Bad Battery: Accessing Data and Injecting Malware into Android Devices

Slides:



Advertisements
Similar presentations
Introduction Our Topic: Mobile Security Why is mobile security important?
Advertisements

Cyber Crimes.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Researchers turn USB cable into attack tool 報告人:劉旭哲.
Computers and the Internet Chromebook Booklet 1. What is a Chromebook? A Chromebook is a computer.
 Android OS: Java  iOS: Objective C NSArray * foo = [[NSArray alloc]
ANDROID AN INTRODUCTION. WHY ANDROID???? Android boasts with around 75% market share. Growth of 91.5%. 2.
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
Submitted By: Tarun Tyagi Website- - Enable USB Debugging.
Mobile Hacking - Fundamentals
Port Knocking Benjamin DiYanni.
Project 2: IoT Device Vulnerabilities and Security REU Student: Shaunna Williams Graduate mentors: Kelvin Ly and Orlando Arias Faculty Mentor(s):
Issues or problems encountered and solutions: Plans for next week:
Project 1: Investigating the Value versus Cost of Privacy in the Internet of Things REU Student: Patr Graduate mentors: Salih Safa Bacanli and Neda.
Remote desktop into raspberry pi from mac and iPhone
Backdoor Attacks.
Project 1: Investigating the Value versus Cost of Privacy in the Internet of Things REU Student: Patrick Dorton Graduate mentors: Sina Masnadi, Neda.
Network security threats
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Programming Workshop Quixilver 8404.
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly, Kaveh.
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
How to allow USB Flash Drive Scan in Avast Antivirus.
How to Fix Android File Transfer Not Working on Mac?
Cloud Storage Services
Project 9: Investigating User Benefits and Risks Associated with IoT use REU Student: Kaley Brindisi Graduate mentor: Karla Badillo-Urquiola Faculty.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
Project 3: Development of wireless gas detectors REU Student: Jillian Chandler Graduate mentors: Chris Hughes, Xiaochen Wang, and Alireza Baba Faculty.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly, Kaveh.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly, Kaveh.
Project 9: Investigating User Benefits and Risks Associated with IoT use REU Student: Kaley Brindisi Graduate mentor: Karla Badillo-Urquiola Faculty.
Accomplishments: Problems & Solutions: Plans for next week:
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
How to Set up Remote Access to Personal U: drive
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project 9: Investigating User Benefits and Risks Associated with IoT use REU Student: Kaley Brindisi Graduate mentor: Karla Badillo-Urquiola Faculty.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Project 3: Development of wireless gas detectors REU Student: Jillian Chandler Graduate mentors: Chris Hughes, Xiaochen Wang, and Alireza Baba Faculty.
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
Project 4: Internet of Things for Health and Wellness REU Student: Shanzila Chowdhury Graduate mentor: Michael Eakin Faculty Mentor: Dr. David Metcalf.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project 9: Investigating User Benefits and Risks Associated with IoT Use REU Student: Joseph Prause Graduate mentors: Arup Ghosh and Neda Hajiakhoond.
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Read paper on Raspberry Bluetooth Interface. Progress in Python
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Exploitations of Wireless Interfaces via Network Scanning
Week 1 (May 14 – May 21, 2018) Accomplishments: Problem & Solutions
Project # 2 IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project 1: Investigating the Value versus Cost of Privacy in the Internet of Things REU Student: Patrick Dorton Graduate mentors: Sina Masnadi, Neda.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project 2: IoT Device Vulnerabilities and Security REU Student: Bryan Pearson Graduate mentors: Kelvin Ly and Kaveh Shamsi Faculty Mentor(s): Dr. Jin.
Project 10: Innovative IoT Applications in Scientific Research and Consumer Market REU Student: Nathalie Domingo Graduate mentors: Kelvin Ly and Kaveh.
Tareq Khan, Ph.D. Assistant Professor,
Project # IoT Device Vulnerabilities and Security REU student: Amon Harris Graduate mentors: Orlando Arias Faculty mentor(s): Yier Jin, Shaojie Zhang.
Project 3: Development of wireless gas detectors REU Student: Jillian Chandler Graduate mentors: Chris Hughes, Xiaochen Wang, and Alireza Baba Faculty.
Project 3: Development of Wireless Gas Detectors REU Student: Jose Vigil Graduate mentors: Chris Hughes, Xiaochen Wang Faculty Mentor(s): Dr. Hyoung.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Bad Battery: Accessing Data and Injecting Malware into Android Devices Nathalie Domingo Graduate Mentors: Kelvin Ly, kaveh shamsi, and Orlando arias Faculty Mentors: Dr. Shaojie Zhang and Dr. Yier jin

Introduction Goal: Create a device that can be disguised as a portable power bank that hacks phones Focus on Android phones iOS is more secure iOS has already been hacked through a malicious charger

Project Explanation Used a raspberry pi, that will be hidden inside a portable power bank, to exploit the access given to Android phones through USB connection Data Access Attack: copy specified folder off of the phone and send folder to a designated email address Malware Injection Attack: install a malicious app onto the user’s phone NSF REU Research Experience on the Internet of Things 2016

Malware Injection Attack Results Data Access Attack Malware Injection Attack Allow USB Computer Connection From Pop-Up MTP Enabled RSA Authentication USB Debugging PTP Enabled Nexus One—Android Version 2.3.6  Motorola Moto G—Android Version 4.4.4 Samsung Galaxy S5—Android Version 6.0.1

Importance Makes people aware of the potentially malicious devices available Highlights the security flaws in Android security, which can be prevented by users