Loading…

Android Pattern Bypass using Microcontroller

The goal is to exploit a potential security vulnerability in Android devices by using a microcontroller which goes by the name ATTiny85 connected via USB. The objective is to bypass the lock patterns or security measures typically in place on Android devices, which are designed to prevent unauthoriz...

Full description

Saved in:
Bibliographic Details
Published in:International journal for research in applied science and engineering technology 2024-04, Vol.12 (4), p.962-968
Main Authors: Reddy, Reddyvari Venkateswara, Gayathri, V, Reddy, P Sai Charan, Kumar, S Raj
Format: Article
Language:English
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The goal is to exploit a potential security vulnerability in Android devices by using a microcontroller which goes by the name ATTiny85 connected via USB. The objective is to bypass the lock patterns or security measures typically in place on Android devices, which are designed to prevent unauthorized access. This could involve manipulating the USB connection to take control of the device's data or functions, potentially compromising the device's security. Such actions are unethical and illegal without proper authorization. It’s really important to acknowledge the amount of loss these attacks incur. The primary aim is to capitalize on a potential security vulnerability inherent in Android devices through the utility provided by microcontroller. This strategy is devised to circumvent the established lock patterns and security protocols usually implemented on Android devices, serving as a deterrent against unauthorized access. This approach may entail manipulating the USB connection to infiltrate the device's data or functionalities, posing a significant threat. It is crucial to emphasize that engaging in such activities is not only unethical but also illegal without explicit authorization. This underscores the paramount importance of upholding robust security measures on Android devices to proactively thwart any attempts at exploitation.
ISSN:2321-9653
2321-9653
DOI:10.22214/ijraset.2024.59940