ScreenStealer: Addressing Screenshot attacks on Android devices

S. M. Muzammal, M. A. Shah
{"title":"ScreenStealer: Addressing Screenshot attacks on Android devices","authors":"S. M. Muzammal, M. A. Shah","doi":"10.1109/IConAC.2016.7604942","DOIUrl":null,"url":null,"abstract":"Smartphones are ubiquitous in today's world. With the enhanced and advanced functionalities, smartphones carry a large amount of user's private and confidential data. There are numerous risks, threats, and the rise in powerfulness and effectiveness of malware attacks make smartphones more prone and vulnerable. Due to the rapid increase in Android smartphones users, demands based on new and advanced features as well as the usage ease have been lavished on developers. The Android application developers are working hard to develop innovative applications for millions of Android users around the world. In this struggle of advancement, they are seeking permissions to critical system resources, not directly offered by Android. One of the most projecting way is through ADB (Android Debug Bridge) that has been granted permissions to use critical system resources. There are many applications on Google Play Store that utilize ADB proxy to provide users with unconventional and smart features on smartphones. This paper reviews the ADB capabilities and how Internet access and ADB together allow applications to expose sensitive data of an Android smartphone device. Furthermore, a malicious Android application, `ScreenStealer', has been developed and its effects on Android-based smartphones are studied.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 22nd International Conference on Automation and Computing (ICAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IConAC.2016.7604942","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Smartphones are ubiquitous in today's world. With the enhanced and advanced functionalities, smartphones carry a large amount of user's private and confidential data. There are numerous risks, threats, and the rise in powerfulness and effectiveness of malware attacks make smartphones more prone and vulnerable. Due to the rapid increase in Android smartphones users, demands based on new and advanced features as well as the usage ease have been lavished on developers. The Android application developers are working hard to develop innovative applications for millions of Android users around the world. In this struggle of advancement, they are seeking permissions to critical system resources, not directly offered by Android. One of the most projecting way is through ADB (Android Debug Bridge) that has been granted permissions to use critical system resources. There are many applications on Google Play Store that utilize ADB proxy to provide users with unconventional and smart features on smartphones. This paper reviews the ADB capabilities and how Internet access and ADB together allow applications to expose sensitive data of an Android smartphone device. Furthermore, a malicious Android application, `ScreenStealer', has been developed and its effects on Android-based smartphones are studied.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ScreenStealer:解决Android设备上的屏幕截图攻击
智能手机在当今世界无处不在。随着智能手机的增强和先进的功能,携带大量的用户的私人和机密数据。有无数的风险和威胁,恶意软件攻击的强大和有效性的增加使智能手机更容易受到攻击。由于Android智能手机用户的快速增长,开发者对新功能和高级功能的需求以及易用性的要求也越来越高。Android应用程序开发人员正在努力为全球数百万Android用户开发创新的应用程序。在这场进步的斗争中,他们正在寻求关键系统资源的权限,而Android并没有直接提供这些权限。最突出的方法之一是通过ADB (Android Debug Bridge),它被授予使用关键系统资源的权限。Google Play Store上有许多应用程序利用ADB代理为用户提供智能手机上的非常规和智能功能。本文回顾了ADB功能,以及Internet访问和ADB如何一起允许应用程序暴露Android智能手机设备的敏感数据。此外,一种恶意的Android应用程序“ScreenStealer”已经被开发出来,并研究了它对基于Android的智能手机的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Comparative study of Partial Discharge emulators for the calibration of Free-Space radiometric measurements Knowledge representation of large medical data using XML An investigation of electrical motor parameters in a sensorless variable speed drive for machine fault diagnosis A novel fault-tolerant control strategy for Near Space Hypersonic Vehicles via Least Squares Support Vector Machine and Backstepping method Automatic text summarization using fuzzy inference
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1