Colluded Applications Vulnerabilities in Android Devices

被引:2
|
作者
Khokhlov, Igor [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI | 2017年
基金
美国国家科学基金会;
关键词
vulnerability; colluded applications; Android devices;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2017.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern smartphones may store user's very private information whose leakage may cause bad or even dramatic privacy and security violations. In this paper, we describe in details possible vulnerabilities whose exploitation can lead to a privacy leakage. These vulnerabilities depend on communication between colluded applications, which can employ either an overt or covert mode communication to bypass permission security mechanisms of the Android OS. Covert communication can even conceal the very fact of their communication act to help avoid a detection by anti-malware software. In the reported empirical study, we simulated various cases of both attack types on the Android device. By employing Android system monitor tools, signals characterizing applications allocated memory consumption and overall memory consumption as well as a CPU utilization have been recorded and analyzed over periods of time that included various attacks and only normal situation. The samples of recorded signals are presented. In these signals, distinctive patterns that can be used for the detection of colluded application attacks were identified.
引用
收藏
页码:462 / 469
页数:8
相关论文
共 50 条
  • [1] Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices
    Khokhlov, Igor
    Ligade, Ninad
    Reznik, Leon
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [2] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices
    Meshram, P. D.
    Thool, R. C.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
  • [3] VULHUNTER: TOWARD DISCOVERING VULNERABILITIES IN ANDROID APPLICATIONS
    Qian, Chenxiong
    Luo, Xiapu
    Le, Yu
    Gu, Guofei
    IEEE MICRO, 2015, 35 (01) : 44 - 53
  • [4] How We Found These Vulnerabilities in Android Applications
    Ma, Bin
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 399 - 406
  • [5] Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled
    Munoz, Antonio
    ELECTRONICS, 2024, 13 (21)
  • [6] Bifocals: Analyzing WebView Vulnerabilities in Android Applications
    Chin, Erika
    Wagner, David
    INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 138 - 159
  • [7] Android Mobile Applications Vulnerabilities and Prevention Methods: A Review
    Abdullah, Hilmi
    Zeebaree, Subhi R. M.
    PROCEEDING OF 2021 2ND INFORMATION TECHNOLOGY TO ENHANCE E-LEARNING AND OTHER APPLICATION (IT-ELA 2021), 2021, : 148 - 153
  • [8] Detecting vulnerabilities in Android applications using event sequences
    Ratliff, Zachary B.
    Kuhn, D. Richard
    Ragsdale, Daniel J.
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 159 - 166
  • [9] Research of discovering vulnerabilities of NFC applications on Android platform
    Wang, Zhi-Qiang
    Liu, Qi-Xu
    Zhang, Yu-Qing
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 117 - 123
  • [10] Vulnerabilities in Banking Transactions with Mobile Devices Android: A Systematic Literature Review
    Ordonez-Ordonez, Pablo F.
    Herrera-Loaiza, Domingo D.
    Figueroa-Diaz, Roberth
    TECHNOLOGY TRENDS, 2019, 895 : 104 - 115