DocumentCode
3751102
Title
Targeted DoS on android: how to disable android in 10 seconds or less
Author
Ryan Johnson;Mohamed Elsabagh;Angelos Stavrou;Vincent Sritapan
Author_Institution
Kryptowire, Fairfax, VA 22030, USA George Mason University, Fairfax, VA 22030, USA
fYear
2015
Firstpage
136
Lastpage
143
Abstract
we present the implementation and impact of a wide-range of novel targeted Denial of Service (DoS) attacks on Android devices that are persistent across all recent Android platform versions. The DoS attacks can be selectively focused on denying access to device resources including microphone and camera, preventing the installation of applications, making the device unresponsive, targeting and terminating other running applications and processes, and causing a reboot cycle. To make matters worse, the attacks can be launched through regular apps that do not require a rooted device or any permissions with the exception of the attacks on the microphone and camera resources that require simple access rights. We propose and demonstrate defenses against each of these attacks showing that the security and reliability flaws identified require changes in the underlying Android source code to address them.
Keywords
"Androids","Humanoid robots","Cameras","Computer crime","Microphones","Software","Malware"
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on
Print_ISBN
978-1-5090-0317-4
Type
conf
DOI
10.1109/MALWARE.2015.7413694
Filename
7413694
Link To Document