Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/15158
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar S. | |
dc.contributor.author | Kittur L.J. | |
dc.contributor.author | Pais A.R. | |
dc.date.accessioned | 2021-05-05T10:16:36Z | - |
dc.date.available | 2021-05-05T10:16:36Z | - |
dc.date.issued | 2020 | |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , Vol. 12553 LNCS , , p. 241 - 252 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-3-030-65610-2_15 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/15158 | - |
dc.description.abstract | Smartphones are ubiquitous today, and they contain a large amount of personal and sensitive information. It is, therefore, essential to secure the underlying operating system. Android is the dominant operating system among the smartphone market; therefore, it is critical to uphold the security standards of Android. Android smartphone manufacturers and third-party custom ROM developers modify the operating system heavily to differentiate themselves among the competitors. The modifications done by the Smartphone manufacturers and third-party custom ROM developers posses a threat to the smartphone user’s privacy and make the Android OS vulnerable to advanced persistent threat (APT) attacks. This paper demonstrates that Smartphone manufacturers and third-party custom ROM developers can bypass Android’s security mechanisms and breach the user’s privacy without getting detected by the user by modifying parts of Android OS except for the kernel. In particular, this paper shows methods by which APT attacks can be performed on the Android 10’s Camera subsystem to capture pictures from the camera and upload them to a remote server without the user’s knowledge. © 2020, Springer Nature Switzerland AG. | en_US |
dc.title | Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.