ABSTRACT ZHOU, YAJIN. Android Malware

Total Page:16

File Type:pdf, Size:1020Kb

ABSTRACT ZHOU, YAJIN. Android Malware ABSTRACT ZHOU, YAJIN. Android Malware: Detection, Characterization, and Mitigation. (Under the direction of Xuxian Jiang.) Recent years, there is an explosive growth in smartphone sales and adoption. The popularity is partially due to the wide availability of a large number of feature-rich smartphone applications (or apps). Unfortunately, the popularity has drawn the attention of malware authors: there were reports about malicious apps on both official and alternative marketplaces. These malicious apps have posed serious threats to user security and privacy. The primary goal of my research is to understand and mitigate the Android malware threats. In this dissertation, we first presented a systematic study to gain a better understanding of malware threats on both official and alternative app marketplaces, by proposing a system called DroidRanger to detect malicious apps on them. Specifically, we first proposed a permission- based behavioral footprinting scheme to detect new samples of known Android malware families. Then we applied a heuristics-based filtering scheme to identify certain inherent behaviors of unknown malware families. This study showed that there is a clear need for a rigorous vetting process, especially for non-regulated alternative marketplaces. After that, we characterized Android malware from various aspects to provide better insights of existing malware threats to the whole research community. That's because without a deep understanding of Android malware, one can hardly imagine that effective mitigations could be proposed. The characterization and a subsequent evolution-based study of representative families revealed that they were evolving rapidly to circumvent the detection from existing mobile anti-virus software. The Android Malware Genome Project [11], spun off from this research, has helped researchers from more than 450 universities, research labs and companies all over the world to develop more effective solutions. In light of the threats, we further proposed a system called AppCage that thoroughly confines the run-time behavior of third-party Android apps. It leverages two complimentary user-level sandboxes to interpose and regulate the app's access to sensitive APIs, and further block mali- cious behaviors of Android malware. Specifically, the first sandbox named dex sandbox hooks into the app's Dalvik virtual machine instance and redirects each sensitive framework API to a proxy which strictly enforces the user-defined policies, and the second sandbox named native sandbox leverages software fault isolation to prevent app's native libraries from directly access- ing the protected APIs or subverting the dex sandbox. Our evaluation showed that AppCage can successfully detect and block attempts to leak private information by third-party apps, and the performance overhead caused by AppCage is negligible for apps without native libraries and minor for apps with them. © Copyright 2015 by Yajin Zhou All Rights Reserved Android Malware: Detection, Characterization, and Mitigation by Yajin Zhou A dissertation submitted to the Graduate Faculty of North Carolina State University in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Computer Science Raleigh, North Carolina 2015 APPROVED BY: Huiyang Zhou Vincent Freeh Kapil Singh Xipeng Shen Xuxian Jiang Chair of Advisory Committee DEDICATION To my wife Lily, without whom I cannot survive sleepless nights during my PhD journey. ii BIOGRAPHY Yajin Zhou is originally from Jiangsu, China. He received his Bachelor of Science from Suzhou University in 2003, and Master of Science from University of Science and Technology of China in 2007, respectively. After that, he spent three years working as a software engineer in industry. Since summer 2010, he came to USA to pursue his Doctor of Philosophy degree in Computer Science under the direction of Dr. Xuxian Jiang. His research focused on proposing and de- veloping practical solutions to improve mobile security and privacy, mainly from the aspect of enriching the app ecosystem. Based on his research, he has cofounded the Android Malware Genome Project (http://www.malgenomeproject.org) and shared the dataset of representative Android malware with more than 450 universities, research labs and companies worldwide. He will graduate with a Ph.D. degree in Computer Science from