Malicious Behavior Analysis of Android GUI Based on ADB

2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)(2017)

引用 4|浏览57
暂无评分
摘要
The Android application is part of people's lives, however the functionality required by various user has greatly exceeded its original design. As a result, one must seek other ways to gain permission that is not directly available to the user. A typical approach is using the Android Debug Bridge (ADB), a developer tool that is used to grant permission to critical system resources. There are millions of downloads on Google Play that using this method. However, we found that ADB level functionality is not well protected by Android. A striking example of our investigation is that the ADB tool can be used to get the system application logs. Based on this finding, malicious applications can intelligently gather logs of application activity and then perform hijacking attacks. To understand this threat, we have developed an application that can detect the login time of the target application and then carry out the Activity hijacking attack, so as to obtain his account and password.
更多
查看译文
关键词
Android,ADB,Activity hijacking
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要