Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

The peril of fragmentation: Security hazards in android device driver customizations

Full metadata record
DC Field Value Language
dc.contributor.author이연준-
dc.contributor.authorZhou, Xiaoyong-
dc.contributor.authorZhang, Nan-
dc.contributor.authorNaveed, Muhammad-
dc.contributor.authorWang, Xiaofeng-
dc.date.accessioned2021-06-22T23:23:56Z-
dc.date.available2021-06-22T23:23:56Z-
dc.date.created2021-02-18-
dc.date.issued2014-05-
dc.identifier.issn1081-6011-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/22864-
dc.description.abstractAndroid phone manufacturers are under the perpetual pressure to move quickly on their new models, continuously customizing Android to fit their hardware. However, the security implications of this practice are less known, particularly when it comes to the changes made to Android's Linux device drivers, e.g., those for camera, GPS, NFC etc. In this paper, we report the first study aimed at a better understanding of the security risks in this customization process. Our study is based on ADDICTED, a new tool we built for automatically detecting some types of flaws in customized driver protection. Specifically, on a customized phone, ADDICTED performs dynamic analysis to correlate the operations on a security-sensitive device to its related Linux files, and then determines whether those files are under-protected on the Linux layer by comparing them with their counterparts on an official Android OS. In this way, we can detect a set of likely security flaws on the phone. Using the tool, we analyzed three popular phones from Samsung, identified their likely flaws and built end-to-end attacks that allow an unprivileged app to take pictures and screenshots, and even log the keys the user enters through touch screen. Some of those flaws are found to exist on over a hundred phone models and affect millions of users. We reported the flaws and helped the manufacturers fix those problems. We further studied the security settings of device files on 2423 factory images from major phone manufacturers, discovered over 1,000 vulnerable images and also gained insights about how they are distributed across different Android versions, carriers and countries.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-
dc.titleThe peril of fragmentation: Security hazards in android device driver customizations-
dc.typeArticle-
dc.contributor.affiliatedAuthor이연준-
dc.identifier.doi10.1109/SP.2014.33-
dc.identifier.scopusid2-s2.0-84914115732-
dc.identifier.bibliographicCitationS&P - IEEE Symposium on Security and Privacy, pp.409 - 423-
dc.relation.isPartOfS&P - IEEE Symposium on Security and Privacy-
dc.citation.titleS&P - IEEE Symposium on Security and Privacy-
dc.citation.startPage409-
dc.citation.endPage423-
dc.type.rimsART-
dc.description.journalClass3-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassother-
dc.subject.keywordPlusAndroid (operating system)-
dc.subject.keywordPlusData privacy-
dc.subject.keywordPlusManufacture-
dc.subject.keywordPlusTelephone sets-
dc.subject.keywordPlusTouch screens-
dc.subject.keywordAuthorAndroid Security-
dc.subject.keywordAuthorPrivacy-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/6956578?arnumber=6956578&SID=EBSCO:edseee-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Yeon joon photo

Lee, Yeon joon
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE