Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23049
|View full text |Cite
|
Sign up to set email alerts
|

Screenmilker: How to Milk Your Android Screen for Secrets

Abstract: With the rapid increase in Android device popularity, the capabilities that the diverse user base demands from Android have significantly exceeded its original design. As a result, people have to seek ways to obtain the permissions not directly offered to ordinary users. A typical way to do that is using the Android Debug Bridge (ADB), a developer tool that has been granted permissions to use critical system resources. Apps adopting this solution have combined tens of millions of downloads on Google Play. Howe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
64
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(66 citation statements)
references
References 10 publications
1
64
0
1
Order By: Relevance
“…There is a large body of work on direct and side-channel attacks that can be performed by malicious Android apps to steal other apps' secrets [10,28,30,40,49,57]. All of these papers assume that the victim has installed a malicious app on his or her device.…”
Section: Related Workmentioning
confidence: 99%
“…There is a large body of work on direct and side-channel attacks that can be performed by malicious Android apps to steal other apps' secrets [10,28,30,40,49,57]. All of these papers assume that the victim has installed a malicious app on his or her device.…”
Section: Related Workmentioning
confidence: 99%
“…Security of such mobile systems has been widely studied in the past decade, mostly in the context of Android [31], [36], [42], [45], [66], [67], with some limited effort on iOS [34], [37]. Of particular interest here are a series of side-channel attacks, which empower an untrusted third-party app (e.g., free games) to infer private user information by monitoring the execution of OS services or trusted apps (e.g., banking apps).…”
Section: Introductionmentioning
confidence: 99%
“…So far, this line of research has only been conducted on Android, with numerous studies [31], [36], [42], [45], [64], [67] showing that the OS and its underlying Linux kernel fail to properly control the information leaks from seemingly harmless sourcesprocfs, a pseudo filesystem available on UNIX-like operating systems (including Android) to export some kernel statistics (e.g., virtual and physical memory, CPU and network usage) to the user space. These statistics can be classified into two categories: per-process statistics and global statistics.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this scheme cannot detect a specific screen among multiple screens composing an Activity and, moreover, can fail to detect an Activity in an app that has a complex connection structure among Activities. In Screenmilker [3], a malicious screenshot app detects a soft keyboard pop-up by the memory usage to capture a user's keystrokes. However, this attack is possible only in those smartphones in which the screenshot app has been installed using the ADB debugging tool.…”
Section: Introductionmentioning
confidence: 99%