ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, and Patrick Traynor, University of Florida; Hayawardh Vijayakumar and Lee Harrison, Samsung Research America; Amir Rahmati, Samsung Research America and Stony Brook University; Michael Grace, Samsung Research America; Kevin R. B. Butler, University of Florida https://www.usenix.org/conference/usenixsecurity18/presentation/tian This paper is included in the Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA ISBN 978-1-931971-46-1 Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem Dave (Jing) Tian∗1, Grant Hernandez1, Joseph I. Choi1, Vanessa Frost1, Christie Ruales1, Patrick Traynor1, Hayawardh Vijayakumar2, Lee Harrison2, Amir Rahmati2,3, Michael Grace2, and Kevin R. B. Butler1 1Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, FL, USA fdaveti,grant.hernandez,choijoseph007,vfrost,cruales,traynor,butlerg@ufl.edu 2Samsung Research America, Mountain View, CA, USA fh.vijayakuma,lee.harrison,amir.rahmati,
[email protected] 3Department of Computer Science, Stony Brook University, Stony Brook, NY, USA Abstract have also been used by smartphone manufacturers and operating system designers to access and control device AT commands, originally designed in the early 80s for functionality in proprietary ways. For example, AT com- controlling modems, are still in use in most modern mands on Sony Ericsson smartphones can be used to ac- smartphones to support telephony functions. The role cess GPS accessories and the camera flash [18].