Opening Pandora’s box through Atfuzzer: Dynamic analysis of at interface for android smartphones

Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations

    Abstract

    This paper focuses on checking the correctness and robustness of the AT command interface exposed by the cellular baseband processor through Bluetooth and USB. A device’s application processor uses this interface for issuing high-level commands (or, AT commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can be leveraged by malicious Bluetooth peripherals to launch pernicious attacks including DoS and privacy attacks. To identify such vulnerabilities, we propose ATFuzzer that uses a grammar-guided evolutionary fuzzing approach which mutates production rules of the AT command grammar instead of concrete AT commands. Empirical evaluation with ATFuzzer on 10 Android smartphones from 6 vendors revealed 4 invalid AT command grammars over Bluetooth and 13 over USB with implications ranging from DoS, downgrade of cellular protocol version (e.g., from 4G to 3G/2G) to severe privacy leaks. The vulnerabilities along with the invalid AT command grammars were responsibly disclosed to affected vendors and two of the reported vulnerabilities have been already assigned CVEs (CVE-2019-16400 and CVE-2019-16401).

    Original languageEnglish (US)
    Title of host publicationProceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019
    PublisherAssociation for Computing Machinery
    Pages529-543
    Number of pages15
    ISBN (Electronic)9781450376280
    DOIs
    StatePublished - Dec 9 2019
    Event35th Annual Computer Security Applications Conference, ACSAC 2019 - San Juan, United States
    Duration: Dec 9 2019Dec 13 2019

    Publication series

    NameACM International Conference Proceeding Series

    Conference

    Conference35th Annual Computer Security Applications Conference, ACSAC 2019
    Country/TerritoryUnited States
    CitySan Juan
    Period12/9/1912/13/19

    All Science Journal Classification (ASJC) codes

    • Software
    • Human-Computer Interaction
    • Computer Vision and Pattern Recognition
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Opening Pandora’s box through Atfuzzer: Dynamic analysis of at interface for android smartphones'. Together they form a unique fingerprint.

    Cite this