Colluded Applications Vulnerabilities in Android Devices

被引:2
|
作者
Khokhlov, Igor [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI | 2017年
基金
美国国家科学基金会;
关键词
vulnerability; colluded applications; Android devices;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2017.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern smartphones may store user's very private information whose leakage may cause bad or even dramatic privacy and security violations. In this paper, we describe in details possible vulnerabilities whose exploitation can lead to a privacy leakage. These vulnerabilities depend on communication between colluded applications, which can employ either an overt or covert mode communication to bypass permission security mechanisms of the Android OS. Covert communication can even conceal the very fact of their communication act to help avoid a detection by anti-malware software. In the reported empirical study, we simulated various cases of both attack types on the Android device. By employing Android system monitor tools, signals characterizing applications allocated memory consumption and overall memory consumption as well as a CPU utilization have been recorded and analyzed over periods of time that included various attacks and only normal situation. The samples of recorded signals are presented. In these signals, distinctive patterns that can be used for the detection of colluded application attacks were identified.
引用
收藏
页码:462 / 469
页数:8
相关论文
共 50 条
  • [31] Assessment of Source Data Vulnerability to Reproduction in Android Applications
    Shafi, Muhammad
    Israr, Muhammad
    Khan, Muhammad Sohail
    Khattak, Muhammad Irfan
    Syed, Togeer Ali
    2017 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2017, : 122 - 126
  • [32] Quorum Chain-Based Malware Detection in Android Smart Devices
    Gao, Fei
    Jiang, Frank
    Zhang, Yuping
    Doss, Robin
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2019, 2019, 1113 : 212 - 224
  • [33] Automated Extraction of Feature Models from Android Based Portable Devices
    Yildirim, Ilker
    Sozer, Hasan
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 441 - 448
  • [34] Solutions For Designing Software Modules Used By Android Devices In Inventory Management
    Serbanescu, Liviu
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON VIRTUAL LEARNING, ICVL 2018, 2018, : 435 - 439
  • [35] Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices
    Lu, Hui
    Helu, Xiaohan
    Jin, Chengjie
    Sun, Yanbin
    Zhang, Man
    Tian, Zhihong
    IEEE ACCESS, 2019, 7 : 178321 - 178330
  • [36] Design and Implementation of an Ad Hoc Network among Android Smart Devices
    Alam, Tanweer
    Aljohani, Mohammed
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1322 - 1327
  • [37] Towards Automated Detection of Higher-Order Memory Corruption Vulnerabilities in Embedded Devices
    Yu, Lei
    Li, Linyu
    Wang, Haoyu
    Wang, Xiaoyu
    He, Houhua
    Gong, Xiaorui
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1707 - 1710
  • [38] Modelling Analysis and Auto Detection of Cryptographic Misuse in Android Applications
    Shao Shuai
    Dong Guowei
    Guo Tao
    Yang Tianchang
    Shi Chenjie
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 75 - +
  • [39] A Technique for Evaluation and Detection of Potentially Vulnerable Code in Android Applications
    Ferreira, Ricardo Luis D. M.
    dos Santos, Anderson F. P.
    Choren, Ricardo
    2017 12TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2017,
  • [40] An Approach to Secure Communication in Mobile Ad-Hoc Networks of Android Devices
    Alam, Tanweer
    Aljohani, Mohammed
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2015, : 371 - 375