Android AT command scripts and firmware extraction
Switch branches/tags
Nothing to show
Clone or download
Latest commit 982938c Aug 28, 2018
Type Name Latest commit message Commit time
Failed to load latest commit information.
extract initial code commit Aug 15, 2018
interact Update READMEs Aug 15, 2018
send Update READMEs Aug 15, 2018
usbswitch Update usbswitcher readme Aug 28, 2018 Update READMEs Aug 15, 2018

ATtention Spanned

A collection of scripts used to automatically extract Android firmware images and process them for AT commands. These scripts may be modified for other tasks, such as extracting specific files or merely extracting base filesystem images.

The scripts are divided into directories based on their function. Refer to the READMEs contained in each directory for usage instructions and more detailed information.

  • extract: contains code for extracting AT commands from Android firmware images
  • interact: contains code to spawn a shell for interactively sending AT commands to phones and observing the returned responses
  • send: contains code for automated testing of a large number of AT commands on a physical phone, with all responses recorded in a log file
  • usbswitch: contains code for switching a device to an alternate USB configuration and enabling the modem interface

For questions contact the first, second, or third author via email.

If you base any academic work off of ATCMD, please cite our paper:

@inproceedings {tian18,
  author = {Dave (Jing) Tian and Grant Hernandez and Joseph I. Choi and Vanessa Frost and Christie Ruales and Patrick Traynor and Hayawardh Vijayakumar and Lee Harrison and Amir Rahmati and Michael Grace and Kevin R. B. Butler},
  title = {ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands within the Android Ecosystem},
  booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
  year = {2018},
  address = {Baltimore, MD},
  url = {},
  publisher = {{USENIX} Association},