![]() From one large provider, we are able to extract more than 160 exploit binaries that are well-engineered and upto-date, corresponding to more than 50 families, exceeding the number of exploits we can find publicly. We find that even though protections are usually employed, the effort is substantially undermined by a few systematic and sometimes obvious weaknesses we discover. ![]() 2) the relationship between their proprietary exploits and publicly available ones. To understand such risks, we undertake a study on a number of popular yet mysterious Android root providers focusing on 1) if their exploits are adequately protected. If not carefully controlled, such exploits can be abused by malware author to gain unauthorized root privilege. Even though legitimate, many convenient one-click root methods operate by exploiting vulnerabilities in the Android system. To facilitate the popular demand, a unique Android root ecosystem has formed where a variety of root providers begin to offer root as a service. ![]() Android Root and its Providers: A Double-Edged Sword Android Root and its Providers: A Double-Edged SwordĪndroid Root and its Providers: A Double-Edged Sword Hang Zhang, Dongdong She, Zhiyun Qian University of California, Riverside ABSTRACT Android root is the voluntary and legitimate process of gaining the highest privilege and full control over a user's Android device.
0 Comments
Leave a Reply. |