ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones

被引:0
|
作者
Karim, Imtiaz [1 ]
Cicala, Fabrizio [1 ]
Hussain, Syed Rafiul [2 ]
Chowdhury, Omar [3 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Univ Iowa, Iowa City, IA 52242 USA
来源
基金
英国工程与自然科学研究理事会;
关键词
Android smartphone security and privacy; vulnerabilities; attack;
D O I
10.1145/3416125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can be leveraged by malicious USB or Bluetooth peripherals to launch pernicious attacks. In this article, we propose ATFuzzer, which uses a grammar-guided evolutionary fuzzing approach that mutates production rules of the AT-command grammar instead of concrete AT commands to evaluate the correctness and robustness of the AT-command execution process. To automate each step of the analysis pipeline, ATFuzzer first takes as input the 3GPP and other vendor-specific standard documents and, following several heuristics, automatically extracts the seed AT command grammars for the fuzzer. ATFuzzer uses the seed to generate both valid and invalid grammars, following our cross-over and mutation strategies to evaluate both the integrity and execution of AT-commands. Empirical evaluation of ATFuzzer on 10 Android smartphones from 6 vendors revealed 4 invalid AT command grammars over Bluetooth and 14 over USB with implications ranging from DoS, downgrade of cellular protocol version, to severe privacy leaks. The vulnerabilities along with the invalid AT-command grammars were responsibly disclosed to affected vendors and assigned CVE's.
引用
收藏
页数:29
相关论文
共 50 条
  • [41] MEGDroid: A model-driven event generation framework for dynamic android malware analysis
    Hasan, Hayyan
    Ladani, Behrouz Tork
    Zamani, Bahman
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 135
  • [42] Android App Performance Detection Framework Based on Dynamic Analysis of Function Call Graphs
    Zhang, Jianing
    Wang, Xueli
    Chen, Yunfang
    2019 THE WORLD SYMPOSIUM ON SOFTWARE ENGINEERING (WSSE 2019), 2015, : 1 - 5
  • [43] Dypermin: Dynamic permission mining framework for android platform
    Lyvas, Christos
    Lambrinoudakis, Costas
    Geneiatakis, Dimitris
    COMPUTERS & SECURITY, 2018, 77 : 472 - 487
  • [44] Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
    Belgarric, Pierre
    Fouque, Pierre-Alain
    Macario-Rat, Gilles
    Tibouchi, Mehdi
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 236 - 252
  • [45] Static and Dynamic Analysis of Android Malware
    Kapratwar, Ankita
    Di Troia, Fabio
    Stamp, Mark
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 653 - 662
  • [46] Artifacts for Dynamic Analysis of Android Apps
    Cai, Haipeng
    Ryder, Barbara G.
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 659 - 659
  • [47] A New DGNSS Positioning Infrastructure for Android Smartphones
    Weng, Duojie
    Gan, Xingli
    Chen, Wu
    Ji, Shengyue
    Lu, Yangwei
    SENSORS, 2020, 20 (02)
  • [48] SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning
    Manimaran, S.
    Sastry, V.N.
    Gopalan, N.P.
    Computers and Security, 2022, 118
  • [49] Activity Spoofing and Its Defense in Android Smartphones
    Cooley, Brett
    Wang, Haining
    Stavrou, Angelos
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 494 - 512
  • [50] Field measurements of mobile services with Android smartphones
    Alvarez, Andres
    Diaz, Almudena
    Merino, Pedro
    Javier Rivas, Fco
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 105 - 109