A framework for on-device privilege escalation exploit execution

Sebastian Höbarth, Rene Mayrhofer

Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

Abstract

Exploits on mobile phones can be used for various reasons; a benign one may be to achieve system-level access on a device that was locked by the manufacturer or service provider (also known as `jailbreaking' or `rooting'), while potentially malicious reasons are manifold. Independently of the use case however, a specific exploit is not sufficient to achieve the desired access rights. Typically, exploits provide {temporary privilege escalation} immediately after their execution. To provide additional access to applications, permanent privilege escalation is required -- in the benign case, including secure access control for the user to decide which (parts of) applications are granted elevated access. In this paper, we present a framework that can use arbitrary temporary exploits on Android devices to achieve permanent `root' capabilities for select (parts of) applications.
OriginalspracheEnglisch
TitelProceedings on 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI 2011)
PublikationsstatusVeröffentlicht - 2011
Veranstaltung3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI 2011) - San Francisco, USA/Vereinigte Staaten
Dauer: 12 Juni 201112 Juni 2011
http://www.medien.ifi.lmu.de/iwssi2011/

Workshop

Workshop3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI 2011)
Land/GebietUSA/Vereinigte Staaten
OrtSan Francisco
Zeitraum12.06.201112.06.2011
Internetadresse

Fingerprint

Untersuchen Sie die Forschungsthemen von „A framework for on-device privilege escalation exploit execution“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren