Poster: Design of Backdoor on Android Devices

نویسندگان

  • Junsung Cho
  • Geumhwan Cho
  • Sangwon Hyun
  • Hyoungshick Kim
چکیده

This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms (e.g., 4-digit PIN) on Android devices. 1. Our goal and assumptions We aim to give insights in designing backdoor that can be used to provide persistent access to a victim’s Android device by compromising the secret for user authentication while effectively hiding its presence from the victim. We assume that a victim uses the PIN scheme to protect her smartphone. Moreover, the victim can often update her PIN secret. Under these conditions, the attacker’s goal is to continuously spy on the victim’s smartphone without revealing her spying activities. In practice, many likely attackers are such insiders rather than strangers in that the people who most want to intrude on a victim’s privacy are likely to be in the victim’s circle of acquaintances. We also assume that the attacker’s backdoor is secretly installed on the victim’s smartphone at the initial stage. Probably, an insider attacker can often have some chances to install her backdoor on a victim’s smartphone in a stealthy manner by either physically accessing the device or performing a social engineering method (e.g., sending a gift app). 2. Design and implementation To validate the feasibility of the proposed attack, we designed and implemented a proof-of-concept backdoor on Android. Our implementation consists of three components: trigger application, Firebase (https://firebase.google.com) and backdoor application. Here, trigger application and Firebase are controlled by an attacker. The implementation of the remote triggering feature is important for hiding the backdoor from the device owner (i.e., the victim). We achieved this by using Firebase which supports the communication between the attacker and the backdoor through push notification services. The use of push notifications makes it difficult to detect the malicious traffic from Firebase because many normal applications are also using Firebase for push notification services. We used two Android devices; the rooted Nexus 5 with Android 5.1 Lollipop which plays the role of the victim’s device to run the backdoor application while Nexus 5X with Android 6.0 Marshmallow which plays the role of the attacker’s device to run the trigger application. For other Android versions, our backdoor can also be adapted. We found 6. Execute cracking module 7. Show password using notification 5. Receive “Open sesame” 1. Request token 4. Obtain token

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices

This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms on Android devices. Our design has many advantages such as difficulty in detecting backdoor, fast execution time and low power consumption. The key feature of our backdoor is remote triggering that allows the backdoor to be temporarily triggered and executed through push notification services als...

متن کامل

Poster: Exploiting UPnP Protocol for Botnet Propagation and Control

With the development of Internet of Things (IoT), various devices connect to the Internet, which also bring us new security risks. To date, most research workers in the IoT security field focus on analyzing the weakness of devices from communication, configuration, backdoor and system vulnerability. However, with the increase of devices and protocol types, large-scale controlling is becoming mo...

متن کامل

POSTER: Android + Open Wi-Fis = Broken SSL?

In previous work [1] we demonstrated severe problems with the way Android applications use SSL. We performed an in-depth study of 13,500 Android apps and discovered that a large number of apps did not use SSL correctly and thus, were vulnerable to Man-In-The-Middle attacks. To make these threats a reality, an attacker needs to execute an active man-in-the-middle attack (MITMA). While MITMAs are...

متن کامل

Mobile Devices - An Introduction to the Android Operating Environment Design, Architecture, and Performance Implications

With the worldwide proliferation of mobile devices, reliability, availability, connectivity, as well as performance related concerns, similar to the once encountered on traditional IT server systems, became paramount. On the smartphone and internet tablet side, one of the fastest growing solutions are Android based products (source digitimes 2010). While Android based systems get a lot of expos...

متن کامل

Poster: Measuring and Optimizing Android Smartwatch Energy Consumption

Smartwatches are operating under tight energy constraints. In this paper, we describe our on-going work on measuring and optimizing Android smartwatch energy consumption. We derived power models for commodity smartwatches, and then applied the power model to an IRB-approved user study involving 30 smartwatch users. We then propose research ideas on improving energy efficiencies for Android smar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017