2018
DOI: 10.1109/mce.2018.2797618
|View full text |Cite
|
Sign up to set email alerts
|

User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…Recent papers have exploited the pervasive auto-login feature in Android apps [16]- [18]. These studies share two common assumptions:…”
Section: B Exploiting Auto-login Function Work and Limitationsmentioning
confidence: 99%
See 4 more Smart Citations
“…Recent papers have exploited the pervasive auto-login feature in Android apps [16]- [18]. These studies share two common assumptions:…”
Section: B Exploiting Auto-login Function Work and Limitationsmentioning
confidence: 99%
“…Besides, according to the official Android security report [26], large families of harmful applications use privilege escalation exploits to root devices. These papers [16]- [18] demonstrated the feasibility of data-clone attacks with a very small number of apps-only six apps in total. However, none of them take device-consistency checks into consideration.…”
Section: Oem-made Phone Clone Appsmentioning
confidence: 99%
See 3 more Smart Citations