Samsung only provides severity, affected versions, reported date, disclosure status, and description. For LVEs, LG provides the same except the disclosure status. Both of these vendors do not provide any corresponding CVE number for these SVEs and LVEs. However, we have found the corresponding CVEs for some SVEs and LVEs by manual search. But even with manual search, we cannot find any corresponding CVEs for some of them. CVEDetails and NVD database have been established via community effort to provide a comprehensive database for anyone to facilitate vulnerability mitigation. As a result, we suggest that both Samsung and LG provide CVEs for their corresponding SVEs and LVEs.
4.3. Inconsistency
In our previous work (Farhang et al., 2019), we observed various inconsistencies in Android security bulletins and CVEDetails. Further, there have been recent efforts to find inconsistencies in public security reports using natural language processing (Dong et al., 2019). However, here, we observe inconsistencies within a vendor. In Samsung, we observe an inconsistency in terms of both severity level and whether a CVE is applicable to Samsung devices. Note that these CVEs are mentioned only once in Android security bulletins. For example, CVE-2016-5342 mentioned in Nov. 2016 with a high severity level is mentioned again in July 2018 with a moderate severity level. Moreover, CVE-2014-9981 is mentioned in Oct. 2017 as not applicable to Samsung devices. However, it again appears in February 2018 in the in addition part. A vendor’s security bulletin is a reference point for a security professional to check vulnerabilities. If there exists inconsistency, this leaves a security professional with uncertainty. Therefore, in addition to consistency among public repositories, consistency within a vendor’s security bulletin is essential.
5. Related Work
Android Security and Software Updates. Research efforts on the security of Android are immense and include a wide spectrum (vulnerability finding, attack investigation, and secure infrastructure) (Vidas et al., 2011; Xing et al., 2014; Enck et al., 2009; Shabtai et al., 2010; Thomas et al., 2015). Similar to other software, Android vendors maintain the security of their devices by developing and issuing patches regularly. Nappa et al. (Nappa et al., 2015) studied the vulnerabilities life cycle in client applications, and Li and Paxson (Li and Paxson, 2017) investigated the patch development life cycle in open source software projects. The issues of automatic updates and semi-automatic updates have been investigated in (Edwards et al., 2008) and (Mathur and Chetty, 2017), respectively. Farhang et al. (Farhang et al., 2018b) differentiate between update and upgrade and study the upgrade practices in the Windows operating system. Contrary to previous work, we investigate the security practices of different vendors in terms of vulnerability and patch management by gathering and analyzing different vendors’ security bulletins.
Security Reports. Vulnerability reports and security bulletins have been studied in different domains. In 2016, the U.S. Federal Trade Commission (FTC) started to study major mobile device vendors’ security update practices (Commission, 2016; Commission et al., 2018). Arora et al. (Arora et al., 2010) showed that disclosure accelerates patch release. Bugs remediation can be improved by interaction between software developers and bug reporters (Breu et al., 2010). Security bugs that have been found by reputable professionals get patched faster (Guo et al., 2010). Missing information in vulnerability reports endangers vulnerability reproduction (Mu et al., 2018). Most closely to our work are (Linares-Vásquez et al., 2017) and (Farhang et al., 2019). Linares-Vásquez et al. (Linares-Vásquez et al., 2017) studied CWE hierarchies, vulnerability types, Android layers affected by vulnerabilities by collecting 660 Android-related vulnerabilities from Android security bulletins. Farhang et al. (Farhang et al., 2019) not only conducted a similar study with a more comprehensive dataset (2,470 Android-related vulnerabilities), but also investigated new aspects like patching vulnerabilities originating from Qualcomm and Linux. Here, we study the commonalities and differences among vendors in the Android ecosystem by collecting Android-related vulnerabilities from different vendors, i.e., Samsung, LG, and Huawei.
