awesome-android-security
                                
                                
                                
                                    awesome-android-security copied to clipboard
                            
                            
                            
                        A Collection of Android (Samsung) Security Research References
Awesome Android Security 

Theory
- Android Kernel Exploitation
 - Hacking Android Apps with Frida
 - Android Frida Scripts
 - Real-time Kernel Protection (RKP)
 - Breaking TEE Security
 - Android Developer Fundamentals
 - Android Security Lecture : Professor 허준영 lecture material
 - Android Pentesting Checklist
 - OWASP Mobile Security Testing Guide (MSTG)
 - OWASP Mobile Application Security Verification Standard (MASVS)
 - Frida Cheatsheet and Code Snippets for Android
 - Frida HandBook
 
Report
2018
2019
- ~~[Report] Samsung Galaxy Apps Store RCE via MITM~~ Unable to connect
 
2020
- [Report] Flaws in ‘Find My Mobile’ exposed Samsung phones to hack
 - [Report] Project Zero : MMS Exploit
 - [Report] Breaking Samsung firmware, or turning your S8/S9/S10 into a DIY “Proxmark”
- [Speaker] Beyond Root
 
 - [Report] Arbitrary code execution on Facebook for Android through download feature
 - [Report] Samsung S20 - RCE via Samsung Galaxy Store App
 - [Report] Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox
 - [Report] Exploiting CVE-2020-0041 - Part 2: Escalating to root
 
2021
- [Report] In-the-Wild Series: Android Exploits
 - [Report] Data Driven Security Hardening in Android
 - [Report] An apparently benign app distribution scheme which has all it takes to turn (very) ugly
 - [Report] Android Kernel Privilege Escalation (CVE-2020-11239)
 - [Report] Two weeks of securing Samsung devices
 - [Report] Why dynamic code loading could be dangerous for your apps: a Google example
 - [Report] Exploiting memory corruption vulnerabilities on Android
 - [Report] Common mistakes when using permissions in Android
 - [Report] Android security checklist: WebView
 - [Report] Use cryptography in mobile apps the right way
 
2022
- [Report] RCE IN ADOBE ACROBAT READER FOR ANDROID (CVE-2021-40724)
 - [Report] The Dirty Pipe Vulnerability (CVE-2022-0847)
- [PoC] DirtyPipe for Android
 - Video
 
 
Paper
2015
- [Paper] Fuzzing Android: a recipe for uncovering vulnerabilities inside system components in Android
 
2016
- [Paper] STAB Fuzzing: A Study of Android's Binder IPC and Linux/Android Fuzzing
 - [Paper] 안드로이드 장치 드라이버에 대한 효과적 취약점 탐지 기법
 
2019
2020
- [Paper] 악성 안드로이드 앱 탐지를 위한 개선된 특성 선택 모델
 - [Paper] 안드로이드 애플리케이션 환경에서 CFI 우회 공격기법 연구
 - [Paper] An Empirical Study of Android Security Bulletins in Different Vendors
 - [Paper] Research on Note-Taking Apps with Security Features
 - [Paper] Deploying Android Security Updates: an Extensive Study Involving Manufacturers, Carriers, and End Users
 
2021
- [Paper] FraudDetective: 안드로이드 모바일 광고 사기 탐지 및 사기 발생의 인과관계 분석
 - [Paper] 안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법
 - [Paper] 사용자 맞춤형 서버리스 안드로이드 악성코드 분석을 위한 전이학습 기반 적응형 탐지 기법
 
2022
- [Paper] DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
 - [Paper] Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
- [PoC] Keybuster
 
 - [Paper] ARM 캐시 일관성 인터페이스를 이용한 안드로이드OS 의 스크린 잠금 기능 부채널 공격
 - [Paper] GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
 - [Paper] SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android
 - [Paper] insecure:// Vulnerability Analysis of URI Scheme Handling in Android Mobile Browsers
 - [Paper] FIRMWIRE: Transparent Dynamic Analysis for Cellular Baseband Firmware
 - [Paper] Large-scale Security Measurements on the Android Firmware Ecosystem
 - [Paper] GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line
 
Speaker
2017
2019
- [Speaker] KNOX Kernel Mitigation Bypasses
 - [Speaker] Android Security Internals
 - [Speaker] Fuzzing OP -TEE with AFL
 
2020
- [Speaker] Breaking Samsung's Root of Trust - Exploiting Samsung Secure Boot
 - [Speaker] Samsung Security Tech Forum 2020
 - [Speaker] Qualcomm Compute DSP for Fun and Profit
 - [Speaker] PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
 
2021
- [Speaker] Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones
 - [Speaker] Typhoon Mangkhut: One-click Remote Universal Root Formed with Two Vulnerabilities
 - [Speaker] Breaking Secure Bootloaders
 - [Speaker] Can You Hear Me Now? Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications
 - ~~[Speaker] Blowing the Cover of Android Binary Fuzzing~~ Unable to connect
 - [Speaker] Samsung Security Tech Forum 2021
 - [Speaker] Emulating Samsung's Baseband for Security Testing
 - [Speaker] Stealthily Access Your Android Phones: Bypass the Bluetooth Authentication
 - [Speaker] Over the Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones
 - [Speaker] HOOKA: Deep Dive Into ARTAndroid Runtime For Dynamic Binary Analysis
 
2022
- [Speaker] A Deep Dive into Privacy Dashboard of Top Android Vendors
 - [Speaker] Hand in Your Pocket Without You Noticing: Current State of Mobile Wallet Security
 - [Speaker] Re-route Your Intent for Privilege Escalation: A Universal Way to Exploit Android PendingIntents in High-profile and System Apps
 - [Speaker] DroidGuard: A Deep Dive into SafetyNet
 - [Speaker] Android static taint analysis 기법과 발전 방향
 - [Speaker] Android 12에서 Dynamic Taint Analysis 기법을 이용한 Kakao talk의 복호화
 
Tools
Static / Dynamic Analysis
- JEB Decompiler : Powerful Integrated Analysis Tools
 - IDA Pro : Powerful Integrated Analysis Tools
 - APKLab : APK Integration Tool in VSCode
 - Mobile Security Framework (MobSF) : Online Service
 - Apktool : APK Files Reverse Engineering
 - Bytecode Viewer : Java Reverse Engineering
 - JD-GUI : Java Decompiler
 - JADX : DEX to Java Decompiler
 - RMS-Runtime-Mobile-Security : Manipulate Android and iOS Apps at Runtime
 - APKLeaks : Scanning APK File for URIs, Endpoints & Secrets
 - Apkingo : APK Details Exploration Tool
 
Online Analysis
- Oversecured : Paid Use
 - Virustotal : Free Use
 
Forensisc Analysis
- MAGNET Forensisc : Powerful Integrated Analysis Tools
 - Autopsy : End-To-End Open Source Digital Forensics Platform
 - Wireshark : Network Protocol Analyzer
 
Fuzzer
- Android-afl : Android-enabled Version of AFL
 - LibFuzzer : A Library For Coverage-Guided Fuzz Testing
 - Droid : Android Application Fuzzing Framework
 - Droid-ff : Android File Fuzzing Framework
 - DoApp : A Smart Android Fuzzer For The Future
 - DIFUZER : Fuzzer for Linux Kernel Drivers
 - LTEFuzz : LTE Network Exception Handling Testing, KAIST
 
Root
Malware
- Quark Engine : An Obfuscation-Neglect Android Malware Scoring System
 - AhMyth Android Rat : Sample Malware Production Tool
 - TheFatRat : An Exploiting Tool which Compiles a Malware
 
Virtual / Build / Source
- Android Open Source Project (AOSP) : QEMU(Quick Emulator) Hypervisor
 - Android Studio : Android Virtual Device (AVD) Manager
 - Android x86 : Android Virtual Emulator
 - Nox Player : Android Virtual Emulator
 - Samsung Open Source : Kernel, Platform Open Source
 - SamFw : [Web] Android Firmware
 - Frija : [Software] Android Firmware
 
Etc
- Scrcpy : ADB Based Android Screen Sharing Tool
 - GDB : APK Library Analysis Tools
 - PEDA-ARM : ARM Architecture GDB PEDA Plug-in
 - Termux : Android Terminal Emulator and Linux Environment App
 - Diffuse : APK, AAB, AAR, and JAR Diffing Tool
 
Other
BugBounty
CVE / SVE
Blog / Site / Git
- Oversecured Blog : Technology Blog
 - ESTsecurity Blog : [KOR] Issue Blog
 - BlackHat : International Security Conference
 - Bug Bounty Hunting Search Engine
 - Awesome-Android-Security #1
 - Awesome-Android-Security #2
 - Awesome-Android-Security #3
 - Android Malware 2021
 - TEE Basics & General : TEE Resources
 - Mobile CTF challenges
 - SamMobile : Community Site
 - XDA Developers : Community Site
 - Cyber Security RSS : Security Issue Collection Site
 
SNS
Samsung Mobile Security Statistics
* Please note that the statistics are not accurate.

Backers
Thank you to all our supporters! 🙏
* Please, consider supporting my work as a lot of effort takes place to generate this list! Thanks a lot.
⬆ back to top
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
If you have any question about this opinionated list, do not hesitate to contact me @NetKingJ on Facebook or open an issue on GitHub.

