Please use this identifier to cite or link to this item: https://idr.l2.nitk.ac.in/jspui/handle/123456789/8383
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnto, A.
dc.contributor.authorRao, R.S.
dc.contributor.authorPais, A.R.
dc.date.accessioned2020-03-30T10:18:33Z-
dc.date.available2020-03-30T10:18:33Z-
dc.date.issued2017
dc.identifier.citationCommunications in Computer and Information Science, 2017, Vol.746, , pp.236-249en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8383-
dc.description.abstractAndroid is one of the most secure and widely used operating systems for the mobile platform. Most of the Android devices have the functionality for rooting and installing new custom ROMs and kernels in the device. This feature of the Android devices makes it vulnerable to the kernel-modification advanced persistent threat attack (APT). This type of APT attacks cannot be detected by using existing tools and methods. This paper presents the implementation details of a kernel-modification APT attack performed on an android device and proposes a new method for detecting the same. The proposed system uses control flow analysis of the kernel binary code for detecting APT. In control flow analysis the control flow graph of the genuine kernel is compared with the control flow graph of the device-kernel and detects the APT based on signatures. � 2017, Springer Nature Singapore Pte Ltd.en_US
dc.titleKernel Modification APT Attack Detection in Androiden_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.