A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
The complexity of avoiding vulnerabilities in the modern mobile operating systems makes them vulnerable to many types of attacks. This paper presents preliminary work in the creation of scenarios to surreptitiously extract private data from smartphones running different versions of the Android Operating System. Three scenarios were already identified and a proof of concept script was developed, all based on the use of the Android Debug Bridge tool. When running in a computer, the script is able
doi:10.5220/0006475905720577
dblp:conf/secrypt/AmaranteB17
fatcat:nuw7xyqltfdcfjsatogkysfnf4