Master’s Thesis Presentation • CrySP (Cryptography, Security, and Privacy) • A Longitudinal Analysis Of Replicas in the Wild Wild Android

Monday, September 16, 2024 4:00 pm - 5:00 pm EDT (GMT -04:00)

Please note: This master’s thesis presentation will take place in DC 2310.

Syeda Mashal Abbas Zaidi, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Yousra Aafer

In this thesis, we report and study a phenomenon that contributes to Android API sprawls. We observe that OEM developers introduce private APIs that are composed by copy-paste-editing full or partial code from AOSP and other OEM APIs – we call such APIs, Replicas.

To quantify the prevalence of Replicas in the wild fragmented Android ecosystem, we perform the first large-scale (security) measurement study, aiming at detecting and evaluating Replicas across 342 ROMs, manufactured by 10 vendors and spanning 7 versions. Our study is motivated by the intuition that Replicas contribute to the production of bloated custom Android codebases, add to the complexity of the Android access control mechanism and updates process, and hence may lead to access control vulnerabilities. 

Our study is facilitated by RepFinder, a tool that infers the core functionality of an API and detects syntactically and semantically similar APIs using static program paths. RepFinder reveals that Replicas are commonly introduced by OEMs and more importantly, they unnecessarily introduce security enforcement anomalies. Specifically, RepFinder reports an average of 141 Replicas per the studied ROMs, accounting for 9% to 17% of custom APIs – where 37% (on average) are identified as under-protected. Our study thus points to the urgent need to debloat Replicas.