作者
Zheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau
发表日期
2021
研讨会论文
30th USENIX Security Symposium (USENIX Security 21)
页码范围
3649-3666
简介
open-source projects are often reused in commercial software. Android, a popular mobile operating system, is a great example that has fostered an ecosystem of open-source kernels. However, due to the largely decentralized and fragmented nature, patch propagation from the upstream through multiple layers to end devices can be severely delayed. In this paper, we undertake a thorough investigation of the patch propagation behaviors in the entire Android kernel ecosystem. By analyzing the CVEs and patches available since the inception of the Android security bulletin, as well as open-source upstream kernels (eg, Linux and AOSP) and hundreds of mostly binary OEM kernels (eg, by Samsung), we find that the delays of patches are largely due to the current patching practices and the lack of knowledge about which upstream commits being security-critical. Unfortunately, we find that the gap between the first publicly available patch and its final application on end devices is often months and even years, leaving a large attack window for experienced hackers to exploit the unpatched vulnerabilities
引用总数
学术搜索中的文章
Z Zhang, H Zhang, Z Qian, B Lau - 30th USENIX Security Symposium (USENIX Security …, 2021