skip to main content
10.1145/2516760.2516765acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Native code execution control for attack mitigation on android

Published:08 November 2013Publication History

ABSTRACT

Sophisticated malware targeting the Android mobile operating system increasingly utilizes local root exploits. These allow for the escalation of privileges and subsequent automatic, unnoticed, and permanent infection of a target device. Poor vendor patch policy leaves customer devices vulnerable for many months. All current local root exploits are exclusively implemented as native code and can be dynamically downloaded and run by any app. Hence, the lack of control mechanisms for the execution of native code poses a major threat to the security of Android devices. In this paper, we present different approaches to prevent local root exploits by means of gradually controlling native code execution. The proposed alterations to the Android operating system protect against all current local root exploits, while limiting the user experience as little as possible. Thus, the approaches we present help to avert automatic privilege escalation and to reduce exploitability and malware infection of Android devices.

References

  1. Android Open Source Project. Android Security Overview. http://source.android.com/tech/security/ (18.02.2013).Google ScholarGoogle Scholar
  2. M. Balanza, K. Alintanahin, O. Abendan, J. Dizon, and B. Caraig. DroidDreamLight lurks behind legitimate Android apps. In 6th International Conference on Malicious and Unwanted Software (MALWARE), pages 73 --78, oct. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Bugiel, L. Davi, A. Dmitrienko, S. Heuser, A.-R. Sadeghi, and B. Shastry. Practical and lightweight domain isolation on android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11, pages 51--62, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. Security & Privacy, IEEE, 7(1):50--57, jan.-feb. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. C. Foster and M. Price. Sockets, Shellcode, Porting & Coding. Syngress Publishing, 2005.Google ScholarGoogle Scholar
  6. X. Jiang. GingerMaster: First Android Malware Utilizing a Root Exploit on Android 2.(Gingerbread), August 18, 2011. http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/ (18.02.2013).Google ScholarGoogle Scholar
  7. X. Jiang. New Sophisticated Android Malware DroidKungFu Found in Alternative Chinese App Markets, June 23, 2011. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu\\.html (18.02.2013).Google ScholarGoogle Scholar
  8. X. Jiang. New GappII Trojan Found in Alternative Android Markets, April 27, 2012. http://www.csc.ncsu.edu/faculty/jiang/GappII/ (18.02.2013).Google ScholarGoogle Scholar
  9. X. Jiang. New RootSmart Android Malware Utilizes the GingerBreak Root Exploit, February 3, 2012. http://www.csc.ncsu.edu/faculty/jiang/RootSmart/ (18.02.2013).Google ScholarGoogle Scholar
  10. SELinux Project. SEAndroid. http://selinuxproject.org/page/SEAndroid (18.02.2013).Google ScholarGoogle Scholar
  11. M. Spreitzenbarth and F. Freiling. Android Malware on the Rise. Technical report, University of Erlangen, Dept. of Computer Science, April 2012. Tech. Rep. CS-2012-04.Google ScholarGoogle Scholar
  12. A. Stavrou, J. Voas, T. Karygiannis, and S. Quirolgico. Building security into off-the-shelf smartphones. Computer, 45(2):82 --84, Feb. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. L. Tona. TOMOYO Linux on Android, May 2009. http://sourceforge.jp/projects/tomoyo/docs/Part2\_\\CELF\_Android.pdf (18.02.2013).Google ScholarGoogle Scholar
  14. T. Vidas, D. Votipka, and N. Christin. All your droid are belong to us: a survey of current android attacks. In Proceedings of the 5th USENIX conference on Offensive technologies, WOOT'11, pages 81--90, Berkeley, CA, USA, 2011. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In IEEE Symposium on Security and Privacy 2012, pages 95 -- 109, May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the 19th Network and Distributed System Security Symposium, February 2012.Google ScholarGoogle Scholar

Index Terms

  1. Native code execution control for attack mitigation on android

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SPSM '13: Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
      November 2013
      120 pages
      ISBN:9781450324915
      DOI:10.1145/2516760

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 November 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SPSM '13 Paper Acceptance Rate13of54submissions,24%Overall Acceptance Rate46of139submissions,33%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader