USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations

Résumé

We expose an USB vulnerability in some vendors’ customization of the android system, where the serial AT commands processed by the cellular modem are extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public places like airports. We unveil the implications of such vulnerability that culminate in flashing a compromised boot partition, root access, enable adb and install a surveillance application that is impossible to uninstall without re-flashing the android boot partition. All these attacks are done without user consent or knowledge on the attacked mobile phone.
Fichier principal
Vignette du fichier
978-3-662-44885-4_2_Chapter.pdf (463.99 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01404182 , version 1 (28-11-2016)

Licence

Paternité

Identifiants

Citer

André Pereira, Manuel Correia, Pedro Brandão. USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations. 15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.19-32, ⟨10.1007/978-3-662-44885-4_2⟩. ⟨hal-01404182⟩
75 Consultations
334 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More