Skip to main content
Other
DOPA: Detecting Open Ports in Android OS
2018 IEEE Conference on Communications and Network Security (CNS)
  • Ali Alshehri, Oakland University
  • Hani Alshahrani, Oakland University
  • Abdulrahman Alzahrani, Oakland University
  • Raed Alharthi,, Oakland University
  • Huirong Fu, Oakland University
  • Anyi Liu, Oakland University
  • Ye Zhu, Cleveland State University
Document Type
Conference Proceeding
Publication Date
8-1-2018
Disciplines
Abstract

In smartphones, open ports can be exploited by malicious applications to allow attackers to remotely control user's device. In this work, we perform an attack that opens a port on an Android device to remotely connect to this port and access various phone features without requesting any permission from the user. Additionally, we develop and implement a tool called, Detecting Open Ports in Android operating system (DOPA), that detects open ports and reports them to the user.

Comments

Paper presented at 6th IEEE Conference on Communications and Network Security (CNS), Beijing, PEOPLES R CHINA, MAY 30-JUN 01, 2018

This research work is partially supported by the National Science Foundation under Grants CNS-1460897, DGE-1623713, and DGE-1723707.

DOI
10.1109/CNS.2018.8433207
Citation Information
Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi,, et al.. "DOPA: Detecting Open Ports in Android OS" 2018 IEEE Conference on Communications and Network Security (CNS) (2018)
Available at: http://works.bepress.com/ye_zhu/19/