z-logo
open-access-imgOpen Access
Research on Android Application Package Stealth Download Hijacking
Author(s) -
Xiao Fu,
Zhijian Wang,
Yong Chen,
Feng Ye,
Zhu Zhu,
Yihua Zhang
Publication year - 2018
Publication title -
destech transactions on computer science and engineering
Language(s) - English
Resource type - Journals
ISSN - 2475-8841
DOI - 10.12783/dtcse/csae2017/17526
Subject(s) - download , computer science , exploit , upload , notice , android (operating system) , computer security , vulnerability (computing) , internet privacy , operating system , political science , law
Nowadays during the distributing and downloading of Android application packages, it is always be vulnerable to download hijacking attacks. Traffic analysis could be used by sites to detect if they are under this kind of regular download hijacking attacks. Unlike the regular ones, the stealth download hijacking attacks cannot be discovered by using such a method. By studying in an actual case, this paper presents a vulnerability of android application package download hijacking, which can be exploited to implement a stealth download hijacking by deploying bypass devices. And the victim sites can hardly notice it by using current methods. The cause, influence and mechanism of the exploit are discussed in this paper, and we also strive to give a solution for it.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom