A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Attacking Android smartphone systems without permissions
2016
2016 14th Annual Conference on Privacy, Security and Trust (PST)
Android requires third-party applications to request for permissions when they access critical mobile resources, such as users' personal information and system operations. In this paper, we present the attacks that can be launched without permissions. We first perform call graph analysis, component analysis and data-flow analysis on various parts of Android framework to retrieve unprotected APIs. Unprotected APIs provide a way of accessing resources without any permissions. We then exploit
doi:10.1109/pst.2016.7906949
dblp:conf/pst/KyweLPG16
fatcat:5o3wh3rwojhwlmhcbsdfgtt5te