首页> 外文会议>IFIP-TC 6/TC 11 international conference on communications and multimedia security >USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations
【24h】

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations

机译:USB连接漏洞在Android智能手机:默认和供应商的自定义

获取原文

摘要

We expose an USB vulnerability in some vendors' customization of the android system, where the serial AT commands processed by the cellular modem are extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public places like airports. We unveil the implications of such vulnerability that culminate in flashing a compromised boot partition, root access, enable adb and install a surveillance application that is impossible to uninstall without re-flashing the android boot partition. All these attacks are done without user consent or knowledge on the attacked mobile phone.
机译:我们在Android系统的某些供应商的自定义中公开了USB漏洞,其中蜂窝调制解调器处理的命令串行扩展以允许其他功能。我们针对特定供应商系统的漏洞,并在现实的情景环境中展示了攻击概念的证明。为此,我们使用了一个明显的智能手机充电站,如现在在机场这样常见的智能手机充电站。我们揭示此类漏洞的含义,这些漏洞在闪烁泄露受损的引导分区,root访问权限,启用adb,并安装无法卸载的监控应用程序,而无需重新闪烁Android引导分区。所有这些攻击都是在没有用户同意或攻击手机上的知识的情况下完成的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号