4.5 Article

Exfiltrating data from Android devices

期刊

COMPUTERS & SECURITY
卷 48, 期 -, 页码 74-91

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2014.10.016

关键词

Android; Code injection; Covert exfiltration; Data exfiltration; Inaudible transmission; Mobile adversary model; Reverse engineering; SMALI; SMS transmission

向作者/读者索取更多资源

Modern mobile devices have security capabilities built into the native operating system, which are generally designed to ensure the security of personal or corporate data stored on the device, both at rest and in transit. In recent times, there has been interest from researchers and governments in securing as well as exfiltrating data stored on such devices (e.g. the high profile PRISM program involving the US Government). In this paper, we propose an adversary model for Android covert data exfiltration, and demonstrate how it can be used to construct a mobile data exfiltration technique (MDET) to covertly exfiltrate data from Android devices. Two proof-of-concepts were implemented to demonstrate the feasibility of exfiltrating data via SMS and inaudible audio transmission using standard mobile devices. (C) 2014 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据