Conference Proceeding Article
Root is the administrative privilege on Android, which is however inaccessible on stock Android devices. Due to the desire for privileged functionalities and the reluctance of rooting their devices, Android users seek for no-root approaches, which provide users with part of root privileges without rooting their devices. In this paper, we newly discover a feasible no-root approach based on the ADB loopback. To ensure such no-root approach is not misused proactively, we examine its dark side, including privacy leakage via logs and user input inference. Finally, we discuss the solutions and suggestions from different perspectives.
Android, root, no-root approach, permission explosion, Android Debug Bridge (ADB), exploits analysis
Computer Sciences | Information Security | Systems Architecture
Information Security and Privacy: Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP): Melbourne, Australia, July 4-6, 2016
City or Country
CHENG, Yao; Yingjiu LI; and DENG, Robert H..
A Feasible No-Root Approach on Android. (2016). Information Security and Privacy: Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP): Melbourne, Australia, July 4-6, 2016. 9723, 481-489. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/3383
Copyright Owner and License
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.