One class to rule them all: 0-day deserialization vulnerabilities in android
O Peles, R Hay - 9th USENIX workshop on offensive technologies …, 2015 - usenix.org
We present previously unknown high severity vulnerabilities in Android. The first is in the
Android Platform and Google Play Services. The Platform instance affects Android 4.3-5.1, M …
Android Platform and Google Play Services. The Platform instance affects Android 4.3-5.1, M …
Android root and its providers: A double-edged sword
Android root is the voluntary and legitimate process of gaining the highest privilege and full
control over a user's Android device. To facilitate the popular demand, a unique Android root …
control over a user's Android device. To facilitate the popular demand, a unique Android root …
[PDF][PDF] Execute this! analyzing unsafe and malicious dynamic code loading in android applications.
The design of the Android system allows applications to load additional code from external
sources at runtime. On the one hand, malware can use this capability to add malicious …
sources at runtime. On the one hand, malware can use this capability to add malicious …
Own your android! yet another universal root
W Xu, Y Fu - 9th USENIX Workshop on Offensive Technologies …, 2015 - usenix.org
Own your Android! Yet Another Universal Root Page 1 Own your Android! Yet Another
Universal Root Wen Xu1 Yubin Fu1 1Keen Team xuwen.sjtu@gmail.com qoobee1993@gmail.com …
Universal Root Wen Xu1 Yubin Fu1 1Keen Team xuwen.sjtu@gmail.com qoobee1993@gmail.com …
[PDF][PDF] Sidewinder: Targeted attack against Android in the golden age of ad libraries
By 2014, the number of Android users has grown to 1.1 billion and the number of Android
devices has reached 1.9 billion [1]. At the same time, enterprises are also embracing …
devices has reached 1.9 billion [1]. At the same time, enterprises are also embracing …
From system services freezing to system server shutdown in android: All you need is a loop in an app
The Android OS not only dominates 78.6% of the worldwide smartphone market in 2014, but
importantly has been widely used for mission critical tasks (eg, medical devices, auto/aircraft …
importantly has been widely used for mission critical tasks (eg, medical devices, auto/aircraft …
Android OS security: Risks and limitations
The number of Android based smartphones is growing rapidly. They are increasingly used
for security critical private and business applications, such as online banking or to access …
for security critical private and business applications, such as online banking or to access …
Native code execution control for attack mitigation on android
R Fedler, M Kulicke, J Schütte - Proceedings of the Third ACM workshop …, 2013 - dl.acm.org
Sophisticated malware targeting the Android mobile operating system increasingly utilizes
local root exploits. These allow for the escalation of privileges and subsequent automatic …
local root exploits. These allow for the escalation of privileges and subsequent automatic …
[PDF][PDF] All your droid are belong to us: A survey of current android attacks
In the past few years, mobile devices (smartphones, PDAs) have seen both their
computational power and their data connectivity rise to a level nearly equivalent to that …
computational power and their data connectivity rise to a level nearly equivalent to that …
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
We present a previously undisclosed vulnerability of Android OS which can be exploited by
mounting a Denial-of-Service attack that makes devices become totally unresponsive. We …
mounting a Denial-of-Service attack that makes devices become totally unresponsive. We …