Back to Results
First PageMeta Content
Unix / Android / Smartphones / Embedded Linux / Privilege escalation / Linux / Rooting / Linux kernel / Operating system / Software / Computing / System software


A framework for on-device privilege escalation exploit execution on Android Sebastian Höbarth
Add to Reading List

Open Document

File Size: 211,16 KB

Share Result on Facebook

City

San Francisco / /

Company

Nokia / ACM Press / Google / HTC / Syngress Publishing / Samsung / Apple / /

Country

United States / /

/

Facility

Android Debugging Bridge / Android Sebastian Höbarth Rene Mayrhofer Upper Austria University of Applied Sciences Upper Austria University / Apple store / /

IndustryTerm

security infrastructure / boot devices / server operating systems / automatic device / mounted file systems / host systems / firmware installation tools / baseband processor / User space utilities / arbitrary applications / user-space tools / malicious applications / energy consumption / user space tools / INTERNET permission / normal device / access to applications / untrusted applications / embedded computing / /

OperatingSystem

Unix / GNU/Linux / Linux / Android / Maemo / POSIX / /

Organization

Applied Sciences Upper Austria University / Android Sebastian Höbarth Rene Mayrhofer Upper Austria University / /

Person

J. C. Foster / V / /

Position

Android application manager / /

Product

iPhone / Nokia N900 Smartphone / HTC Desire Smartphone / iPad / Apple iPhone / Android / /

ProgrammingLanguage

Java / C / XML / C++ / /

Technology

virtual machine / XML / RAM / Linux / Unix / laptop computer / mobile phones / private key / Android / shared memory / operating systems / baseband processor / mobile devices / cellular telephone / flash memory / DNS / Android system / Java / http / GSM / flash / network protocols / /

URL

http /

SocialTag