Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible Service

نویسندگان

  • Assem Nazar
  • Mark M. Seeger
  • Harald Baier
چکیده

The majority of malware seen on Android has a top-down approach often targeting application programming interfaces (API) of the financially rewarding telephony and short message service (SMS). In this paper we present a proof of concept of compromising an Android based smartphone by targeting the underlying Linux kernel. We adopt an unorthodox bottom-up approach on modifying the operating system to allow an application to re-route the Android debug bridge (ADB) daemon onto a wireless link. We support our research using case scenarios to show how information can be extracted and inserted into the smartphone without the knowledge of the user. We discuss how the Android build environment can be changed to harness functionality from secured operations. We also discuss how an application can be designed to function with minimum resources, be hidden and perform operations without user consent or interaction. We also provide an overview of how a rooted Android operating system can be misused.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhancement of Android USB Debugging Mode

Till today, there are more than 1 billion smartphone users worldwide. With smartphones become more popular, more security instances have been reported. Therefore, it is important to study the security issues of smartphones and develop effective approaches to safeguard them. This research is focused on Android based systems, in particular, the security of Android Debug Bridge (ADB). As an import...

متن کامل

Screenmilker: How to Milk Your Android Screen for Secrets

With the rapid increase in Android device popularity, the capabilities that the diverse user base demands from Android have significantly exceeded its original design. As a result, people have to seek ways to obtain the permissions not directly offered to ordinary users. A typical way to do that is using the Android Debug Bridge (ADB), a developer tool that has been granted permissions to use c...

متن کامل

Implementing GPII/Cloud4All Support for Mobile Accessibility for Android

Mobile Accessibility for Android is a combination of a suite of accessible apps and a screen reader which provide accessibility on Android devices for blind and visually impaired users. Main functionality of Android devices is made available to the user through Mobile Accessibility's voice and Braille based UI. This paper describes the process of integrating this commercial product with GPII/Cl...

متن کامل

Design of Smart Home System Based on WiFi Smart Plug

This paper presents a low-cost and flexible solution to control and monitor home appliances using Smart Plug devices. The Smart Plug is a power switch which can be accessed via WiFi connection. It integrates two temp sensors, a current sensor and an IRemitter. Users can plug devices into the Smart Plug to remotely switch power on/off, get information of device’s power consumption and ambient te...

متن کامل

Rooting of Android Devices and Customized Firmware Installation and its Calibre

When we use a mobile device which runs Android, we usually look for the basic features such as call, texting, gaming, internet browsing, camera and music. However Android devices can be made more powerful and its power can be utilized in a larger scale once it has been rooted. Keywords-Root, Rooting, Android, Recovery, Bootloader,

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011