The Misuse of Android Unix Domain Sockets and Security Implications
Association for Computing Machinery (ACM) via YouTube
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
The Private Equity Associate Certification
Overview
Syllabus
Intro
Motivation (cont'd)
Contributions
Unix domain sockets
Threat model
ABSTRACT is the default
Authentication is needed
Highlights
Apps using Unix sockets (Q1)
Socket address analysis (Q2)
Authentication analysis (03)
Implementation
Overview
Real-world usage
Identified libraries
Weak authentication
Strong authentications
Common mistakes
Case study: KingRoot
Mitigations (cont'd)
Summary
Demos
Taught by
ACM CCS