Colluded Applications Vulnerabilities in Android Devices

被引:2
|
作者
Khokhlov, Igor [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI | 2017年
基金
美国国家科学基金会;
关键词
vulnerability; colluded applications; Android devices;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2017.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern smartphones may store user's very private information whose leakage may cause bad or even dramatic privacy and security violations. In this paper, we describe in details possible vulnerabilities whose exploitation can lead to a privacy leakage. These vulnerabilities depend on communication between colluded applications, which can employ either an overt or covert mode communication to bypass permission security mechanisms of the Android OS. Covert communication can even conceal the very fact of their communication act to help avoid a detection by anti-malware software. In the reported empirical study, we simulated various cases of both attack types on the Android device. By employing Android system monitor tools, signals characterizing applications allocated memory consumption and overall memory consumption as well as a CPU utilization have been recorded and analyzed over periods of time that included various attacks and only normal situation. The samples of recorded signals are presented. In these signals, distinctive patterns that can be used for the detection of colluded application attacks were identified.
引用
收藏
页码:462 / 469
页数:8
相关论文
共 50 条
  • [21] Analysis on password protection in Android applications
    Shao Shuai
    Dong Guowei
    Guo Tao
    Yang Tianchang
    Shi Chenjie
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 504 - 507
  • [22] Unintentional Bugs to Vulnerability Mapping in Android Applications
    Bajwa, Garima
    Fazeen, Mohamed
    Dantu, Ram
    Tanpure, Sonal
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 176 - 178
  • [23] A Fast Boot, Fast Shutdown Technique for Android OS Devices
    Yang, Xia
    Shi, Peng
    Sun, Haiyong
    Zheng, Wenxuan
    Alves-Foss, Jim
    COMPUTER, 2016, 49 (07) : 62 - 68
  • [24] LaChouTi: Kernel Vulnerability Responding Framework for the Fragmented Android Devices
    Wu, Jingzheng
    Yang, Mutian
    ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 920 - 925
  • [25] An empirical investigation into open source web applications’ implementation vulnerabilities
    Toan Huynh
    James Miller
    Empirical Software Engineering, 2010, 15 : 556 - 576
  • [26] An empirical investigation into open source web applications' implementation vulnerabilities
    Huynh, Toan
    Miller, James
    EMPIRICAL SOFTWARE ENGINEERING, 2010, 15 (05) : 556 - 576
  • [27] Vulnerabilities in Web applications painful lessons; Advice (UN)heeded?
    Ankobia, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 223 - 228
  • [28] Poster Abstract: Analysis of Cyber-Security Vulnerabilities of Interconnected Medical Devices
    Xu, Yanchen
    Tran, Daniel
    Tian, Yuan
    Alemzadeh, Homa
    2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 23 - 24
  • [29] A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices
    Calatayud, Blas Molina
    Meany, Liam
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 694 - 701
  • [30] Syntactic-Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices
    Kalinin, Maxim
    Gribkov, Nikita
    SENSORS, 2024, 24 (22)