원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.4
2015.04
pp.317-326
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related Work
3. Introduction to the ADB Tool
3.1 ADB Tool Composition
3.2 ADB Commands
3.3 ADB's Two Types of Work Modes
4. Sesurity Threats
4.1 Installing an App Silently
4.2 Pushing Malicious Privilege Escalation Files and Copying Private Files
4.3 Security Threats in TCP Debug Mode
5. Demonstration of Attacks
6. Security Suggestions
6.1 An Android Distinction between Developers and Normal users
6.2 Security Mechanisms to be Added to the ADB Tool
7. Conclusion
References
1. Introduction
2. Related Work
3. Introduction to the ADB Tool
3.1 ADB Tool Composition
3.2 ADB Commands
3.3 ADB's Two Types of Work Modes
4. Sesurity Threats
4.1 Installing an App Silently
4.2 Pushing Malicious Privilege Escalation Files and Copying Private Files
4.3 Security Threats in TCP Debug Mode
5. Demonstration of Attacks
6. Security Suggestions
6.1 An Android Distinction between Developers and Normal users
6.2 Security Mechanisms to be Added to the ADB Tool
7. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보