Android root and its providers: A double-edged sword

H Zhang, D She, Z Qian - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Android root is the voluntary and legitimate process of gaining the highest privilege and full
control over a user's Android device. To facilitate the popular demand, a unique Android root …

Android rooting: Methods, detection, and evasion

ST Sun, A Cuadros, K Beznosov - Proceedings of the 5th Annual ACM …, 2015 - dl.acm.org
Android rooting enables device owners to freely customize their own devices and run useful
apps that require root privileges. While useful, rooting weakens the security of Android …

Own your android! yet another universal root

W Xu, Y Fu - 9th USENIX Workshop on Offensive Technologies …, 2015 - usenix.org
Own your Android! Yet Another Universal Root Page 1 Own your Android! Yet Another
Universal Root Wen Xu1 Yubin Fu1 1Keen Team xuwen.sjtu@gmail.com qoobee1993@gmail.com …

PREC: practical root exploit containment for android devices

TH Ho, D Dean, X Gu, W Enck - Proceedings of the 4th ACM conference …, 2014 - dl.acm.org
Application markets such as the Google Play Store and the Apple App Store have become
the de facto method of distributing software to mobile devices. While official markets …

Towards understanding Android system vulnerabilities: techniques and insights

D Wu, D Gao, EKT Cheng, Y Cao, J Jiang… - Proceedings of the 2019 …, 2019 - dl.acm.org
As a common platform for pervasive devices, Android has been targeted by numerous
attacks that exploit vulnerabilities in its apps and the operating system. Compared to app …

A survey of Android exploits in the wild

H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang - Computers & Security, 2018 - Elsevier
The Android operating system has been dominating the mobile device market in recent
years. Although Android has actively strengthened its security mechanisms and fixed a great …

Rootguard: Protecting rooted android phones

Y Shao, X Luo, C Qian - Computer, 2014 - ieeexplore.ieee.org
Though popular for achieving full operation functionality, rooting Android phones opens
these devices to significant security threats. RootGuard offers protection from malware with …

One class to rule them all: 0-day deserialization vulnerabilities in android

O Peles, R Hay - 9th USENIX workshop on offensive technologies …, 2015 - usenix.org
We present previously unknown high severity vulnerabilities in Android. The first is in the
Android Platform and Google Play Services. The Platform instance affects Android 4.3-5.1, M …

Native code execution control for attack mitigation on android

R Fedler, M Kulicke, J Schütte - Proceedings of the Third ACM workshop …, 2013 - dl.acm.org
Sophisticated malware targeting the Android mobile operating system increasingly utilizes
local root exploits. These allow for the escalation of privileges and subsequent automatic …

AndroVul: A repository for Android security vulnerabilities

Z Namrud, S Kpodjedo, C Talhi - Proceedings of the 29th Annual …, 2019 - dl.acm.org
Security issues in mobile apps are increasingly relevant as these software have become
part of the daily life for billions. As the dominant OS, Android is a primary target for ill …