Account forgery and privilege escalation attacks on android home cloud devices
- Authors
- Cho, T.; Na, G.; Lee, D.; Yi, J.H.
- Issue Date
- 2015
- Publisher
- American Scientific Publishers
- Keywords
- Android; Obfuscation; Repackaging attack; Vulnerability analysis
- Citation
- Advanced Science Letters, v.21, no.3, pp.381 - 386
- Journal Title
- Advanced Science Letters
- Volume
- 21
- Number
- 3
- Start Page
- 381
- End Page
- 386
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/9622
- DOI
- 10.1166/asl.2015.5804
- ISSN
- 1936-6612
- Abstract
- A smart device supported by the Android platform, because of structural weaknesses, is vulnerable to the risk of repackaging. Attackers attempt to access personal information or important data of users through repackaging. Android supported home cloud devices are no exception. Not only are these devices vulnerable to repackaging due to running on the Android system but, like other smart devices, they are susceptible to having important data compromised. Because home cloud devices, in particular, use the cloud service to store personal information, an encroachment of that data may lead to a leaking of the user’s documents, photos, personal videos, etc. The problem arises when the attacker is authenticated as the valid home cloud device user and thus taps into the stored data within the device, giving support to the claim that the authentication process for authorizing privilege is the most important section from a security standpoint. Consequently, this paper analyzes an actual home cloud server supported by Android, reports the results of an attack simulation on the weaknesses in the authentication process, and proposes countermeasures to resolve relevant weaknesses in the process. © 2015 American Scientific Publishers. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Information Technology > School of Software > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.