2022
DOI: 10.1016/j.jksuci.2020.07.006
|View full text |Cite
|
Sign up to set email alerts
|

Android sensitive data leakage prevention with rooting detection using Java function hooking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0
1

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 15 publications
0
14
0
1
Order By: Relevance
“…It unlocks all the system files and functions by gaining the root privilege in the device. DroidKungfu malware uses the exploits known as RageAgainstTheCage (CVE-2010-EASY) and Exploid (CVE-2009-1185) to escalate privileges [18]. Such attacks are prevented by Security Enhanced (SE) Android present in android devices.…”
Section: Kernel Layermentioning
confidence: 99%
See 4 more Smart Citations
“…It unlocks all the system files and functions by gaining the root privilege in the device. DroidKungfu malware uses the exploits known as RageAgainstTheCage (CVE-2010-EASY) and Exploid (CVE-2009-1185) to escalate privileges [18]. Such attacks are prevented by Security Enhanced (SE) Android present in android devices.…”
Section: Kernel Layermentioning
confidence: 99%
“…Such attacks are prevented by Security Enhanced (SE) Android present in android devices. • Gooligan Attack: It is a malware that exploits the zero-day vulnerability (CVE-2013-6282) found in kernel API, [18] the zero-day vulnerability is called "zero-day" because it is the duration during which vulnerability is exposed and used by the attackers while there is no patch provided by the vendor. In such kinds of attacks, some malware application is used to perform the read/write operations on the memory of the kernel.…”
Section: Kernel Layermentioning
confidence: 99%
See 3 more Smart Citations