Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rooting android: Extending the ADB by an auto-connecting WiFi-accessible service
2012 (English)In: Lect. Notes Comput. Sci., 2012, 189-204 p.Conference paper, Published paper (Refereed)
Abstract [en]

The majority of malware seen on Android has a top-down approach often targeting application programming interfaces (API) of the financially rewarding telephony and short message service (SMS). In this paper we present a proof of concept of compromising an Android based smartphone by targeting the underlying Linux kernel. We adopt an unorthodox bottom-up approach on modifying the operating system to allow an application to re-route the Android debug bridge (ADB) daemon onto a wireless link. We support our research using case scenarios to show how information can be extracted and inserted into the smartphone without the knowledge of the user. We discuss how the Android build environment can be changed to harness functionality from secured operations. We also discuss how an application can be designed to function with minimum resources, be hidden and perform operations without user consent or interaction. We also provide an overview of how a rooted Android operating system can be misused.

Place, publisher, year, edition, pages
2012. 189-204 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 7161
Keyword [en]
ADB, Android, Bottom-Up, Mobile Operating System, Rooting, Mobile operating systems, Application programming interfaces (API), Robots, Security of data, Signal encoding, Smartphones, Information technology
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:kth:diva-128701DOI: 10.1007/978-3-642-29615-4_14ISI: 000310342000014Scopus ID: 2-s2.0-84862122498ISBN: 9783642296147 (print)OAI: oai:DiVA.org:kth-128701DiVA: diva2:652342
Conference
16th Nordic Conference on Secure IT Systems, NordSec 2011, 26 October 2011 through 28 October 2011, Tallinn
Note

QC 20130930

Available from: 2013-09-30 Created: 2013-09-16 Last updated: 2013-09-30Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Nazar, Assem
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 104 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf