ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones
被引:0
作者:
Karim, Imtiaz
论文数: 0引用数: 0
h-index: 0
机构:
Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USAPurdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
Karim, Imtiaz
[1
]
Cicala, Fabrizio
论文数: 0引用数: 0
h-index: 0
机构:
Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USAPurdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
Cicala, Fabrizio
[1
]
Hussain, Syed Rafiul
论文数: 0引用数: 0
h-index: 0
机构:
Penn State Univ, University Pk, PA 16802 USAPurdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
Hussain, Syed Rafiul
[2
]
Chowdhury, Omar
论文数: 0引用数: 0
h-index: 0
机构:
Univ Iowa, Iowa City, IA 52242 USAPurdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
Chowdhury, Omar
[3
]
Bertino, Elisa
论文数: 0引用数: 0
h-index: 0
机构:
Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USAPurdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
Bertino, Elisa
[1
]
机构:
[1] Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Univ Iowa, Iowa City, IA 52242 USA
来源:
DIGITAL THREATS: RESEARCH AND PRACTICE
|
2020年
/
1卷
/
04期
基金:
英国工程与自然科学研究理事会;
关键词:
Android smartphone security and privacy;
vulnerabilities;
attack;
D O I:
10.1145/3416125
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can be leveraged by malicious USB or Bluetooth peripherals to launch pernicious attacks. In this article, we propose ATFuzzer, which uses a grammar-guided evolutionary fuzzing approach that mutates production rules of the AT-command grammar instead of concrete AT commands to evaluate the correctness and robustness of the AT-command execution process. To automate each step of the analysis pipeline, ATFuzzer first takes as input the 3GPP and other vendor-specific standard documents and, following several heuristics, automatically extracts the seed AT command grammars for the fuzzer. ATFuzzer uses the seed to generate both valid and invalid grammars, following our cross-over and mutation strategies to evaluate both the integrity and execution of AT-commands. Empirical evaluation of ATFuzzer on 10 Android smartphones from 6 vendors revealed 4 invalid AT command grammars over Bluetooth and 14 over USB with implications ranging from DoS, downgrade of cellular protocol version, to severe privacy leaks. The vulnerabilities along with the invalid AT-command grammars were responsibly disclosed to affected vendors and assigned CVE's.