Skip to content

wfarouk/Rootector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Rootector

Android Root Detector

http://tikzon.com/root/ . http://tikzon.com/root/RootDetector.apk

Android Root is granting administrator access to each application in your mobile, Root is not recommended by most of the mobile vendors but still many Android users root their devices and position their device on very high risk. Many of confidential information can be easily disclosed and increasing the possibilities of getting malware infection. Some users remove the rooting from their device while considering it completely uninstalled, our research is taking the initiative to detect the hidden root in your device as well assess the risk level of the existing root.

As currently I am in the experimental phase of my Ph.D , I developed as small Android application Called “ROOT DETECTOR” which I attach with this context.

Please kindly follow the steps to install the application on your mobile which assuring no risk of collecting or disclosing any personal information from your mobile devices.

1- Step 1 before installation the applications please make sure that the mobile accept installation of unknown sources by clicking security then click on Unknown sources.

2- Step 2 install the APK file by clicking the following attachment RootDetector.APK

3- Step 3 open the application while Internet is connected: using the following icon named “RootDetector” with the following icon:

4- The application will scan your device and show you the status of your device: if the device is rooted or not-rooted.

5- Step 4 The application is waiting for you to correct the initial result, for example if your device is rooted and application shows it is not rooted please click the green sign and visa versa if the result is showing your device is rooted and in fact it is not rooted please click the red sign.

6- For your information the following is the list of information that is communicated to our server to build a robust detection model:

a- Table 1 – list test results 0 or 1 and list of Apps

Column Names: # sessionID, deviceID, projectprojectID, useruserID, collectedTime, f1, f2, f3, f4, f5, f6, f7, f8, f9, f10, f11, f12, f13, f14, f15, f16, f17, f18, f19, f20, f21, f22, f23, f24, f25, f26, f27, f28, f29, f30, f31, f32, f33, f34, f35, f36, f37, f38, f39, f40, f41, f42, f43, f44, fn1, fn2, fn3, fn4, fn5, fn6, fn7, fn8, fn9, fn10, fn11, fn12, fn13, fn14, fn15, fn16, fn17, fn18, fn19, fn20, fn21, fn22, fn23, fn24, fn25, fn26, fn27, fn28, fn29, fn30, fn31, fn32, fn33, fn34, fn35, fn36, fn37, fn38, fn39, fn40, fn41, fn42, fn43, fn44, fn45, fn46, orgLabel, label, appsList,

Values: '63', 'A0481C8EAB210000 ', '10', '10 ', '2017-02-23 06:40:33', '0', '1', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '1', '0', '0', '0', '1', '1', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '1', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '0', '1', '0', '0', '0', '1', '0', '0', '\npackage:com.tikzon.rootdetector\n

package:com.android.soundrecorder\n

package:com.android.defcontainer\n

package:com.android.contacts\n

package:com.facebook.lite

b- Table 2 – list of devices

Column Names: # deviceID, projectprojectID, useruserID, BuildSDK, androidId, curModel, curProduct, curMan, curBrand, curDevice, curVer

Values: '39', '10', '10', '21', 'eb65aa47c4c9c142', 'Android SDK built for x86', 'sdk_google_phone_x86', 'unknown', 'generic_x86', 'generic_x86', '5.0.2'

Thank you very much in participating in this research and hopefully this become a very good product to alert community from the Android rooting seriousness.

Please send us your feedback on any of the copied below emails if any further information is required

Best regards

Wael Farouk Elsersy

Ph.D Cand.

Faculty of Computer Science and Information Technology

University of Malaya

Email :

wfarouk@siswa.um.edu.my

Wael@tikzon.com

Tel: +60-11-2805-2353

Linkedin: http://www.linkedin.com/in/welsersy

http://www.orcid.org/0000-0002-7501-6889

About

Android Root Detector

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published