loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: João Amarante 1 and João Paulo Barros 2

Affiliations: 1 Polytechnic Institute of Beja, Portugal ; 2 Polytechnic Institute of Beja and UNINOVA-CTS, Portugal

Keyword(s): Vulnerability, USB, Smartphone, Mobile Device, Computer Security, Physical Attack, Internet of Things, IoT, Mobile Cyber-physical Systems.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Information and Systems Security ; Security and Privacy in Mobile Systems ; Security and Privacy in Pervasive/Ubiquitous Computing

Abstract: The complexity of avoiding vulnerabilities in the modern mobile operating systems makes them vulnerable to many types of attacks. This paper presents preliminary work in the creation of scenarios to surreptitiously extract private data from smartphones running different versions of the Android Operating System. Three scenarios were already identified and a proof of concept script was developed, all based on the use of the Android Debug Bridge tool. When running in a computer, the script is able to extract private data from a USB connected smartphone. In two scenarios it was possible to extract the information in a totally surreptitious way, without the user knowledge. In the third scenario, using a newer version of the Android operating system, a user action is needed which makes the attack less likely to succeed, but still possible.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.220.140.5

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Amarante, J. and Barros, J. (2017). Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT; ISBN 978-989-758-259-2; ISSN 2184-3236, SciTePress, pages 572-577. DOI: 10.5220/0006475905720577

@conference{secrypt17,
author={João Amarante. and João Paulo Barros.},
title={Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT},
year={2017},
pages={572-577},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006475905720577},
isbn={978-989-758-259-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT
TI - Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge
SN - 978-989-758-259-2
IS - 2184-3236
AU - Amarante, J.
AU - Barros, J.
PY - 2017
SP - 572
EP - 577
DO - 10.5220/0006475905720577
PB - SciTePress