ABSTRACT
Android is one of the most famous open source Operating System. Due to their nature of wide customization they have gained their popularity. This customization was taken a step further by gaining the root access to the device super user privilege, by rooting. Rooting is basically getting access into the phone's firmware exploiting the vulnerability, by giving the user with full control of the device hardware which is not generally provided by the OEM (Original Equipment Manufacturer). This paper emphasis on detail analysis of traditional exploitation techniques used to gain access as the super user to the system and also the difficulties that are faced with the current upgrade the OEM's provide. Also this paper proposes a solution on how to bypass the new stringent measures out forward by the OEM, so the users can stick on to their ecosystem.
- Source of statistic showing the global mobile OS market share, in terms of sales to end users, from 2009 to 2016. https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/)Google Scholar
- Yuru Shao, Xiapu Luo, and Chenxiong Qian, Rootgaurd: Protecting Rooted Android Phones IEEE Computer Magazine Volume: 47, Issue: 6, June 2014 Google ScholarDigital Library
- A framework for on-device privilege escalation exploit execution on Android: Sebastian Höbarth Upper Austria University of Applied Sciences,Rene Mayrhofer Upper Austria University of Applied Sciences.Google Scholar
Recommendations
Practical exploitation on system vulnerability of ProtoGENI
ACM-SE '11: Proceedings of the 49th Annual Southeast Regional ConferenceGlobal Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping ...
A New Method of Software Security Vulnerability Exploitation
ICECC '12: Proceedings of the 2012 International Conference on Electronics, Communications and ControlIn the cyber-society, information security is becoming extremely important since more and more security threats have occurred. As most occurrences of attacks are the result of different kinds of vulnerabilities in software products, the security ...
Comments