Presentation 2013-03-25
Possibility of Remote Exploits by Android Phones
Hiroshi MORI, Fumihiro KANEI, Yuki SHODA, Katsunari YOSHIOKA, Tsutomu MATSUMOTO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, malware that run on Android OS are increasing. For now, a class of Android malware that leak information from the infected phone is being paid more attention. However, considering rapid development of smart phones and their quantity, it is not surprising that Android malware follow the path of the PC malware causing various types of threats. In this paper, we discuss the possibility that an infected smartphone launches a remote exploit attack to PCs. With the connectivity test with 20 carriers of 14 countries and areas, we confirm that via its mobile carrier a smartphone can reach a remote PC on many ports with known vulnerabilities. Also, we notice that a smartphone is assigned a global IP address and can work as a server without root privilege under 5 carriers we investigated, which may cause an infected phone becoming a proxy, stepping stone, malicious web servers, and c&c servers for constructing an infrastructure for malicious uses.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Android / Malware / Remote Exploit
Paper # ICSS2012-64
Date of Issue

Conference Information
Committee ICSS
Conference Date 2013/3/18(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Possibility of Remote Exploits by Android Phones
Sub Title (in English)
Keyword(1) Android
Keyword(2) Malware
Keyword(3) Remote Exploit
1st Author's Name Hiroshi MORI
1st Author's Affiliation Yokohama National University()
2nd Author's Name Fumihiro KANEI
2nd Author's Affiliation Yokohama National University
3rd Author's Name Yuki SHODA
3rd Author's Affiliation Yokohama National University
4th Author's Name Katsunari YOSHIOKA
4th Author's Affiliation Yokohama National University
5th Author's Name Tsutomu MATSUMOTO
5th Author's Affiliation Yokohama National University
Date 2013-03-25
Paper # ICSS2012-64
Volume (vol) vol.112
Number (no) 499
Page pp.pp.-
#Pages 6
Date of Issue