Abstract | ||
---|---|---|
Android devices and applications become prevalent and ask for unanticipated capabilities thanks to the increased interests in smartphones and web applications. As a way to use the capabilities not directly available to ordinary users, applications have used Android Debug Bridge (ADB), a command line tool to communicate with Android devices for debugging purposes. While ADB provides powerful features that require permissions to use critical system resources, it opens a gate to adversaries.
To understand the ADB capabilities and their possible risks, we present various types of attacks that are not easily identifiable using ADB capabilities and device-specific functions. We show that applications using ADB capabilities can modify installed applications, leak private user data, and track phone calls, among other things only with the INTERNET permission on the same device. To protect Android devices from such attacks, we present several mitigation mechanisms including a static analysis tool that analyzes Android applications to detect possible attacks using ADB capabilities. Such a tool can aid application markets such as Google Play to check third-party applications for possible attacks.
|
Year | DOI | Venue |
---|---|---|
2015 | 10.1145/2714576.2714638 | ASIACCS |
Keywords | Field | DocType |
security,android | Permission,Internet privacy,Ask price,Android (operating system),Computer security,Computer science,Static analysis,Phone,Web application,Debugging,The Internet | Conference |
ISBN | Citations | PageRank |
978-1-4503-3245-3 | 7 | 0.53 |
References | Authors | |
11 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sungjae Hwang | 1 | 7 | 0.53 |
Sungho Lee | 2 | 37 | 4.82 |
Yongdae Kim | 3 | 1944 | 125.44 |
Sukyoung Ryu | 4 | 185 | 25.77 |