the North Carolina State University in summer 2015, and join Qihoo 360, a leading security company in China. iii ACKNOWLEDGEMENTS First, I would like to thank my advisor, Dr. Xuxian Jiang, for his numerous help during my PhD study. I was inspired not only from his insights, but also his enthusiasm and the attitude of curiosity in research. I would like to thank Prof. Zhi Wang from Florida State University for his kind help and useful discussion. I am thankful to Prof. Vincent W Freeh, Prof. Huiyang Zhou, Prof. Xipeng Shen and Dr. Kapil Singh for their time and efforts severing in my PhD thesis committee and the insightful comments that helped to improve this dissertation. Second, I am grateful to many persons for their support: Dr. Kapil Singh from IBM T.J. Watson Research Center who was the mentor during my internship there in summer 2012, Prof. Dongyan Xu from Purdue University who provided useful advise and help during my job searching, Prof. Zhenkai Liang from National University of Singapore who was acting as my referee and gave me constructive advise, Prof. Peng Ning from NC State University and all my academic brothers in the Cyber Defense Labs, Jinku Li, Michael Grace, Wu Zhou, Chiachih Wu, Lei Wu, Kunal Patel. I am thankful to my friends at NC State University, Pu Yang, Xiaoling Huang, Yi Xu, Rong Jin, Zhiming Shen, Cunfang Shen, Wenbo Shen, Juan Liu. Special thanks to my old friends from Suzhou University and University of Science and Technology of China, Yi Luo, Yan Zhang, Xuhui Li, Zhen Huang, Chunguang Tang, and all the brothers from 311, Tao Wang, Lei Jin, Anquan Zheng, Kun Shen, Mingdong Zhang. I really miss our good old times together. Third, I am also grateful to organizations that generously funded my graduate research. The work in this dissertation was supported in part by US National Science Foundation (NSF) and the US Army Research Office (ARO) under several grants. As usual, any opinions, findings, and conclusions or recommendations expressed in this dissertation do not necessarily reflect the views of the NSF and the ARO. Last but certainly not least, I deeply appreciate the support and encouragement from my family, in particular my wife, Lily Xu, and our kid, Kevin Zhou. I cannot imagine how I can survive sleepless nights during my PhD journey without the strength gained from them. I am grateful to my parents, who were giving me the life and the best they have, and my aunt and uncle, who gave me the opportunity of better education, which has changed my entire life. Thanks for the help and encouragement from my two sisters. I cannot forget how they protected me when I was young. Also I would like to thank the help from my parents-in-law's family. iv TABLE OF CONTENTS LIST OF TABLES ...................................... vii LIST OF FIGURES ..................................... viii Chapter 1 Introduction ................................... 1 1.1 Background and Problem Overview . 1 1.2 Our Approach . 2 1.3 Dissertation Contributions . 4 1.4 Terminology . 5 1.5 Dissertation Organization . 6 Chapter 2 Related Work .................................. 7 2.1 Android Malware Detection . 7 2.2 Android Malware Defense . 8 2.3 Mobile Application Security . 9 2.4 Software Fault Isolation . 11 2.5 Mobile Application Sandbox . 11 Chapter 3 Detecting Malicious Apps in Official and Alternative App Market- places ....................................... 13 3.1 Introduction . 13 3.2 Design . 15 3.2.1 Detecting Known Android Malware . 16 3.2.2 Detecting Unknown Android Malware . 19 3.3 Evaluation . 21 3.3.1 Detecting New Samples of Known Malware . 22 3.3.2 Detecting Zero-day Malware . 26 3.3.3 Summary of Detected Malware . 28 3.4 Discussion . 28 3.5 Summary . 29 Chapter 4 Dissecting Android Malware: Characterization and Evolution ... 31 4.1 Introduction . 31 4.2 Malware Timeline . 33 4.3 Malware Characterization . 35 4.3.1 Malware Installation . 35 4.3.2 Activation . 41 4.3.3 Malicious Payloads . 42 4.3.4 Permission Uses . 47 4.4 Malware Evolution . 48 4.4.1 DroidKungFu . 48 4.4.2 AnserverBot . 50 v 4.5 Malware Detection . 51 4.6 Discussion . 53 4.7 Summary . 55 Chapter 5 Sandboxing Third-party Android Apps with Hybrid User-level Sandboxes .................................... 56 5.1 Introduction . 56 5.2 Background and Threat Model . 58 5.2.1 Dalvik Virtual Machine . 58 5.2.2 Java Native Interface . 59 5.2.3 Dynamic Loading and Linking . 59 5.2.4 Threat Model . 60 5.3 System Design . 60 5.3.1 Overview . 