2016
DOI: 10.1587/transinf.2015edl8188
|View full text |Cite
|
Sign up to set email alerts
|

Inishing: A UI Phishing Attack to Exploit the Vulnerability of Inotify in Android Smartphones

Abstract: SUMMARYIn Android OS, we discover that a notification service called inotify is a new side-channel allowing malware to identify file accesses associated with the display of a security-relevant UI screen. This paper proposes a phishing attack that detects victim UI screens by their file accesses in applications and steals private information.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Then, it prunes the list of recorded file system events of any entry not in the FSSignature K . This allows to filter out those events that the appSignVerifier accidentally recorded while monitoring any file creation event in a directory 3 .…”
Section: Function #3 -Signatureverifiermentioning
confidence: 99%
See 2 more Smart Citations
“…Then, it prunes the list of recorded file system events of any entry not in the FSSignature K . This allows to filter out those events that the appSignVerifier accidentally recorded while monitoring any file creation event in a directory 3 .…”
Section: Function #3 -Signatureverifiermentioning
confidence: 99%
“…Fourth, in our analysis, we dwelt on monitoring a single file, and given its effectiveness, we explored no further; Ahn et al [3], instead, focused on a sequence of events. Although there is a margin for improvement, our work is mainly concerned with showing the existence of this new attack and how to stop it.…”
Section: Limitations and Conclusionmentioning
confidence: 99%
See 1 more Smart Citation