skip to main content
10.1145/2557547.2557563acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

PREC: practical root exploit containment for android devices

Authors Info & Claims
Published:03 March 2014Publication History

ABSTRACT

Application markets such as the Google Play Store and the Apple App Store have become the de facto method of distributing software to mobile devices. While official markets dedicate significant resources to detecting malware, state-of-the-art malware detection can be easily circumvented using logic bombs or checks for an emulated environment. We present a Practical Root Exploit Containment (PREC) framework that protects users from such conditional malicious behavior. PREC can dynamically identify system calls from high-risk components (e.g., third-party native libraries) and execute those system calls within isolated threads. Hence, PREC can detect and stop root exploits with high accuracy while imposing low interference to benign applications. We have implemented PREC and evaluated our methodology on 140 most popular benign applications and 10 root exploit malicious applications. Our results show that PREC can successfully detect and stop all the tested malware while reducing the false alarm rates by more than one order of magnitude over traditional malware detection algorithms. PREC is light-weight, which makes it practical for runtime on-device root exploit detection and containment.

References

  1. Android Security Overview. Android Source. http://source.android.com/devices/tech/security/.Google ScholarGoogle Scholar
  2. Antutu Benchmark. https://play.google.com/store/apps/details?id=com.antutu.ABenchMark.Google ScholarGoogle Scholar
  3. DTrace. http://docs.oracle.com/javase/6/docs/technotes/guides/vm/dtrace.html.Google ScholarGoogle Scholar
  4. DWARF Debugging Standard. http://www.dwarfstd.org/.Google ScholarGoogle Scholar
  5. Exception Handling ABI for ARM Architecture. http://infocenter.arm.com/help/topic/com.arm.doc.ihi0038a/IHI0038A_ehabi.pdf.Google ScholarGoogle Scholar
  6. Ice Cream Sandwich. Android Developer. http://developer.android.com/about/versions/android-4.0-highlights.html.Google ScholarGoogle Scholar
  7. Linux man page - pTrace - process trace. http://linux.die.net/man/2/ptrace.Google ScholarGoogle Scholar
  8. Linux Trace Toolkit - next generation. https://lttng.org.Google ScholarGoogle Scholar
  9. Security-Enhanced Linux. Android Developer. http://source.android.com/devices/tech/security/selinux.html.Google ScholarGoogle Scholar
  10. SystemTap. http://sourceware.org/systemtap/.Google ScholarGoogle Scholar
  11. UI/Application Exerciser Mokey. http://developer.android.com/tools/help/monkey.html.Google ScholarGoogle Scholar
  12. Vulnerabilities. X-Ray. http://www.xray.io/#vulnerabilities.Google ScholarGoogle Scholar
  13. Apple. Apple Updates iOS to 6.1. Apple. http://www.apple.com/pr/library/2013/01/28Apple-Updates-iOS-to-6-1.html.Google ScholarGoogle Scholar
  14. I. Balepin, S. Maltsev, J. Rowe, and K. Levitt. Using specification-based intrusion detection for automated response. In Proc. of RAID, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  15. U. Bayer, P. Milani, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In Proc. of NDSS, 2009.Google ScholarGoogle Scholar
  16. C. M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, Inc., New York, NY, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: Behavior-Based Malware Detection System for Android. In Proc. of CCS-SPSM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. A Quantitative Study of Accuracy in System Call-Based Malware Detection. In Proc. of ISSTA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. MAST: Triage for Market-scale Mobile Malware Analysis. In Proc. of WiSec, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. Towards an Understanding of Anti-virtualization and Anti-debugging Behavior in Modern Malware. In Proc. of DSN, 2008.Google ScholarGoogle Scholar
  21. J. Cheng, S. H. Wong, H. Yang, and S. Lu. SmartSiren: Virus Detection and Alert for Smartphones. In Proc. of MobiSys, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. G. Creech and J. Hu. A Semantic Approach to Host-based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns. IEEE Transactions on Computers, 2013.Google ScholarGoogle Scholar
