Rooting android --- extending the ADB by an auto-connecting wifi-accessible service

  • Authors:
  • Assem Nazar;Mark M. Seeger;Harald Baier

  • Affiliations:
  • Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany,Department of Computer & System Sciences, KTH - The Royal Institute of Technology, Kista, Sweden;Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany,Department of Computer Science, Gjøvik University College, Gjøvik, Norway;Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany

  • Venue:
  • NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The majority of malware seen on Android has a top-down approach often targeting application programming interfaces (API) of the financially rewarding telephony and short message service (SMS). In this paper we present a proof of concept of compromising an Android based smartphone by targeting the underlying Linux kernel. We adopt an unorthodox bottom-up approach on modifying the operating system to allow an application to re-route the Android debug bridge (ADB) daemon onto a wireless link. We support our research using case scenarios to show how information can be extracted and inserted into the smartphone without the knowledge of the user. We discuss how the Android build environment can be changed to harness functionality from secured operations. We also discuss how an application can be designed to function with minimum resources, be hidden and perform operations without user consent or interaction. We also provide an overview of how a rooted Android operating system can be misused.