61 5.3.2 Dex Sandbox . 62 5.3.3 Native Sandbox . 63 5.4 Implementation . 69 5.4.1 Dex Sandbox . 69 5.4.2 Native Sandbox . 70 5.4.3 Native Sandbox Optimizations . 73 5.5 Evaluation . 74 5.5.1 Effectiveness of AppCage . 74 5.5.2 Security Analysis . 76 5.5.3 Compatibility of AppCage . 77 5.5.4 Performance Evaluation . 79 5.6 Discussion . 81 5.7 Summary . 82 Chapter 6 Conclusion and Future Work ........................ 83 BIBLIOGRAPHY ....................................... 85 vi LIST OF TABLES Table 3.1 The number of remaining apps after filtering the repository with RECEIVE - SMS/SEND SMS permissions . 17 Table 3.2 The number (and percentage of) apps with native code not in the default location . 20 Table 3.3 Statistics of collected apps from existing app marketplaces . 21 Table 3.4 Ten known malware families used in this study . 22 Table 3.5 Essential permissions of 10 known malware families . 23 Table 3.6 The number of infected apps by 10 known malware families on 5 studied marketplaces . 24 Table 3.7 The missed known malware families by Lookout Security & Antivirus soft- ware .......................................
Recommended publications
  • Android-X86 Project Marshmallow Porting
    Android-x86 Project Marshmallow Porting https://drive.google.com/open?id=1mND8K-AXbMMl8- wOTe75NOpM0xOcJbVy8UorryHOWsY 黃志偉 [email protected] 2015/11/28 http://www.android-x86.org Agenda ●Introduction: what, why, how? ●History and milestones ●Current status ●Porting procedure ●Develop android-x86 ●Future plans android-x86.org About Me ●A free software and open source amateur and promoter from Taiwan ■ CLDP / CLE ■ GNU Gatekeeper ■ Android-x86 Open Source Project ●https://zh.wikipedia.org/wiki/Cwhuang android-x86.org Introduction ●What's Android-x86? ●Why needs Android-x86? ●How can we do it? android-x86.org What's Android-x86 ? ●An open source project aimed to provide a complete solution for Android on x86 devices ●Android BSP (Board support Package) for x86 platform ●At first we use ASUS Eee PC and Virtualbox as the reference platform. ●Some vendors donate tablets, like Tegatech Tegav2, 4tiitoo AG WeTab and AMD android-x86.org Why needs Android-x86? ●Android is an open source operating-system originally designed for arm platform ●It's open source, we can port it to other platforms, like mips, PowerPC and x86 ●AOSP officially supports x86 now ● AOSP doesn’t have specific hardware components ● Still a lot of work to do to make it run on a real device android-x86.org But what are the benefits? ●Understanding Android porting process ●The x86 platform is widely available ●A test platform much faster than SDK emulator ●Android-x86 on vbox / vmware ●Suitable for tablet apps android-x86.org Android architecture android-x86.org How to do that? ●Toolchains – already in AOSP, but old..
    [Show full text]
  • Download Android Os for Phone Open Source Mobile OS Alternatives to Android
    download android os for phone Open Source Mobile OS Alternatives To Android. It’s no exaggeration to say that open source operating systems rule the world of mobile devices. Android is still an open-source project, after all. But, due to the bundle of proprietary software that comes along with Android on consumer devices, many people don’t consider it an open source operating system. So, what are the alternatives to Android? iOS? Maybe, but I am primarily interested in open-source alternatives to Android. I am going to list not one, not two, but several alternatives, Linux-based mobile OSes . Top Open Source alternatives to Android (and iOS) Let’s see what open source mobile operating systems are available. Just to mention, the list is not in any hierarchical or chronological order . 1. Plasma Mobile. A few years back, KDE announced its open source mobile OS, Plasma Mobile. Plasma Mobile is the mobile version of the desktop Plasma user interface, and aims to provide convergence for KDE users. It is being actively developed, and you can even find PinePhone running on Manjaro ARM while using KDE Plasma Mobile UI if you want to get your hands on a smartphone. 2. postmarketOS. PostmarketOS (pmOS for short) is a touch-optimized, pre-configured Alpine Linux with its own packages, which can be installed on smartphones. The idea is to enable a 10-year life cycle for smartphones. You probably already know that, after a few years, Android and iOS stop providing updates for older smartphones. At the same time, you can run Linux on older computers easily.
    [Show full text]
  • Crdroid 3.10.54 Crdroid 3.10.54 * Br Photos and Great Condition That Affects Men Ranked 5 of 18 Archways Prize Wheels
    Crdroid 3.10.54 Crdroid 3.10.54 * Br photos and great condition that affects men ranked 5 of 18 archways prize wheels. Gif beat ladbrokes roulettestrong at lowes. about B2b massage at shah alam2b massage at shah alam Binweevil hangman words Daughter incest.tumblr Speedway gp programme Crdroid 3.10.54 Cheating captions tumblr Menu - Baca komik bleach lengkap bahasa indonesia Maynards wife lei liaynards wife Crdroid 3.10.54. So now introducing our new rom.which is based on lp Friends links What is skypepm ezlog, Sissy kernel ( 3.10.54 ) mt6582 based cm rom which name is Tesla os Previous drawings prim, Wild things foursome post i have given u crDroid rom. Techzbyte is a blog about How to's, Tech full movie worldfree4u.trade, Download anime kindaichi shounen News, Apps, Education, Stock & Custom Roms, Custom recovery, Games no jikenbo tv sub indo and Internet freebies for Smartphones. 22-11-2016 · Hi friends .. introducing our new rom for mmx fire 4. crDroid Rom Based on lp kernel bloggers 3.10.54 Mt 6582 .. Based on cm (5.1) FEATURES : CyanogenMod theme. Hcpcs code for restylane Isabelle blais nue video [ROM][MT6582][LP][ 3.10.54 +] PACMAN V2 FOR GIONEE M3 Many of Trinh hoi s second wife mai thy you might not be aware of PACMan ROM. As the image shows, its a combinati. CRDROID OS-LP-MT6582- 3.10.54 + FOR MMX Q340 BY MANJUNATH YASHU FEATURES CyanogenMod theme supervisor; Power menu customizations; Nav bar tweaks (on/off toggle and. CRDROID OS-LP-MT6582- 3.10.54 + FOR MMX Q340 BY MANJUNATH YASHU CRDROID OS-LP-MT6582- 3.10.54 + FOR MMX Q340 BY MANJUNATH YASHU FEATURES CyanogenMod theme manager; Power.
    [Show full text]
  • Linux Based Mobile Operating Systems
    INSTITUTO SUPERIOR DE ENGENHARIA DE LISBOA Área Departamental de Engenharia de Electrónica e Telecomunicações e de Computadores Linux Based Mobile Operating Systems DIOGO SÉRGIO ESTEVES CARDOSO Licenciado Trabalho de projecto para obtenção do Grau de Mestre em Engenharia Informática e de Computadores Orientadores : Doutor Manuel Martins Barata Mestre Pedro Miguel Fernandes Sampaio Júri: Presidente: Doutor Fernando Manuel Gomes de Sousa Vogais: Doutor José Manuel Matos Ribeiro Fonseca Doutor Manuel Martins Barata Julho, 2015 INSTITUTO SUPERIOR DE ENGENHARIA DE LISBOA Área Departamental de Engenharia de Electrónica e Telecomunicações e de Computadores Linux Based Mobile Operating Systems DIOGO SÉRGIO ESTEVES CARDOSO Licenciado Trabalho de projecto para obtenção do Grau de Mestre em Engenharia Informática e de Computadores Orientadores : Doutor Manuel Martins Barata Mestre Pedro Miguel Fernandes Sampaio Júri: Presidente: Doutor Fernando Manuel Gomes de Sousa Vogais: Doutor José Manuel Matos Ribeiro Fonseca Doutor Manuel Martins Barata Julho, 2015 For Helena and Sérgio, Tomás and Sofia Acknowledgements I would like to thank: My parents and brother for the continuous support and being the drive force to my live. Sofia for the patience and understanding throughout this challenging period. Manuel Barata for all the guidance and patience. Edmundo Azevedo, Miguel Azevedo and Ana Correia for reviewing this document. Pedro Sampaio, for being my counselor and college, helping me on each step of the way. vii Abstract In the last fifteen years the mobile industry evolved from the Nokia 3310 that could store a hopping twenty-four phone records to an iPhone that literately can save a lifetime phone history. The mobile industry grew and thrown way most of the proprietary operating systems to converge their efforts in a selected few, such as Android, iOS and Windows Phone.
    [Show full text]
  • Survey of Android Phones
    CAN UNCLASSIFIED Survey of Android Phones Chris Mckenzie 2 Keys Inc. Ryan Kennedy Sphyrna Security Inc. Prepared by: 2 Keys Inc. Sphyrna Security Inc. Ottawa, Ontario Canada PSPC Contract Number: W7714-156010 Technical Authority: Mazda Salmania, Defence Scientist Contractor's date of publication: March 2018 Defence Research and Development Canada Contract Report DRDC-RDDC-2018-C108 May 2018 CAN UNCLASSIFIED CAN UNCLASSIFIED IMPORTANT INFORMATIVE STATEMENTS This document was reviewed for Controlled Goods by Defence Research and Development Canada (DRDC) using the Schedule to the Defence Production Act. Disclaimer: This document is not published by the Editorial Office of Defence Research and Development Canada, an agency of the Department of National Defence of Canada but is to be catalogued in the Canadian Defence Information System (CANDIS), the national repository for Defence S&T documents. Her Majesty the Queen in Right of Canada (Department of National Defence) makes no representations or warranties, expressed or implied, of any kind whatsoever, and assumes no liability for the accuracy, reliability, completeness, currency or usefulness of any information, product, process or material included in this document. Nothing in this document should be interpreted as an endorsement for the specific use of any tool, technique or process examined in it. Any reliance on, or use of, any information, product, process or material included in this document is at the sole risk of the person so using it or relying on it. Canada does not assume any liability in respect of any damages or losses arising out of or in connection with the use of, or reliance on, any information, product, process or material included in this document.
    [Show full text]
  • 2021/VIII: Tag Movies
    2021/VIII: Tag movies Three years “Open Source” Smart Phone Egg, 17 February 2020: Almost exactly three years ago, LineageOS was presented here with the MotoG4 (German only). A few months later there was an extensive series of blogs about LineageOS and the LG G6 (German only). Today the aim is to describe the experiences, to bring the devices up to date and to venture a look into the future. Sense and purpose of a “free” Smartphone With a “free” Android, the aim is to be able to use a “free”, but compatible Android on the smartphone instead of the loaded system. For this, the following requirements are necessary: First, the smartphone must be unlockable. Second, after unlocking, a mini- system has to be installed, which allows the “original” Android to be transferred to another system (CustomROM) and third, the CustomROM must always fit the corresponding smartphone. As already written in 2017 (German), loading a CustomROM can be quite tricky. It should be noted here that neither the search giant nor the manufacturers are interested in making this easy. Because if it were easy, consumers would certainly not put up with the current martingale, but more about that later. After all, with a “free” smartphone, the reward is a system that runs without the coercive services of the search giant or other players. Even more importantly, free systems can be adapted and locally saved. This is especially important if the system no longer works (correctly) in terms of software. In such cases the system can simply be reloaded, including the desired apps.
