Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services

7Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wi-Fi hotspot-based data clone services are increasingly used by Android users to transfer their user data and preferred configurations while upgrading obsolete phones to new models. Unfortunately, since the data clone services need to manipulate sensitive information protected by the Android system, vulnerabilities in the design or implementation of these services may result in data privacy breaches. In this paper we present an empirical security analysis of eight widely used Wi-Fi hotspot-based data clone services deployed to millions of Android phones. Our study evaluates those services with respect to data export/import, data transmission, and Wi-Fi configuration with respect to security requirements that the data clone procedure should satisfy. Since data clone services are closed source, we design Poirot, an analysis system to recover workflows of the data clone services and detect potential flaws. Our study reveals a series of critical security issues in the data clone services. We demonstrate two types of attacks that exploit the data clone service as a new attack surface. A vulnerable data clone service allows attackers to retrieve sensitive user data without permissions, and even inject malicious contents to compromise the system.

Cite

CITATION STYLE

APA

Ma, S., Li, H., Yang, W., Li, J., Nepal, S., & Bertino, E. (2020). Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. In ACM International Conference Proceeding Series (pp. 320–331). Association for Computing Machinery. https://doi.org/10.1145/3427228.3427263

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free