Colluded Applications Vulnerabilities in Android Devices

被引:2
|
作者
Khokhlov, Igor [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI | 2017年
基金
美国国家科学基金会;
关键词
vulnerability; colluded applications; Android devices;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2017.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern smartphones may store user's very private information whose leakage may cause bad or even dramatic privacy and security violations. In this paper, we describe in details possible vulnerabilities whose exploitation can lead to a privacy leakage. These vulnerabilities depend on communication between colluded applications, which can employ either an overt or covert mode communication to bypass permission security mechanisms of the Android OS. Covert communication can even conceal the very fact of their communication act to help avoid a detection by anti-malware software. In the reported empirical study, we simulated various cases of both attack types on the Android device. By employing Android system monitor tools, signals characterizing applications allocated memory consumption and overall memory consumption as well as a CPU utilization have been recorded and analyzed over periods of time that included various attacks and only normal situation. The samples of recorded signals are presented. In these signals, distinctive patterns that can be used for the detection of colluded application attacks were identified.
引用
收藏
页码:462 / 469
页数:8
相关论文
共 50 条
  • [41] A UWB Through-Wall-Detection Radar System Based on Android Devices
    Tian, Dan
    Wang, Yong
    MEASUREMENT TECHNOLOGY AND ENGINEERING RESEARCHES IN INDUSTRY, PTS 1-3, 2013, 333-335 : 1518 - 1522
  • [42] Choosing the Weapon: A Comparative Study of Security Analyzers for Android Applications
    Joseph, Ryan B.
    Zibran, Minhaz F.
    Eishita, Farjana Z.
    2021 IEEE/ACIS 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2021, : 51 - 57
  • [43] LESDroid - A Tool for Detecting Exported Service Leaks of Android Applications
    Ma, Jun
    Liu, Shaocong
    Jiang, Yanyan
    Tao, Xianping
    Xu, Chang
    Lu, Jian
    2018 IEEE/ACM 26TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2018), 2018, : 244 - 254
  • [44] A Client/Server Malware Detection Model Based on Machine Learning for Android Devices
    Fournier, Arthur
    El Khoury, Franjieh
    Pierre, Samuel
    IOT, 2021, 2 (03): : 355 - 374
  • [45] Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats
    Smail, Boussaadi
    Sanchez, Domenic T.
    Peconcillo, Larry B., Jr.
    De Vera, John V.
    Horteza, Al D.
    Jawarneh, Malik
    Meenakshi
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2022, 13 (03): : 690 - 701
  • [46] Automatic Generation of Inter-Component Communication Exploits for Android Applications
    Garcia, Joshua
    Hammad, Mahmoud
    Ghorbani, Negar
    Malek, Sam
    ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 661 - 671
  • [47] Dynamic Loading Vulnerability Detection for Android Applications Through Ensemble Learning
    YANG Tianchang
    CUI Haoliang
    NIU Shaozhang
    Chinese Journal of Electronics, 2017, 26 (05) : 960 - 965
  • [48] Dynamic Loading Vulnerability Detection for Android Applications Through Ensemble Learning
    Yang Tianchang
    Cui Haoliang
    Niu Shaozhang
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (05) : 960 - 965
  • [49] Machine learning-based malware detection on Android devices using behavioral features
    Urmila, T. S.
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4659 - 4664
  • [50] Deep Learning and Web Applications Vulnerabilities Detection: An Approach Based on Large Language Models
    Nana, Sidwendluian Romaric
    Bassole, Didier
    Guel, Desire
    Sie, Oumarou
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (07) : 1391 - 1399