ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones

被引:0
|
作者
Karim, Imtiaz [1 ]
Cicala, Fabrizio [1 ]
Hussain, Syed Rafiul [2 ]
Chowdhury, Omar [3 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Univ Iowa, Iowa City, IA 52242 USA
来源
基金
英国工程与自然科学研究理事会;
关键词
Android smartphone security and privacy; vulnerabilities; attack;
D O I
10.1145/3416125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can be leveraged by malicious USB or Bluetooth peripherals to launch pernicious attacks. In this article, we propose ATFuzzer, which uses a grammar-guided evolutionary fuzzing approach that mutates production rules of the AT-command grammar instead of concrete AT commands to evaluate the correctness and robustness of the AT-command execution process. To automate each step of the analysis pipeline, ATFuzzer first takes as input the 3GPP and other vendor-specific standard documents and, following several heuristics, automatically extracts the seed AT command grammars for the fuzzer. ATFuzzer uses the seed to generate both valid and invalid grammars, following our cross-over and mutation strategies to evaluate both the integrity and execution of AT-commands. Empirical evaluation of ATFuzzer on 10 Android smartphones from 6 vendors revealed 4 invalid AT command grammars over Bluetooth and 14 over USB with implications ranging from DoS, downgrade of cellular protocol version, to severe privacy leaks. The vulnerabilities along with the invalid AT-command grammars were responsibly disclosed to affected vendors and assigned CVE's.
引用
收藏
页数:29
相关论文
共 50 条
  • [31] AndroTaint: An Efficient Android Malware Detection Framework using Dynamic Taint Analysis
    Shankar, Venkatesh Gauri
    Somani, Gaurav
    Gaur, Manoj Singh
    Laxmi, Vijay
    Conti, Mauro
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 71 - 83
  • [32] A Dynamic Online Protection Framework for Android Applications
    Xu, Junfeng
    Zhou, Linna
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2018, 33 (05): : 361 - 368
  • [33] A Dynamic Online Protection Framework for Android Applications
    Xu, Junfeng
    Zhou, Linna
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2018, 33 (02): : 149 - 156
  • [34] Android software vulnerability mining framework based on dynamic taint analysis technology
    Zhao Min
    Yang Haimin
    Chen Ping
    Yang Zhengxing
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2112 - 2115
  • [35] Digital Forensic Analysis of Discord Mobile Application on Android Based Smartphones
    Kara, Ilker
    ACTA INFOLOGICA, 2022, 6 (02): : 189 - 198
  • [36] Exploring the Design Space for Android Smartphones
    Hung, Shih-Hao
    Chen, Jen-Hao
    Tu, Chia-Heng
    Shieh, Jeng-Peng
    Chien, Roger
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 215 - 222
  • [37] On Security and Energy Efficiency in Android Smartphones
    Ferreira, Joao
    Santos, Bernardo
    Oliveira, Wellington
    Antunes, Nuno
    Cabral, Bruno
    Fernandes, Joao Paulo
    2023 IEEE/ACM 10TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2023, : 87 - 95
  • [38] Paranoid Android: Versatile Protection For Smartphones
    Portokalidis, Georgios
    Homburg, Philip
    Anagnostakis, Kostas
    Bos, Herbert
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 347 - 356
  • [39] Cloud Based SecuritySolution For Android Smartphones
    Marengereke, Tendai Munyaradzi
    Sornalakshmi, K.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [40] IN-DEPTH ANALYSIS OF ROOTKIT ATTACKS ON ANDROID-BASED SMARTPHONES
    Lobo, Desmond
    2011 INTERNATIONAL CONFERENCE ON COMPUTER AND COMPUTATIONAL INTELLIGENCE (ICCCI 2011), 2012, : 659 - 663