作者: Zhongwen Zhang , Yuewu Wang , Jiwu Jing , Qiongxiao Wang , Lingguang Lei
DOI: 10.1007/978-3-319-08344-5_23
关键词: Rootkit 、 Permission 、 Internet privacy 、 Access control 、 Phone 、 Backup 、 Survivability 、 Compromise 、 Computer science 、 Computer security 、 Android (operating system)
摘要: Android permission system enforces access control to those privacy-related resources in phones. Unfortunately, the could be bypassed when phone is rooted. On a rooted phone, processes can run with root privilege and arbitrarily any without permission. Many people are willing their phones uninstall pre-installed applications, flash third party ROMs, backup so on. People use rootkit tools The mainstream China provided by some well-known security vendors. Besides root, these vendors also provide one-click-unroot function unroot phone. process gives users feeling that will roll back original safe state. In this paper, we present threats analysis of on once unrooted later. phones, two categories attacks: tampering data files attack code carried out. Also, attacks’ detection rate, damage degree, influence range, survivability real word analyzed. Analysis result shows even under Antivirus’ monitoring, attacks towards still out survive after unrooted. Therefore, faces long-term compromise. potential defense solutions discussed.