Shattered Trust: When Replacement Smartphone Components Attack

05/13/2018
by   Omer Shwartz, et al.
0

Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by third-party manufacturers and not by the phone vendors themselves. Third-party driver source code to support these components is integrated into the vendor's source code. In contrast to 'pluggable' drivers, such as USB or network drivers, the component driver's source code implicitly assumes that the component hardware is authentic and trustworthy. As a result of this trust, very few integrity checks are performed on the communications between the component and the device's main processor. In this paper, we call this trust into question, considering the fact that touchscreens are often shattered and then replaced with aftermarket components of questionable origin. We analyze the operation of a commonly used touchscreen controller. We construct two standalone attacks, based on malicious touchscreen hardware, that function as building blocks toward a full attack: a series of touch injection attacks that allow the touchscreen to impersonate the user and exfiltrate data, and a buffer overflow attack that lets the attacker execute privileged operations. Combining the two building blocks, we present and evaluate a series of end-to-end attacks that can severely compromise a stock Android phone with standard firmware. Our results make the case for a hardware-based physical countermeasure.

READ FULL TEXT

page 6

page 9

page 13

research
05/30/2018

Hypervisor-Based Active Data Protection for Integrity and Confidentiality of Dynamically Allocated Memory in Windows Kernel

One of the main issues in the OS security is providing trusted code exec...
research
10/12/2017

Clusters of Driving Behavior from Observational Smartphone Data

Understanding driving behaviors is essential for improving safety and mo...
research
02/09/2023

Forensic Log Based Detection For Keystroke Injection "BadUsb" Attacks

This document describes an experiment with main purpose to detect BadUSB...
research
05/06/2021

Interposer-Based Root of Trust

Industry is moving towards large-scale system-on-chip (SoC) designs wher...
research
11/02/2022

The Impostor Among US(B): Off-Path Injection Attacks on USB Communications

USB is the most prevalent peripheral interface in modern computer system...
research
04/04/2020

Building secure distributed applications the DECENT way

Remote attestation (RA) enables distributed applications that deploy tru...
research
05/04/2021

Automated Driver Testing for Small Footprint Embedded Systems

Embedded systems represent a billionaire market and are present in most ...

Please sign up or login with your details

Forgot password? Click here to reset