6. Conclusion
We provided a comprehensive study of multiple Android vendors’ security bulletins to better understand how different vendors manage their security bulletins. By collecting 3,171 unique CVEs from Android, Samsung, LG, and Huawei security bulletins, we investigated bulletin management, delay related to Android stack layers, and CWE ID in different layers. We found that (i) vendors have different structures for vulnerability reporting, (ii) Qualcomm-related CVEs and the rest of external layers’ CVEs are handled differently by vendors, (iii) the likelihood of delay for CVEs with Android Git repository is low.
Acknowledgments: We thank the reviewers for their insightful comments and suggestions. This work was supported in part by the National Science Foundation under Grant CNS-1850510.
References
- (1)
- Aafer et al. (2016) Yousra Aafer, Xiao Zhang, and Wenliang Du. 2016. Harvesting inconsistent security configurations in custom Android roms via differential analysis. In Proceedings of the 25th USENIX Security Symposium (USENIX Security). 1153–1168.
- AOSP ([n. d.]) AOSP. [n. d.]. Android Security Bulletin. https://source.android.com/security/bulletin. Accessed: 10/13/2019.
- AOSP (2015a) AOSP. 2015a. Android Security Bulletin 2015-08. https://source.android.com/security/bulletin/2015-08-01. Accessed: 01/30/2019.
- AOSP (2015b) AOSP. 2015b. Android Security Bulletin 2015-12. https://source.android.com/security/bulletin/2015-12-01. Accessed: 01/26/2019.
- Arora et al. (2010) Ashish Arora, Ramayya Krishnan, Rahul Telang, and Yubao Yang. 2010. An empirical analysis of software vendors’ patch release behavior: Impact of vulnerability disclosure. Information Systems Research 21, 1 (2010), 115–132.
- Breu et al. (2010) Silvia Breu, Rahul Premraj, Jonathan Sillito, and Thomas Zimmermann. 2010. Information needs in bug reports: Improving cooperation between developers and users. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work (CSCW). ACM, 301–310.
- Commission (2016) U.S. Federal Trade Commission. 2016. FTC to study mobile device industry’s security update practices. https://www.ftc.gov/news-events/press-releases/2016/05/ftc-study-mobile-device-industrys-security-update-practices. Accessed: 02/02/2020.
- Commission et al. (2018) U.S. Federal Trade Commission et al. 2018. Mobile security updates: Understanding the issues. https://www.ftc.gov/system/files/documents/reports/mobile-security-updates-understanding-issues/mobile_security_updates_understanding_the_issues_publication_final.pdf. Accessed: 02/02/2020.
- Dong et al. (2019) Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, and Gang Wang. 2019. Towards the detection of inconsistencies in public security vulnerability reports. In Proceedings of the 28th USENIX Security Symposium (USENIX Security). 869–885.
- Edwards et al. (2008) Keith Edwards, Erika Shehan Poole, and Jennifer Stoll. 2008. Security automation considered harmful?. In Proceedings of the 2007 Workshop on New Security Paradigms (NSPW). ACM, 33–42.
- Enck et al. (2009) William Enck, Machigar Ongtang, and Patrick McDaniel. 2009. Understanding Android security. IEEE Security & Privacy 1 (2009), 50–57.
- Farhang et al. (2019) Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, and Jens Grossklags. 2019. Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities. arXiv preprint arXiv:1905.09352 (2019).
- Farhang et al. (2018a) Sadegh Farhang, Aron Laszka, and Jens Grossklags. 2018a. An economic study of the effect of Android platform fragmentation on security updates. In Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 119–137.
- Farhang et al. (2018b) Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, and Peng Liu. 2018b. Take It or Leave It: A Survey Study on Operating System Upgrade Practices. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC). ACM, 490–504.
- Google ([n. d.]) Google. [n. d.]. AOSP Git. https://android.googlesource.com/. Accessed: 10/5/2019.
- Guo et al. (2010) Philip Guo, Thomas Zimmermann, Nachiappan Nagappan, and Brendan Murphy. 2010. Characterizing and predicting which bugs get fixed: An empirical study of Microsoft Windows. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering (ICSE). ACM, 495–504.
- Huawei ([n. d.]a) Huawei. [n. d.]a. Android Security Bulletin. https://consumer.huawei.com/en/support/bulletin/. Accessed: 10/13/2019.
- Huawei ([n. d.]b) Huawei. [n. d.]b. EMUI/Magic UI. https://consumer.huawei.com/en/support/bulletin/. Accessed: 10/5/2019.
- Huawei ([n. d.]c) Huawei. [n. d.]c. Security Advisories. https://www.huawei.com/en/psirt/all-bulletins. Accessed: 10/5/2019.
- IDC ([n. d.]) IDC. [n. d.]. Android Market Share. https://www.idc.com/promo/smartphone-market-share/os. Accessed: 10/13/2019.
- LG ([n. d.]) LG. [n. d.]. Android Security Bulletin. https://lgsecurity.lge.com/security_updates_mobile.html. Accessed: 10/13/2019.
- Li and Paxson (2017) Frank Li and Vern Paxson. 2017. A large-scale empirical study of security patches. In Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, 2201–2215.
- Linares-Vásquez et al. (2017) Mario Linares-Vásquez, Gabriele Bavota, and Camilo Escobar-Velásquez. 2017. An empirical study on Android-related vulnerabilities. In IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 2–13.
- Mathur and Chetty (2017) Arunesh Mathur and Marshini Chetty. 2017. Impact of user characteristics on attitudes towards automatic mobile application updates. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS).
- MongoDB ([n. d.]) MongoDB. [n. d.]. What is MongoDB? https://www.mongodb.com/what-is-mongodb. Accessed: 01/23/2019.
- Mu et al. (2018) Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, and Gang Wang. 2018. Understanding the reproducibility of crowd-reported security vulnerabilities. In Proceedings of the 27th USENIX Security Symposium (USENIX Security). 919–936.
- Nappa et al. (2015) Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, and Tudor Dumitras. 2015. The attack of the clones: A study of the impact of shared code on vulnerability patching. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE, 692–708.
- Özkan ([n. d.]) Serkan Özkan. [n. d.]. CVE Details. https://www.cvedetails.com. Accessed: 01/23/2019.
- Samsung ([n. d.]) Samsung. [n. d.]. Android Security Bulletin. https://security.samsungmobile.com/securityUpdate.smsb. Accessed: 10/13/2019.
- Selenium Project ([n. d.]) Selenium Project. [n. d.]. Selenium. https://www.seleniumhq.org. Accessed: 01/23/2019.
- Shabtai et al. (2010) Asaf Shabtai, Yuval Fledel, and Yuval Elovici. 2010. Securing Android-powered mobile devices using SELinux. IEEE Security & Privacy 8, 3 (2010), 36–44.
- statcounter (2019) statcounter. 2019. Mobile Device Market Share. https://gs.statcounter.com/vendor-market-share/mobile/worldwide/2019. Accessed: 10/13/2019.
- Thomas et al. (2015) Daniel Thomas, Alastair Beresford, and Andrew Rice. 2015. Security metrics for the Android ecosystem. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 87–98.
- Vidas et al. (2011) Timothy Vidas, Daniel Votipka, and Nicolas Christin. 2011. All your droid are belong to us: A survey of current Android attacks. In Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT). 81–90.
- Wikipedia ([n. d.]) Wikipedia. [n. d.]. JSON. https://en.wikipedia.org/wiki/JSON. Accessed: 01/23/2019.
- Wu et al. (2013) Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, and Xuxian Jiang. 2013. The impact of vendor customizations on Android security. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS). ACM, 623–634.
- Xing et al. (2014) Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, and XiaoFeng Wang. 2014. Upgrading your Android, elevating my malware: Privilege escalation through mobile OS updating. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE, 393–408.