Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23098
|View full text |Cite
|
Sign up to set email alerts
|

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources

Abstract: The pervasiveness of security-critical external resources (e.g accessories, online services) poses new challenges to Android security. In prior research we revealed that given the BLUETOOTH and BLUETOOTH_ADMIN permissions, a malicious app on an authorized phone gains unfettered access to any Bluetooth device (e.g., Blood Glucose meter, etc.). Here we further show that sensitive text messages from online banking services and social networks (account balance, password reset links, etc.) are completely exposed to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…Abusing permission: malicious app logic abuses the privilege granted to the app [39], [31], [51] Exploiting weakness of general system design: generic system mechanisms such as IPC [63], [23] Exploiting weakness of platform specific features: techniques specific to platform, e.g., native code [19], [20], [49], [47] Exploiting system vulnerability: security flaws and bugs in the system e.g., root exploits [59], [71], [43], [65], [18] N/A Shadow payload: disguise malicious payload using obfuscation or encryption techniques [74], [55] Side channel: carry out malicious payload using covert channel [32], [70], [72], [29] Malicious payload…”
Section: ) Installationmentioning
confidence: 99%
See 1 more Smart Citation
“…Abusing permission: malicious app logic abuses the privilege granted to the app [39], [31], [51] Exploiting weakness of general system design: generic system mechanisms such as IPC [63], [23] Exploiting weakness of platform specific features: techniques specific to platform, e.g., native code [19], [20], [49], [47] Exploiting system vulnerability: security flaws and bugs in the system e.g., root exploits [59], [71], [43], [65], [18] N/A Shadow payload: disguise malicious payload using obfuscation or encryption techniques [74], [55] Side channel: carry out malicious payload using covert channel [32], [70], [72], [29] Malicious payload…”
Section: ) Installationmentioning
confidence: 99%
“…Remote control: Taking control of user's device with C&C servers [74], [46] Spyware: Aiming to gather information from the victims without their knowledge [39], [31], [51], [72], [48] Adware: Downloading and displaying unwanted ads on the user's device [58], [46], [42] Ransomware: Installed covertly to DoS the device and demands a ransom payment to restore it [45], [43] Privilege escalation: Exploiting a bug or design flaw of the system to gain elevated access [59], [65], [73], [47] N/A to achieve maximum benefit; (2) evade detection to prolong their life-time. Guided by these principles various adversary techniques are used that we categorize into 6 classes shown in Table II.…”
Section: ) Installationmentioning
confidence: 99%
“…Previous work highlighted the problems existing in Android device-to-device communications [11,20]. In particular, Demetriou et al [11] studied several channels of communication in Android (such as Bluetooth, SMS, Internet and audio) showing that the security model of Android does not offer adequate measures for protecting certain secrets. To address this problem, they build a security system, called SEACAT, to enforce fine-grained protection on the above resources.…”
Section: Related Workmentioning
confidence: 99%
“…Several solutions exist for securing cross-device communication. In the Android environment, they allow authentication of devices and communication channels [11,20]. However, these solutions are not sufficient to protect the entire communication flow.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation