Security Enhancement of Android USB Debugging Mode

ثبت نشده
چکیده

Till today, there are more than 1 billion smartphone users worldwide. With smartphones become more popular, more security instances have been reported. Therefore, it is important to study the security issues of smartphones and develop effective approaches to safeguard them. This research is focused on Android based systems, in particular, the security of Android Debug Bridge (ADB). As an important feature to facilitate Android development and debugging, ADB has a high privilege level and a low level of protection. Many attacks on Android systems have taken advantage of the security holes of ADB. Thus, in the updating patch of Android 4.2.2, a new security feature secure USB debugging was implemented so that only trusted hosts can use ADB. Our research analyzes its protection effects on ADB based attacks and found that the new feature cannot provide sufficient protection when the host used to connect with Android devices has been compromised. We then implement an attack following this method and propose a cost-effective security mechanism to harden the USB Debugging Mode. An implementation of this design and its evaluation are also provided to demonstrate its effectiveness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New acquisition method based on firmware update protocols for Android smartphones

Android remains the dominant OS in the smartphone market even though the iOS share of the market increased during the iPhone 6 release period. As various types of Android smartphones are being launched in the market, forensic studies are being conducted to test data acquisition and analysis. However, since the application of new Android security technologies, it has become more difficult to acq...

متن کامل

ASM: A Programmable Interface for Extending Android Security

Android, iOS, and Windows 8 are changing the application architecture of consumer operating systems. These new architectures required OS designers to rethink security and access control. While the new security architectures improve on traditional desktop and server OS designs, they lack sufficient protection semantics for different classes of OS customers (e.g., consumer, enterprise, and govern...

متن کامل

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations

We expose an USB vulnerability in some vendors’ customization of the android system, where the serial AT commands processed by the cellular modem are extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging st...

متن کامل

An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks

Reverse engineering of Android applications is easy because the applications are written in the high level but simple bytecode language. Due to malicious reverse engineering attacks, many Android applications are tampered and repackaged into malicious applications. To protect Android applications from reverse engineering, many research studies have proposed and developed anti-reverse engineerin...

متن کامل

A Security Hygienic Smart Charger for Mobile Devices

Measuring and attesting to the operational integrity and security posture of a mobile device is challenging. Today, smart phones and tablet computers lack a number of traditional security features that have emerged for commodity laptops and desktops. In addition to restricted power, mobile devices generally don’t have a hardware root-of-trust and currently lack ubiquitous virtualization capabil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014