Abstract

The Android application is part of people's lives, however the functionality required by various user has greatly exceeded its original design. As a result, one must seek other ways to gain permission that is not directly available to the user. A typical approach is using the Android Debug Bridge (ADB), a developer tool that is used to grant permission to critical system resources. There are millions of downloads on Google Play that using this method. However, we found that ADB level functionality is not well protected by Android. A striking example of our investigation is that the ADB tool can be used to get the system application logs. Based on this finding, malicious applications can intelligently gather logs of application activity and then perform hijacking attacks. To understand this threat, we have developed an application that can detect the login time of the target application and then carry out the Activity hijacking attack, so as to obtain his account and password.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.