    [Show full text]
  • Android and the Demise of Operating System-Based Power: Firm Strategy and Platform Control in the Post-PC World
    Telecommunications Policy 38 (2014) 979–991 Contents lists available at ScienceDirect Telecommunications Policy URL: www.elsevier.com/locate/telpol Android and the demise of operating system-based power: Firm strategy and platform control in the post-PC world Bryan Pon a,n, Timo Seppälä b, Martin Kenney c a Geography Graduate Group, University of California, Davis, Davis, CA 95616, USA b Department of Industrial Engineering and Management, Aalto University and the Research Institute of the Finnish Economy, Helsinki, Finland c Community and Regional Development Unit, University of California, Davis, Davis, CA 95616, USA article info abstract Available online 30 June 2014 The emergence of new mobile platforms built on Google's Android operating system “ ” Keywords: represents a significant shift in the locus of the platform bottleneck, or control point, in Smartphone the mobile industry. Using a case study approach, this paper examines firm strategies in a Platform market where the traditional location of the ICT platform bottleneck—the operating Bottleneck system on a device—is no longer the most important competitive differentiator. Instead, each of the three firms studied has leveraged different core competencies to build complementary services in order to control the platform and lock-in users. Using platform theories around bottlenecks and gatekeeper roles, this paper explores these strategies and analyzes them in the broader context of the changing mobile industry landscape. & 2014 Elsevier Ltd. All rights reserved. 1. Introduction
    [Show full text]
  • Understanding and Improving Security of the Android Operating System
    Syracuse University SURFACE Dissertations - ALL SURFACE December 2016 Understanding and Improving Security of the Android Operating System Edward Paul Ratazzi Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Engineering Commons Recommended Citation Ratazzi, Edward Paul, "Understanding and Improving Security of the Android Operating System" (2016). Dissertations - ALL. 592. https://surface.syr.edu/etd/592 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. ABSTRACT Successful realization of practical computer security improvements requires an understanding and insight into the system’s security architecture, combined with a consideration of end-users’ needs as well as the system’s design tenets. In the case of Android, a system with an open, modular architecture that emphasizes usability and performance, acquiring this knowledge and insight can be particularly challenging for several reasons. In spite of Android’s open source philosophy, the system is extremely large and complex, documentation and reference materials are scarce, and the code base is rapidly evolving with new features and fixes. To make matters worse, the vast majority of Android devices in use do not run the open source code, but rather proprietary versions that have been heavily customized by vendors for product dierentiation. Proposing security improvements or making customizations without suicient insight into the system typically leads to less-practical, less-eicient, or even vulnerable results. Point solutions to specific problems risk leaving other similar problems in the distributed security architecture unsolved.
    [Show full text]
  • CUSTOM ROM – a PROMINENT ASPECTS of ANDROID
    ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5, Issue 5, May 2016 CUSTOM ROM – A PROMINENT ASPECTS Of ANDROID Saurabh Manjrekar, Ramesh Bhati ABSTRACT --This paper tries to look behind the wheels of II. TYPES OF ROM’S android and keeping uncommon spotlight on custom rom's and essentially check for security misconfiguration's which There are two types of ROM’s available for the android could respect gadget trade off, which might bring about device, they are described below : malware disease or information robbery. Android comprises of a portable working framework in view of the Linux bit, A. Stock ROM: with middleware, libraries and APIs written in C and The ROM or the operating system provided application programming running on an application system bydefault by the device manufacturer. It is the which incorporates Java-perfect libraries taking into account official ROM for the device. Apache Harmony. Android utilizes the Dalvik virtual machine with without a moment to spare gathering to run B. Custom ROM: ordered Java code. Android OS utilized as a part of cell phone It is not the default ROM, it is developed mostly itself however now it comes in PC, Tablets, TVs. This by the third party developers. It can either be a modified version of the stock ROM or it can be different ways makes them allowed to get to web by various completely different from the stock ROM.Stock contingent applications. Which builds security dangers in ROMs generally contains vendor specific additions private and business applications, for example, web managing in them, where as Custom ROM’s have different an account or to get to corporate systems.
