Skip navigation
Please use this identifier to cite or link to this item:

acessibilidade

http://hdl.handle.net/20.500.12207/4788
wcag
Title: Exploring USB connection vulnerabilities on Android devices breaches using the Android debug bridge
Authors: Amarante, João
Barros, João Paulo
Keywords: Vulnerability
USB
Smartphone
Mobile Device
Computer Security
Physical Attack
Internet of Things
IoT
Mobile Cyber-physical Systems
Internet das coisas
Dispositivos móveis
Segurança
Issue Date: 24-Jul-2017
Publisher: SciTePress
Abstract: The complexity of avoiding vulnerabilities in the modern mobile operating systems makes them vulnerable to many types of attacks. This paper presents preliminary work in the creation of scenarios to surreptitiously extract private data from smartphones running different versions of the Android Operating System. Three scenarios were already identified and a proof of concept script was developed, all based on the use of the Android Debug Bridge tool. When running in a computer, the script is able to extract private data from a USB connected smartphone. In two scenarios it was possible to extract the information in a totally surreptitious way, without the user knowledge. In the third scenario, using a newer version of the Android operating system, a user action is needed which makes the attack less likely to succeed, but still possible.
Peer reviewed: yes
URI: http://hdl.handle.net/20.500.12207/4788
metadata.dc.identifier.doi: 10.5220/0006475905720577
ISBN: 978-989758259-2
Publisher version: http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0006475905720577
Appears in Collections:D-ENG - Comunicações com peer review

Files in This Item:
wcag
File Description SizeFormat 
64759.pdf146.31 kBAdobe PDFView/Open


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpace
Formato BibTex MendeleyEndnote Currículo DeGóis 

This item is licensed under a Creative Commons License Creative Commons