International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

Transplantation Attack: Analysis and Prediction

Download
212 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_28,
        author={Zhongwen Zhang and Ji Xiang and Lei Wang and Lingguang Lei},
        title={Transplantation Attack: Analysis and Prediction},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Android Transplantation Attack Prediction},
        doi={10.1007/978-3-319-23802-9_28}
    }
    
  • Zhongwen Zhang
    Ji Xiang
    Lei Wang
    Lingguang Lei
    Year: 2015
    Transplantation Attack: Analysis and Prediction
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_28
Zhongwen Zhang,*, Ji Xiang,*, Lei Wang,*, Lingguang Lei,*
    *Contact email: zwzhang@lois.cn, jixiang@lois.cn, lwang@lois.cn, lglei@lois.cn

    Abstract

    Correspondingly, Android also becomes a common attack target. Till now, many attacks have been detected out, such as confused deputy attack, collusion attack, and root exploits attack. In this paper, we present a novel attack, denoted as transplantation attack. Transplantation attack, when being applied to spy on user, can make the malicious behavior more stealthy. The attack can evade permission check, evade device administration, and even evade API auditing. The premise of carrying out Transplantation attack is that malware is able to access resources or gain access capability. By fulfilling the premise, we do a case study about Camera device. The result indicates that Transplantation attack indeed exists. Based on these observations, we predict the kind of system resources that may suffer transplantation attack. Defence discussion are also presented.