We leverage an unauthenticated AT command interface present in the LG G4 and other LG devices to bypass the lockscreen, control the touchscreen, and leak sensitive data.
For more information and links to artifacts, visit https://atcommands.org
News Article: http://news.ufl.edu/articles/2018/08/...
Based off on the work from our paper "ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem". Appeared at USENIX Security 2018.
Narrated by Grant Hernandez