Please use this identifier to cite or link to this item:
acessibilidade
http://hdl.handle.net/20.500.12207/4788
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Amarante, João | - |
dc.contributor.author | Barros, João Paulo | - |
dc.date.accessioned | 2019-02-18T14:37:47Z | - |
dc.date.available | 2019-02-18T14:37:47Z | - |
dc.date.issued | 2017-07-24 | - |
dc.identifier.isbn | 978-989758259-2 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.12207/4788 | - |
dc.description.abstract | The complexity of avoiding vulnerabilities in the modern mobile operating systems makes them vulnerable to many types of attacks. This paper presents preliminary work in the creation of scenarios to surreptitiously extract private data from smartphones running different versions of the Android Operating System. Three scenarios were already identified and a proof of concept script was developed, all based on the use of the Android Debug Bridge tool. When running in a computer, the script is able to extract private data from a USB connected smartphone. In two scenarios it was possible to extract the information in a totally surreptitious way, without the user knowledge. In the third scenario, using a newer version of the Android operating system, a user action is needed which makes the attack less likely to succeed, but still possible. | por |
dc.language.iso | eng | por |
dc.publisher | SciTePress | por |
dc.rights | openAccess | por |
dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | por |
dc.subject | Vulnerability | por |
dc.subject | USB | por |
dc.subject | Smartphone | por |
dc.subject | Mobile Device | por |
dc.subject | Computer Security | por |
dc.subject | Physical Attack | por |
dc.subject | Internet of Things | por |
dc.subject | IoT | por |
dc.subject | Mobile Cyber-physical Systems | por |
dc.subject | Internet das coisas | por |
dc.subject | Dispositivos móveis | por |
dc.subject | Segurança | por |
dc.title | Exploring USB connection vulnerabilities on Android devices breaches using the Android debug bridge | por |
dc.type | conferenceObject | por |
dc.peerreviewed | yes | por |
dc.relation.publisherversion | http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0006475905720577 | por |
degois.publication.firstPage | 572 | por |
degois.publication.lastPage | 577 | por |
degois.publication.location | Madrid (Spain); 24-26 July, 2017 | por |
degois.publication.title | 14th International Joint Conference on e-Business and Telecommunications, ICETE 2017 | por |
dc.identifier.doi | 10.5220/0006475905720577 | por |
Appears in Collections: | D-ENG - Comunicações com peer review |
This item is licensed under a Creative Commons License