Self-update vulnerability in android안드로이드 업데이트 취약점

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 592
  • Download : 0
It has been known that insecure software update causes serious security problems. Even though soft-ware updates in various systems such as medical devices, automobiles, and femtocells have been studied in deeply, little is understood update mechanisms in Android applications. In this thesis, I manually analyze self-update mechanisms in Android applications with most popular 225 real-world Android applications collected from Google Play. With careful analysis, two vulnerabilities have been found in self-updating mechanisms, i) distribution methods of updated files ii) usage of shared storage. By manually analyze 225 Android applica-tions, 37% of applications distribute updated files in insecure manner, and 33% of applications utilize shared storage for saving updated files. By exploiting self-update vulnerabilities, I have demonstrated that malware can be installed on vic-tim’s mobile devices. Moreover, I also show that injecting malicious code into updated files is also possible. As the adversaries can install malware on victim’s mobile devices, many attacks are possible including steal-ing user’s private data such as contact, SMS, and friend lists. Furthermore, by installing a malicious applica-tion, the mobile devices can be rooted and as a consequence, the adversaries can have root privilege.
Advisors
Kim, Yongdaeresearcher김용대researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2014
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2014.2 ,[v, 38 p. :]

Keywords

Software Update; Android Application; Self-Update; Malware; Code Injection; 소프트웨어 업데이트; 안드로이드 어플리케이션; 악성코드; 코드 인젝션 공격

URI
http://hdl.handle.net/10203/221946
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=657512&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0