The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations

作者: Xiaoyong Zhou , Yeonjoon Lee , Nan Zhang , Muhammad Naveed , XiaoFeng Wang

DOI: 10.1109/SP.2014.33

关键词: Android deviceAndroid BeamPersonalizationGlobal Positioning SystemComputer scienceComputer securityAndroid (operating system)

摘要: … of such security hazards in device customizations, we further scanned over 2423 factory images from Samsung, LG and HTC for LCFs, through searching for the device-related files on …

参考文章(28)
Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Run-Time Enforcement of Information-Flow Properties on Android european symposium on research in computer security. pp. 775- 792 ,(2013) , 10.1007/978-3-642-40203-6_43
Kehuan Zhang, XiaoFeng Wang, Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems usenix security symposium. pp. 17- 32 ,(2009)
Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna, PiOS : Detecting privacy leaks in iOS applications network and distributed system security symposium. ,(2011)
Shashi Shekhar, Michael Dietz, Anhei Shu, Dan S. Wallach, Yuliy Pisetsky, Quire: lightweight provenance for smart phone operating systems usenix security symposium. pp. 23- 23 ,(2011)
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
Engin Kirda, Paolo Milani Comparetti, Christopher Kruegel, Clemens Kolbitsch, Xiaoyong Zhou, XiaoFeng Wang, Effective and efficient malware detection at the end host usenix security symposium. pp. 351- 366 ,(2009)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang, CHEX Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 229- 240 ,(2012) , 10.1145/2382196.2382223
Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt, Identity, location, disease and more: inferring your secrets from android public resources computer and communications security. pp. 1017- 1028 ,(2013) , 10.1145/2508859.2516661