One class to rule them all: 0-day deserialization vulnerabilities in android
O Peles, R Hay - 9th USENIX workshop on offensive technologies …, 2015 - usenix.org
We present previously unknown high severity vulnerabilities in Android. The first is in the
Android Platform and Google Play Services. The Platform instance affects Android 4.3-5.1, M …
Android Platform and Google Play Services. The Platform instance affects Android 4.3-5.1, M …
Android root and its providers: A double-edged sword
Android root is the voluntary and legitimate process of gaining the highest privilege and full
control over a user's Android device. To facilitate the popular demand, a unique Android root …
control over a user's Android device. To facilitate the popular demand, a unique Android root …
[PDF][PDF] Execute this! analyzing unsafe and malicious dynamic code loading in android applications.
The design of the Android system allows applications to load additional code from external
sources at runtime. On the one hand, malware can use this capability to add malicious …
sources at runtime. On the one hand, malware can use this capability to add malicious …
Own your android! yet another universal root
W Xu, Y Fu - 9th USENIX Workshop on Offensive Technologies …, 2015 - usenix.org
Own your Android! Yet Another Universal Root Page 1 Own your Android! Yet Another
Universal Root Wen Xu1 Yubin Fu1 1Keen Team xuwen.sjtu@gmail.com qoobee1993@gmail.com …
Universal Root Wen Xu1 Yubin Fu1 1Keen Team xuwen.sjtu@gmail.com qoobee1993@gmail.com …
From system services freezing to system server shutdown in android: All you need is a loop in an app
The Android OS not only dominates 78.6% of the worldwide smartphone market in 2014, but
importantly has been widely used for mission critical tasks (eg, medical devices, auto/aircraft …
importantly has been widely used for mission critical tasks (eg, medical devices, auto/aircraft …
[PDF][PDF] Sidewinder: Targeted attack against Android in the golden age of ad libraries
By 2014, the number of Android users has grown to 1.1 billion and the number of Android
devices has reached 1.9 billion [1]. At the same time, enterprises are also embracing …
devices has reached 1.9 billion [1]. At the same time, enterprises are also embracing …
Native code execution control for attack mitigation on android
R Fedler, M Kulicke, J Schütte - Proceedings of the Third ACM workshop …, 2013 - dl.acm.org
Sophisticated malware targeting the Android mobile operating system increasingly utilizes
local root exploits. These allow for the escalation of privileges and subsequent automatic …
local root exploits. These allow for the escalation of privileges and subsequent automatic …
[PDF][PDF] All your droid are belong to us: A survey of current android attacks
In the past few years, mobile devices (smartphones, PDAs) have seen both their
computational power and their data connectivity rise to a level nearly equivalent to that …
computational power and their data connectivity rise to a level nearly equivalent to that …
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
We present a previously undisclosed vulnerability of Android OS which can be exploited by
mounting a Denial-of-Service attack that makes devices become totally unresponsive. We …
mounting a Denial-of-Service attack that makes devices become totally unresponsive. We …
fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations
R Hay - 11th USENIX Workshop on Offensive Technologies …, 2017 - usenix.org
We discuss the fastboot interface of the Android bootloader, an area of fragmentation in
Android devices. We then present a variety of vulnerabilities we have found across multiple …
Android devices. We then present a variety of vulnerabilities we have found across multiple …