One class to rule them all: 0-day deserialization vulnerabilities in android

O Peles, R Hay - 9th USENIX workshop on offensive technologies …, 2015 - usenix.org
We present previously unknown high severity vulnerabilities in Android. The first is in the
Android Platform and Google Play Services. The Platform instance affects Android 4.3-5.1, M …

Android root and its providers: A double-edged sword

H Zhang, D She, Z Qian - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Android root is the voluntary and legitimate process of gaining the highest privilege and full
control over a user's Android device. To facilitate the popular demand, a unique Android root …

[PDF][PDF] Execute this! analyzing unsafe and malicious dynamic code loading in android applications.

S Poeplau, Y Fratantonio, A Bianchi, C Kruegel… - NDSS, 2014 - lilicoding.github.io
The design of the Android system allows applications to load additional code from external
sources at runtime. On the one hand, malware can use this capability to add malicious …

Own your android! yet another universal root

W Xu, Y Fu - 9th USENIX Workshop on Offensive Technologies …, 2015 - usenix.org
Own your Android! Yet Another Universal Root Page 1 Own your Android! Yet Another
Universal Root Wen Xu1 Yubin Fu1 1Keen Team xuwen.sjtu@gmail.com qoobee1993@gmail.com …

[PDF][PDF] Sidewinder: Targeted attack against Android in the golden age of ad libraries

T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song - Black Hat, 2014 - blackhat.com
By 2014, the number of Android users has grown to 1.1 billion and the number of Android
devices has reached 1.9 billion [1]. At the same time, enterprises are also embracing …

From system services freezing to system server shutdown in android: All you need is a loop in an app

H Huang, S Zhu, K Chen, P Liu - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
The Android OS not only dominates 78.6% of the worldwide smartphone market in 2014, but
importantly has been widely used for mission critical tasks (eg, medical devices, auto/aircraft …

Android OS security: Risks and limitations

R Fedler, C Banse, C Krauss, V Fusenig - 2012 - publica.fraunhofer.de
The number of Android based smartphones is growing rapidly. They are increasingly used
for security critical private and business applications, such as online banking or to access …

Native code execution control for attack mitigation on android

R Fedler, M Kulicke, J Schütte - Proceedings of the Third ACM workshop …, 2013 - dl.acm.org
Sophisticated malware targeting the Android mobile operating system increasingly utilizes
local root exploits. These allow for the escalation of privileges and subsequent automatic …

[PDF][PDF] All your droid are belong to us: A survey of current android attacks

T Vidas, D Votipka, N Christin - 5th USENIX Workshop on Offensive …, 2011 - usenix.org
In the past few years, mobile devices (smartphones, PDAs) have seen both their
computational power and their data connectivity rise to a level nearly equivalent to that …

Would you mind forking this process? A denial of service attack on Android (and some countermeasures)

A Armando, A Merlo, M Migliardi… - Information Security and …, 2012 - Springer
We present a previously undisclosed vulnerability of Android OS which can be exploited by
mounting a Denial-of-Service attack that makes devices become totally unresponsive. We …