Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 240-244.doi: 10.3969/j.issn.1671-1122.2015.09.053

• Orginal Article • Previous Articles     Next Articles

Design and Implementation of Android Vulnerability Database

Gang YANG1(), Tao WEN2, Yu-qing ZHANG1,2   

  1. 1. National Computer Network Intrusion Protection Center, Beijing 101408, China
    2. State Key Laboratory of Integrated Services Networks, Xidian University, Xian Shanxi 710071, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

Abstract:

With the continuous development of mobile Internet, the security problem of mobile terminal equipment is more and more worthy of our attention. The popularity of android devices has also brought a lot of security problems. Android vulnerability is the key to this security problems. In this paper, we collected Android vulnerability from the domestic and foreign well-known vulnerability database and safety BBS. With vulnerability analysis technology, we are actively building and improving the android vulnerability database (AVD). We can come to the conclusion that the development of the relevant security issues of android.

Key words: Android, vulnerability, vulnerability database, security development, regular analysis

CLC Number: