Telecommunications Science ›› 2016, Vol. 32 ›› Issue (10): 42-49.doi: 10.11959/j.issn.1000-0801.2016254

• Topic: terminal security based on Android system • Previous Articles     Next Articles

A general attack model based on Android system vulnerability

Xihai DENG,Weimiao FENG,Luping MA,Ying LI   

  1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Online:2016-10-15 Published:2017-04-27
  • Supported by:
    Strategy Pilot Project of Chinese Academy of Sciences

Abstract:

Various kinds of vulnerabilities in Android system bring great threats to the platform. The vulnerability exploitation technology,the security of mobile operating systems and the security of Android ecosystem have become a research focus in both industry and academia. The exploitation of several typical system vulnerabilities was analyzed, a general model of Android system vulnerability exploitation was proposed, and a novel evaluation framework for the effectiveness of vulnerability exploitation was presented. The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. Furthermore, the evaluation framework can assess the influence of system vulnerabilities on the security of Android ecosystem.

Key words: Android operating system, system vulnerability, vulnerability exploitation, effectiveness evaluation

No Suggested Reading articles found!