Android Accessibility Service: Bane or Boon
Idris Shah Hyder1 , Nikhil S. Tengeli2
Section:Research Paper, Product Type: Journal Paper
Volume-07 ,
Issue-14 , Page no. 393-395, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.393395
Online published on May 15, 2019
Copyright © Idris Shah Hyder, Nikhil S. Tengeli . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Idris Shah Hyder, Nikhil S. Tengeli, “Android Accessibility Service: Bane or Boon,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.393-395, 2019.
MLA Style Citation: Idris Shah Hyder, Nikhil S. Tengeli "Android Accessibility Service: Bane or Boon." International Journal of Computer Sciences and Engineering 07.14 (2019): 393-395.
APA Style Citation: Idris Shah Hyder, Nikhil S. Tengeli, (2019). Android Accessibility Service: Bane or Boon. International Journal of Computer Sciences and Engineering, 07(14), 393-395.
BibTex Style Citation:
@article{Hyder_2019,
author = {Idris Shah Hyder, Nikhil S. Tengeli},
title = {Android Accessibility Service: Bane or Boon},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {393-395},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1161},
doi = {https://doi.org/10.26438/ijcse/v7i14.393395}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.393395}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1161
TI - Android Accessibility Service: Bane or Boon
T2 - International Journal of Computer Sciences and Engineering
AU - Idris Shah Hyder, Nikhil S. Tengeli
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 393-395
IS - 14
VL - 07
SN - 2347-2693
ER -
Abstract
Android is a huge platform available to a big audience. However, android is vulnerable to many attacks and attackers. Which violates the privacy and security of the data. This paper mainly focuses on demonstration of how accessibility service can be used to key log the events and send it to the hacker’s device using firebase (Real time database). This is a major vulnerability which needs to be addressed. The payload is installed as .apk file and some social engineering to convince the user to enable accessibility service. Our study estimates that this attack will work on most of the android versions.
Key-Words / Index Term
Android accessibility service , firebase , .apk ,payloads , android vulnerabilities
References
[1] Chenxiong Qian, Simon P. Chung, Wenke Lee, “Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop”, Georgia Tech. (2017).
[2] C. Ren, Y. Zhang, H. Xue, T. Wei, and P. Liu, “Towards Discovering and Understanding Task Hijacking in Android,” in Proc. of USENIX Security Symposium, 2015
[3] Joshua Kraunelis1 , Yinjie Chen1 , Zhen Ling2 , Xinwen Fu1 , Wei Zhao3 “On Malware Leveraging the Android Accessibility Framework” 1Computer Science Department, University of Massachusetts Lowell, One University Avenue, Lowell, MA 01854, Email: {jkraunel,ychen1,xinwenfu}@cs.uml.edu . 2 School of Computer Science and Engineering, Southeast University, Nanjing, China, Email: zhenling@seu.edu.cn 3 University of Macau, Macau, China, Email: weizhao@umac.mo (2014).
[4] S. Peng, S. Yu, and A. Yang. Smartphone malware and its propagation modeling: A survey. Communications Surveys Tutorials, IEEE, PP(99):1 – 17, July 2013.
[5] Android permissions: User attention, comprehension, and behavior. http://www.eecs.berkeley.edu/Pubs/TechRpts/2012/EECS-2012-26.pdf, 2012.
[6] Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Proceedings of IEEE Symposium on Security and Privacy (SP), 2012.
[7] R. Hunt and S. Hansman. A taxonomy of network and computer attack methodologies. Computers & Networks, Elsevier, 24(1), February 2005.