Malicious Behavior Analysis of Android GUI Based on ADB

被引:3
|
作者
Yang, Li [1 ]
Wang, Lijun [1 ]
Zhang, Dongdong [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; ADB; Activity hijacking;
D O I
10.1109/CSE-EUC.2017.211
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Android application is part of people's lives, however the functionality required by various user has greatly exceeded its original design. As a result, one must seek other ways to gain permission that is not directly available to the user. A typical approach is using the Android Debug Bridge (ADB), a developer tool that is used to grant permission to critical system resources. There are millions of downloads on Google Play that using this method. However, we found that ADB level functionality is not well protected by Android. A striking example of our investigation is that the ADB tool can be used to get the system application logs. Based on this finding, malicious applications can intelligently gather logs of application activity and then perform hijacking attacks. To understand this threat, we have developed an application that can detect the login time of the target application and then carry out the Activity hijacking attack, so as to obtain his account and password.
引用
收藏
页码:147 / 153
页数:7
相关论文
共 50 条
  • [31] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    [J]. IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [32] Android Malicious Application Detection Based on Improved Mayfly Algorithm
    Wei, Yinzhen
    Lu, Shuo
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1845 - 1852
  • [33] Android malicious code detection and recognition based on depth learning
    Jing, Yang
    [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 179 - 183
  • [34] Permission Sensitivity-Based Malicious Application Detection for Android
    Song, Yubo
    Geng, Yijin
    Wang, Junbo
    Gao, Shang
    Shi, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [36] Detecting malicious Android applications based on the network packets generated
    de la Puerta, Jose Gaviria
    Pastor-Lopez, Iker
    Porto, Igone
    Sanz, Borja
    Garcia Bringas, Pablo
    [J]. NEUROCOMPUTING, 2021, 456 : 629 - 636
  • [37] Malicious behaviour identification for android based on an RBF neural network
    Chen, Tianwei
    Qiang, Yongjun
    Tang, Chunming
    Wang, Zairong
    Luo, Ping
    Peng, Lingxi
    [J]. Wang, Zairong (wangzr@njtc.edu.cn), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (15): : 148 - 154
  • [38] ViTDroid: Vision Transformers for Efficient, Explainable Attention to Malicious Behavior in Android Binaries
    Syed, Toqeer Ali
    Nauman, Mohammad
    Khan, Sohail
    Jan, Salman
    Zuhairi, Megat F.
    [J]. Sensors, 2024, 24 (20)
  • [39] Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware
    Boileau, Catherine
    Gagnon, Francois
    Poisson, Jeremie
    Frenette, Simon
    Mejri, Mohammed
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 48 - 71
  • [40] Reinforcement Learning for Android GUI Testing
    Adamo, David
    Khan, Md Khorrom
    Koppula, Sreedevi
    Bryce, Renee
    [J]. PROCEEDINGS OF THE 9TH ACM SIGSOFT INTERNATIONAL WORKSHOP ON AUTOMATING TEST CASE DESIGN, SELECTION, AND EVALUATION (A-TEST '18), 2018, : 2 - 8