An Effective Technique for Detecting Vulnerabilities in Android Device Drivers 


Vol. 43,  No. 11, pp. 1179-1187, Nov.  2016


PDF

  Abstract

Android- and Linux-based embedded systems require device drivers, which are structured and built in kernel functions. However, device driver software (firmware) provided by various 3rd parties is not usually checked in terms of their security requirements but is simply included in the final products, that is, Android-based smart phones. In addition, static analysis, which is generally used to detect vulnerabilities, may result in extra cost to detect critical security issues such as privilege escalation due to its large proportion of false positive results. In this paper, we propose and evaluate an effective technique to detect vulnerabilities in Android device drivers using both static and dynamic analyses.


  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Chung and S. Cho, "An Effective Technique for Detecting Vulnerabilities in Android Device Drivers," Journal of KIISE, JOK, vol. 43, no. 11, pp. 1179-1187, 2016. DOI: .


[ACM Style]

Youngki Chung and Seong-je Cho. 2016. An Effective Technique for Detecting Vulnerabilities in Android Device Drivers. Journal of KIISE, JOK, 43, 11, (2016), 1179-1187. DOI: .


[KCI Style]

정영기, 조성제, "안드로이드 장치 드라이버에 대한 효과적 취약점 탐지 기법," 한국정보과학회 논문지, 제43권, 제11호, 1179~1187쪽, 2016. DOI: .


[Endnote/Zotero/Mendeley (RIS)]  Download


[BibTeX]  Download



Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr