2018
DOI: 10.1155/2018/2489214
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

Abstract: It is pretty well known that insecure code updating procedures for Android allow remote code injection attack. However, other than codes, there are many resources in Android that have to be updated, such as temporary files, images, databases, and configurations (XML and JSON). Security of update procedures for these resources is largely unknown. This paper investigates general conditions for remote code injection attacks on these resources. Using this, we design and implement a static detection tool that autom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…When there was a delay of 10 seconds for the response after the sleep command of 10 seconds, we confirmed the code injection vulnerability. This is a very serious issue that can lead to complete compromise of the application's data and functionality, and the server that's hosting the application [4]. Due to ethical reasons, we limit our attack in detecting this vulnerability.…”
Section: Improper Access Controlmentioning
confidence: 99%
“…When there was a delay of 10 seconds for the response after the sleep command of 10 seconds, we confirmed the code injection vulnerability. This is a very serious issue that can lead to complete compromise of the application's data and functionality, and the server that's hosting the application [4]. Due to ethical reasons, we limit our attack in detecting this vulnerability.…”
Section: Improper Access Controlmentioning
confidence: 99%
“…Another scenario is also possible, as shown in Figure 2b. For example, the attacker can establish a rogue wireless access point, as presented in [25]. Based on our assumption on the attacker's ability, the attacker can inject a malicious code when the user downloads resources or applications via the untrusted/compromised communication medium.…”
Section: Our Attack and Threat Modelmentioning
confidence: 99%