Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf

编号:161174 PDF 79页 2.23MB 下载积分:VIP专享
下载报告请您先登录!

Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf

1、#BHASIA BlackHatEventsS SystemUIystemUI As As EvilPiPEvilPiPWeiMin Cheng()The Hijacking Attacks on Modern Mobile Device#BHASIA BlackHatEventsWhoAreWeWhoAreWeWeiMin ChengQI-ANXINGithub:MG1937Twitter:MGAldys4Yue LiuQI-ANXINGithub:lieanuMobile&AOSPBinary Researcher#BHASIA BlackHatEventsAgendaAgenda Wha

2、t is Activity Hijack Attack(AHA)Restrictions and Policies released by Google Bypass Security Policies Video Demo for Fullchain BAL Restriction Runtime State Leak Strictly LMKD#BHASIA BlackHatEventsWhat is AHAWhat is AHA Activity Hijack Attack(AHA)almost zero cost and easy to exploit Hijack target ap

3、p for stealing sensitive data or runtime privilege Adware,BankBot,Ransomware,Rat#BHASIA BlackHatEventsHow AHA WorkHow AHA Work Take Android4.0 as an example Case of Simplocker,malware for Android4.0 Essence is abuse NEW_TASK FLAG to seize FG TaskCode snippet of Simplocker#BHASIA BlackHatEventsHow AH

4、A WorkHow AHA Work Malicouse Activity enter FG Task Previous Task pushed to BG Task Now Malware can forge the trusted App,StrandHogg-like Hijack schemeWhy have to seize FG Task for hijack?#BHASIA BlackHatEventsTask And BackTask And Back-StackStack Task Stack is a collection of activities User can on

5、ly interact with ONE Front Task(in most case)#BHASIA BlackHatEventsClassic Attack SchemeClassic Attack Scheme#BHASIA BlackHatEventsClassic Attack SchemeClassic Attack SchemeLow cost,high returnAlmost affects all App in Old Device#BHASIA BlackHatEventsKey Factors OF AHAKey Factors OF AHA Background A

6、ctivity Launch(BAL)Target Running State Detect Background Persistent Processaaass#BHASIA BlackHatEventsGoogle will not allow this happenGoogle will not allow this happen#BHASIA BlackHatEventsRestriction 0 x1 No Leak StateRestriction 0 x1 No Leak State getRunningTasks|getRunningAppProcesses requires

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf)为本站 (张5G) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