6/13/2016
- Presentation Day
- Updated Website
- Constructed Abstract
- Discovered DDoS attacks are possible with no permissions
- Discovered DOS/DDoS by ping flooding possible with no permissions
- Met with Ali and discussed progress
- Drafted abstract and introduction
- Began looking into other permissions combined with READ_PHONE_STATE
- Looked into Location services: tried to find statistics on how common GSP stalking and blackmail is
- Researched how common it is for apps to sell information for money
- Tried to find proof of attackers signing up users for subscriptions
- SMS attack Proof of concept app reads phone number correctly
- Currently setting up a server for the data to be sent to the server.
- Searched for statistics to back up some claims
- Location services attacks
- Account Hijacking
- Location services attacks
- SMS attack proof of concept app:
- manifest permissions optimized
- Javadoc in place
- Optimized method calls to keep a smaller stack trace
- manifest permissions optimized
- Prepared for presentation
- SMS attack proof of concept app:
- All prep necessary to start testing server communication now.
- All prep necessary to start testing server communication now.
- Continued research on data brokers and account hijacking