Skip navigation
Utilize este identificador para referenciar este registo:

acessibilidade

http://hdl.handle.net/20.500.12207/4788
wcag
Título: Exploring USB connection vulnerabilities on Android devices breaches using the Android debug bridge
Autor: Amarante, João
Barros, João Paulo
Palavras-chave: Vulnerability
USB
Smartphone
Mobile Device
Computer Security
Physical Attack
Internet of Things
IoT
Mobile Cyber-physical Systems
Internet das coisas
Dispositivos móveis
Segurança
Data: 24-Jul-2017
Editora: SciTePress
Resumo: The complexity of avoiding vulnerabilities in the modern mobile operating systems makes them vulnerable to many types of attacks. This paper presents preliminary work in the creation of scenarios to surreptitiously extract private data from smartphones running different versions of the Android Operating System. Three scenarios were already identified and a proof of concept script was developed, all based on the use of the Android Debug Bridge tool. When running in a computer, the script is able to extract private data from a USB connected smartphone. In two scenarios it was possible to extract the information in a totally surreptitious way, without the user knowledge. In the third scenario, using a newer version of the Android operating system, a user action is needed which makes the attack less likely to succeed, but still possible.
Arbitragem científica: yes
URI: http://hdl.handle.net/20.500.12207/4788
DOI: 10.5220/0006475905720577
ISBN: 978-989758259-2
Versão do Editor: http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0006475905720577
Aparece nas coleções:D-ENG - Comunicações com peer review

Ficheiros deste registo:
wcag
Ficheiro Descrição TamanhoFormato 
64759.pdf146.31 kBAdobe PDFVer/Abrir


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpace
Formato BibTex MendeleyEndnote Currículo DeGóis 

Este registo está protegido por Licença Creative Commons Creative Commons