Vulnerabilities in Android kernel give opportunity for attacker to damage the system. Privilege escalation is one of the most dangerous attacks, as it helps attacker to gain root privilege by exploiting kernel vulnerabilities. Mitigation technologies, static detection methods and dynamic defense methods have been suggested to prevent privilege escalation attack, but they still have some disadvantages. In this paper, we propose an improved method named PtmxGuard to enhance Android kernel and defeat privilege escalation attack. We focus on a typical attack pattern that attacker hijacks the control flow of Android kernel to modify process credentials by corrupting critical global function pointers. PtmxGuard enforces Code Pointer Integrity to ...
This study proposed an application behavior-detection method based on multifeature and process algeb...
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing...
In a thriving world fueled by advancements in mobile technology, there is a growing need for better ...
Vulnerabilities in Android kernel give opportunity for attacker to damage the system. Privilege esca...
In this paper we present the design and implementation of a security framework that extends the refe...
Android's security framework has been an appealing subject of research in the last few years. Androi...
Android’s security framework has been an appealing sub-ject of research in the last few years. Andro...
Google Android has become a popular mobile operating system which is increasingly deployed by mobile...
Abstract Recently, it is widespread for malware to collect sensitive information owned by third-part...
Abstract—Android Honeycomb operating system is widely used for tablet devices, such as Samsung Galax...
MasterMalicious applications can access and send out sensitive resources through a network.To detect...
Android is a free, open source mobile platform based on the Linux kernel. The openness of the applic...
Android is widely used for the development and deployment of autonomous and smart systems, including...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...
An increasing number of attacks by mobile malware have begun to target critical infrastructure asset...
This study proposed an application behavior-detection method based on multifeature and process algeb...
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing...
In a thriving world fueled by advancements in mobile technology, there is a growing need for better ...
Vulnerabilities in Android kernel give opportunity for attacker to damage the system. Privilege esca...
In this paper we present the design and implementation of a security framework that extends the refe...
Android's security framework has been an appealing subject of research in the last few years. Androi...
Android’s security framework has been an appealing sub-ject of research in the last few years. Andro...
Google Android has become a popular mobile operating system which is increasingly deployed by mobile...
Abstract Recently, it is widespread for malware to collect sensitive information owned by third-part...
Abstract—Android Honeycomb operating system is widely used for tablet devices, such as Samsung Galax...
MasterMalicious applications can access and send out sensitive resources through a network.To detect...
Android is a free, open source mobile platform based on the Linux kernel. The openness of the applic...
Android is widely used for the development and deployment of autonomous and smart systems, including...
With the proliferation of mobile and IoT devices, malicious application developers seize the opportu...
An increasing number of attacks by mobile malware have begun to target critical infrastructure asset...
This study proposed an application behavior-detection method based on multifeature and process algeb...
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing...
In a thriving world fueled by advancements in mobile technology, there is a growing need for better ...