2019
DOI: 10.1109/access.2019.2958837
|View full text |Cite
|
Sign up to set email alerts
|

Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices

Abstract: Android system attackers have proposed various attack schemes to invade users' privacy. One way is to use ADB (Android Debug Bridge) with advanced permissions but low protection. In order to set up an ADB connection successfully, the USB debugging option of the target device must be turned on. However, the existing ADB-based attack schemes have not proposed how to enable the USB debugging, so it couldn't be considered that their attack chain is completable. This paper presents an approach for attacking Android… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…One way is to restrict writing and modification permissions. In addition, all the developer's features should be disabled including debugging privilege [38]. To avoid reverse engineering (or to make it harder), data encryption and code obfuscation mechanisms should be established.…”
Section: E Integrity and Confidentialitymentioning
confidence: 99%
“…One way is to restrict writing and modification permissions. In addition, all the developer's features should be disabled including debugging privilege [38]. To avoid reverse engineering (or to make it harder), data encryption and code obfuscation mechanisms should be established.…”
Section: E Integrity and Confidentialitymentioning
confidence: 99%
“…Tools and software as listed in Table 1 are needed for the exploitation so that remote access can be done through ADB. The tools and software that are used consist of Laptop MSI-GF639SCSR, Xiaomi Redmi Note 5 brand smartphone with Android 9 & Android 12 (AOSP) version, Xiaomi Redmi 5 Plus brand smartphone with Android 8.1 version, Vivo Y71 brand Smartphone with Android 8.1 version, and Kali Linux 21.1 as operating system [18]. The Ghost Framework is a tool to do the exploitation process for remote access devices.…”
Section: 4mentioning
confidence: 99%
“…The Ghost Framework tool can be used to test whether or not remote access [18]. These tools will be used in this study to do exploitation the smartphone with the Android system.…”
Section: Introductionmentioning
confidence: 99%
“…Due to system complexity and requirements, software and hardware security remain fundamentally difficult, with extensive vulnerabilities reported in each iteration of devices [14,68] and in their wired [69][70][71][72] and wireless [73,74] peripherals. Data extraction tools rely on these vulnerabilities [5,14,64] and have remained successful in practice [14,21,22,31], therefore our analysis focuses squarely on what confidentiality remains when these protections are bypassed.…”
Section: Threat Modelmentioning
confidence: 99%