Loading...

Welcome to Binder: a kernel level attack model for the Binder in Android operating system

Salehi, M ; Sharif University of Technology | 2017

512 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISTEL.2016.7881801
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2017
  4. Abstract:
  5. In this paper, we consider to seek vulnerabilities and we conduct possible attacks on the crucial and essential parts of Android OSs architecture including the framework and the Android kernel layers. As a regard, we explain the Binder component of Android OS from security point of view. Then, we demonstrate how to penetrate into the Binder and control data exchange mechanism in Android OS by proposing a kernel level attack model based on the hooking method. As a result, by implementing the attack model, it is illustrated that the Android processes are detectable and the data can be extracted from any process and system calls. © 2016 IEEE
  6. Keywords:
  7. Android security ; Binder component ; Smartphone security ; Android (operating system) ; Binders ; Bins ; Electronic data interchange ; Android securities ; Binder components ; Exchange mechanism ; Hooking method ; Kernel level attack ; Security point ; Smartphone securities ; System calls ; Mobile security
  8. Source: 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 156-161 ; 9781509034345 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/7881801