    [Show full text]
  • Replicant and Android Freedom
    Replicant and Android freedom Why phone freedom matters? (I) ● Smartphones gather way too much data on you: ● Non democratic countries. ● If you want to organize a protest? ● In which hands should this power be? ● What happens to the data if a democratic country becomes non-democratic ● Commercial usage of the Data? ● Unintended consequences Why phone freedom matters? (II) ● smartphones are computers? ● Yes because they run user-installable applications ● => they have the same freedom issues ● It©s too hard to support a device with proprietary parts in the long run: Cyanogenmod dropped the Nexus one for that exact reason. ● It©s Hard to port GNU/Linux on it when there are blobs First part ● Introduction to the freedom issues ● Solutions What is a smartphone ModemModem CPU Average Joe user Problem Average Joe User Free Proprietary software Applications applications Android Linux Kernel Advanced User Supported devices ● A lot of devices(too much to be listed here) are supported but not all Problem I (AdvancedUser) Google Applications( Proprietary Free market, applications software applications youtube etc...) Cyanogenmod Problem II (Advanced user) Android GUI Proprietary hardware libraries Linux kernel Nexus S: Proprietary parts I ● /system/etc/gps.conf ● /system/lib/libpn544_fw.so ● /system/lib/libsecril-client.so ● /system/vendor/bin/gpsd ● /system/vendor/bin/pvrsrvinit ● /system/vendor/etc/gps.xml ● /system/vendor/firmware/bcm4329.hcd ● /system/vendor/firmware/cypress-touchkey.bin Nexus S: Proprietary parts II ● /system/vendor/firmware/nvram_net.txt
    [Show full text]
  • Android Development Work for Command-Line Loving Person Like Me
    I will try to collect here useful tips for making Android development work for command-line loving person like me. See Android G1 if you are interested in hardware. t=0x90c95b8cell=0x90c9670 [0,0] Contents: [Dobrica PavlinuÅ¡iÄ's random unstructured stuff] • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (ADB) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (Remote adb access) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (provision device) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (CyanogenMod) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (Google apps) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (Build) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (flashing) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (SL4A) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (x86) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (froyo 2.2) ♦ Dobrica PavlinuÅ¡iÄ's random unstructured stuff (eclair 2.1) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (Application build process) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (repo) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (repack applications) • Dobrica PavlinuÅ¡iÄ's random unstructured stuff (repository with scripts) ADB Part of http://developer.android.com/sdk/index.html Remote adb access dpavlin@t61p:~/Downloads/android$ adb shell # setprop service.adb.tcp.port 5555 dpavlin@t61p:~$ ssh -R 5555:192.168.1.40:5555 klin dpavlin@klin:~$ adb connect 127.0.0.1:5555 dpavlin@klin:~$ adb devices List of devices attached 127.0.0.1:5555 device provision device •
    [Show full text]
  • Does Disabling Wi-Fi Prevent My Smartphone from Sending Wi-Fi Frames? Célestin Matte, Mathieu Cunche, Vincent Toubiana
    Does disabling Wi-Fi prevent my smartphone from sending Wi-Fi frames? Célestin Matte, Mathieu Cunche, Vincent Toubiana To cite this version: Célestin Matte, Mathieu Cunche, Vincent Toubiana. Does disabling Wi-Fi prevent my smartphone from sending Wi-Fi frames?. [Research Report] RR-9089, Inria - Research Centre Grenoble – Rhône- Alpes; INSA Lyon. 2017. hal-01575519v2 HAL Id: hal-01575519 https://hal.inria.fr/hal-01575519v2 Submitted on 11 Jun 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Does disabling Wi-Fi prevent my smartphone from sending Wi-Fi frames? Célestin Matte, Mathieu Cunche, Vincent Toubiana RESEARCH REPORT N° 9089 August 2017 Project-Teams Privatics ISSN 0249-6399 ISRN INRIA/RR--9089--FR+ENG Does disabling Wi-Fi prevent my smartphone from sending Wi-Fi frames? Célestin Matte, Mathieu Cunche, Vincent Toubiana∗ Project-Teams Privatics Research Report n° 9089 — version 3 — initial version August 2017 — revised version June 2018 — 16 pages Abstract: No. For Android, we show that another option, called "Always allow scanning", when activated, makes a device send Wi-Fi frames which can be used to track this device, even if the Wi-Fi switch is off.
    [Show full text]