USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations

dc.contributor.author Pereira,A en
dc.contributor.author Manuel Eduardo Correia en
dc.contributor.author Brandao,P en
dc.date.accessioned 2017-11-20T10:50:06Z
dc.date.available 2017-11-20T10:50:06Z
dc.date.issued 2014 en
dc.description.abstract We expose an USB vulnerability in some vendors' customization of the android system, where the serial AT commands processed by the cellular modem are extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public places like airports. We unveil the implications of such vulnerability that culminate in flashing a compromised boot partition, root access, enable adb and install a surveillance application that is impossible to uninstall without re-flashing the android boot partition. All these attacks are done without user consent or knowledge on the attacked mobile phone. en
dc.identifier.uri http://repositorio.inesctec.pt/handle/123456789/3631
dc.identifier.uri http://dx.doi.org/10.1007/978-3-662-44885-4_2 en
dc.language eng en
dc.relation 5150 en
dc.rights info:eu-repo/semantics/openAccess en
dc.title USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations en
dc.type conferenceObject en
dc.type Publication en
Files