Self-update vulnerability in android안드로이드 업데이트 취약점

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 611
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Yongdae-
dc.contributor.advisor김용대-
dc.contributor.authorHwang, Sung Jae-
dc.contributor.author황성재-
dc.date.accessioned2017-03-29T02:41:18Z-
dc.date.available2017-03-29T02:41:18Z-
dc.date.issued2014-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=657512&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/221946-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2014.2 ,[v, 38 p. :]-
dc.description.abstractIt has been known that insecure software update causes serious security problems. Even though soft-ware updates in various systems such as medical devices, automobiles, and femtocells have been studied in deeply, little is understood update mechanisms in Android applications. In this thesis, I manually analyze self-update mechanisms in Android applications with most popular 225 real-world Android applications collected from Google Play. With careful analysis, two vulnerabilities have been found in self-updating mechanisms, i) distribution methods of updated files ii) usage of shared storage. By manually analyze 225 Android applica-tions, 37% of applications distribute updated files in insecure manner, and 33% of applications utilize shared storage for saving updated files. By exploiting self-update vulnerabilities, I have demonstrated that malware can be installed on vic-tim’s mobile devices. Moreover, I also show that injecting malicious code into updated files is also possible. As the adversaries can install malware on victim’s mobile devices, many attacks are possible including steal-ing user’s private data such as contact, SMS, and friend lists. Furthermore, by installing a malicious applica-tion, the mobile devices can be rooted and as a consequence, the adversaries can have root privilege.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectSoftware Update-
dc.subjectAndroid Application-
dc.subjectSelf-Update-
dc.subjectMalware-
dc.subjectCode Injection-
dc.subject소프트웨어 업데이트-
dc.subject안드로이드 어플리케이션-
dc.subject악성코드-
dc.subject코드 인젝션 공격-
dc.titleSelf-update vulnerability in android-
dc.title.alternative안드로이드 업데이트 취약점-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0