Главная
Study mode:
on
1
Intro
2
Permissions
3
Why Permissions
4
Clean Check Attacks
5
Invisible Grid Attack
6
The Problem
7
Phishing Attack
8
Dronetop
9
How to fix it
10
Conclusion
11
Questions
Description:
Explore a critical security vulnerability in Android's permission system presented at the 2017 IEEE Symposium on Security & Privacy. Delve into how the SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE permissions can be exploited to gain complete control of the UI feedback loop, enabling devastating attacks such as credential theft and silent installation of malicious apps. Learn about the design shortcomings in Android that make these attacks possible, their effectiveness in fooling users, and the challenges in addressing these vulnerabilities. Discover a proposed defense mechanism to protect Android users and developers from these threats. Gain insights into the importance of understanding permission capabilities and the potential consequences of underestimating seemingly innocuous permissions.

Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop

IEEE
Add to list
0:00 / 0:00