Download Now Free registration required
Exploits on mobile phones can be used for various reasons; a benign one may be to achieve system-level access on a device that was locked by the manufacturer or service provider (also known as 'Jailbreaking' or 'Rooting'), while potentially malicious reasons are manifold. Independently of the use case, however, a specific exploit is not sufficient to achieve the desired access rights. Typically, exploits provide temporary privilege escalation immediately after their execution. To provide additional access to applications, permanent privilege escalation is required - in the benign case, including secure access control for the user to decide which (parts of) applications are granted elevated access.
- Format: PDF
- Size: 211.2 KB