2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2017
DOI: 10.1109/eurospw.2017.57
|View full text |Cite
|
Sign up to set email alerts
|

From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…While the main attack demonstrated here is crafted to the Nexus 6P phone, many more phones use similar device drivers [12]. A small scale review performed by the authors on three additional phones that contain a Synaptics touch controller (Samsung Galaxy S5, LG Nexus 5x, LG Nexus 5) shows similar vulnerabilities to the ones exploited in the attack described here.…”
Section: Attacking Additional Devicesmentioning
confidence: 73%
See 2 more Smart Citations
“…While the main attack demonstrated here is crafted to the Nexus 6P phone, many more phones use similar device drivers [12]. A small scale review performed by the authors on three additional phones that contain a Synaptics touch controller (Samsung Galaxy S5, LG Nexus 5x, LG Nexus 5) shows similar vulnerabilities to the ones exploited in the attack described here.…”
Section: Attacking Additional Devicesmentioning
confidence: 73%
“…As stated in [12], attacks based on malicious hardware can be divided into two different classes. First-order attacks use the standard interaction modes of the component, but do so without the user's knowledge or consent.…”
Section: What Sort Of Damage Can It Cause?mentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of devices that incorporate FRUs include interface cards in routers, touch screens and sensor assemblies in mobile phones, ink cartridges in printers, batteries in health sensors, and so on. As noted by Shwartz et al [8], third-party FRU installations often use cheap components of unknown pedigree, and thus may introduce, knowingly or unknowingly, counterfeit or malicious components into otherwise secure devices. Shwartz et al divided attacks based on malicious FRUs into two different classes: first-order attacks, in which the malicious FRU falsifies interactions with the device in the ways a standard user would, but without the user's consent, and second-order attacks, which go beyond exchanging properly formed data, and attempt to cause a malfunction in the device driver and compromise the operating system kernel.…”
Section: Introductionmentioning
confidence: 99%