Sensitive Data Leakage Detection in Pre-Installed Applications of Custom Android Firmware

14:41 26/06/2018

There are many custom Android firmware (custom ROMs) which are shared on the Internet. Several recent studies aim their efforts at analyzing pre-installed applications in these firmware. However, they analyzed separate pre-installed applications. In this study we propose a system, uitXROM, to detect sensitive data leakage in custom Android firmware by analyzing relationships of pre-installed applications. The experimental results show that the system can detect all sensitive data leakage in our custom Android firmware. Secondly, it detects several pre-installed applications which leak sensitive data from 290 custom ROMs downloaded from the Internet.

Penetration testing is one of the most common methods for assessing the security of a system, application, or network. Although there are different support tools with great efficiency in this field, penetration testing is done mostly manually and relies heavily on the experience of the ethical hackers who are doing...
Software-defined networking (SDN) is a potential approach for modern network architecture, which has received great attention recently. SDN-based networks also face security issues, and they can become targets of cyberattacks. Cyber threat hunting is one of the security solutions proposed for early attack detection in SDN. Developing machine learning-based IDS...