2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS) 2015
DOI: 10.1109/iceccs.2015.17
|View full text |Cite
|
Sign up to set email alerts
|

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…However, many authentication and access control schemes have proven to be ineffective in preventing malware. For example, the secrets used by authentication can be stolen/guessed by an adversary if the COTS device is compromised [53,5]. Adversaries can also use social engineering techniques to trick the operators into disclosing private credentials to bypass access control measures [54].…”
Section: Standard Endpoint Securitymentioning
confidence: 99%
“…However, many authentication and access control schemes have proven to be ineffective in preventing malware. For example, the secrets used by authentication can be stolen/guessed by an adversary if the COTS device is compromised [53,5]. Adversaries can also use social engineering techniques to trick the operators into disclosing private credentials to bypass access control measures [54].…”
Section: Standard Endpoint Securitymentioning
confidence: 99%
“…Since the password is proved to be generated by proxy, there must be a place that the proxy stored the code at somewhere that the app with user privilege could access and read. This idea was generated by recalling the analysis on a backup app called "Helium" in paper of Bai et al [23]. After a series of searching initiated by this idea, we finally located the password in a log file named videoserv.log under the directory data/local/tmp, and luckily found the first occurrence of the current password was always after the word "AUTH" in the log file.…”
Section: Dynamic Analysis On Socket Channelmentioning
confidence: 99%
“…Unlike the back-up app named Helium mentioned in the paper of Bai, et al [23], app II doesn't implement a dynamic identity schemes. That means the exploitation of app II in this project, could be conducted in a very straight forward manner.…”
Section: Exploitationmentioning
confidence: 99%
See 1 more Smart Citation