  23. D. Dean, H. Nguyen, and X. Gu. UBL: Unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems. In Proc. of ICAC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Egele, T. Scholte, E. Kirda, and C. Kruegel. A Survey on Automated Dyanmic Malware-Analysis Techniques and Tools. ACM Computing Surveys, 44(2), Feb. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred. Statistical approaches to ddos attack detection and response. In Proc. of the DARPA Information Survivability Conference and Exposition, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  26. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A Sense of Self for Unix Processes. In Proc. of IEEE Symposium on Security and Privacy, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Gao, M. K. Reiter, and D. Song. Gray-box extraction of execution graphs for anomaly detection. In Proc. of CCS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Gao, M. K. Reiter, and D. Song. Behavioral Distance for Intrusion Detection. In Proc. of RAID, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In Proc. of NDSS, 2003.Google ScholarGoogle Scholar
  30. L. Girardin and D. Brodbeck. A visual approach for monitoring logs. In Proc. of LISA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proc. of MobiSys, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. W. Hu, Y. Liao, and V. R. Vemuri. Robust anomaly detection using support vector machines. In Proc. of ICML, 2003.Google ScholarGoogle Scholar
  33. T. Isohara, K. Takemori, and A. Kubota. Kernel-based Behavior Analysis for Android Malware Detection. In Proc. of CIS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. H. Jiang and J. Ruan. The application of genetic neural network in network intrusion detection. Journal of Computers, 2009.Google ScholarGoogle Scholar
  35. T. Kohonen, J. Tan, and T. Huang. Self-Organizing Maps. Springer, 3rd edition, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and Efficient Malware Detection at the End Host. In Proc. of USENIX Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. C. Kruegel, D. Mutz, F. Valeur, and G. Vigna. On the detection of anomalous system call arguments. In Proc. of ESORICS, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  38. P. Lichodzijewski, A. Nur Zincir-Heywood, and M. Heywood. Host-based intrusion detection using self-organizing maps. In Proc. of IJCNN, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  39. H. Lockheimer. Android and Security. Google Mobile Blog. http://googlemobile.blogspot.com/2012/02/androidand-security.html.Google ScholarGoogle Scholar
  40. F. Maggi, M. Matteucci, and S. Zanero. Detecting intrusions through system call sequence and argument analysis. IEEE TODS, 2008.Google ScholarGoogle Scholar
  41. R. Mahmood, N. Esfahani, T. Kacem, N. Mirzaei, S. Malek, and A. Stavrou. A whitebox approach for automated security testing of android applications on the cloud. In Proc. of AST, 2013.Google ScholarGoogle Scholar
  42. C. Michael and A. Ghosh. Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. In Proc. of RAID, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. A. Moser, C. Kruegel, and E. Kirda. Exploring Multiple Execution Paths for Malware Analysis. In Proc. of IEEE Symposium on Security and Privacy, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. J. Oberheide. Dissecting Android's Bouncer. The Duo Bulletin. https://blog.duosecurity.com/2012/06/dissecting-androids-bouncer/.Google ScholarGoogle Scholar
  45. J. Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-Version Antivirus in the Network Cloud. In Proc. of USENIX Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. C. Peng, C. yu Li, G. hua Tu, S. Lu, and L. Zhang. Mobile Data Charging: New Attacks and Countermeasures. In Proc. of CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. H. Pilz. Building a Test Environment for Android Anti-malware Tests. In Proc. of VB, 2012.Google ScholarGoogle Scholar
  48. G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: Versatile Protection For Smartphones. In Proc. of ACSAC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. V. Rastogi, Y. Chen, and W. Enck. Appsplayground: automatic security analysis of smartphone applications. In Proc. of CODASPY, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Android permissions: a perspective combining risks and benefits. In Proc. of SACMAT, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. A. Somayaji and S. Forrest. Automated response using system-call delays. In Proc. of the USENIX Security, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. A. M. R. Tahiliani and M. Naik. Dynodroid: An input generation system for android apps. Technical report, Georgia Institute of Technology, 2012.Google ScholarGoogle Scholar
  53. C. Warrender, S. Forrest, and B. Pearlmutter. Detecting Intrusions Using System Calls: Alternative Data Models. In Proc. of IEEE Symposium on Security and Privacy, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  54. B. Womack. Google Says 700,000 Applications Available for Android. Bloomberg Businessweek, Oct. 2012. http://www.businessweek.com/news/2012-10-29/google-says-700-000-applications-available-forandroid-devices.Google ScholarGoogle Scholar
  55. L. Xie, X. Zhang, J.-P. Seifert, and S. Zhu. pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In Proc. of WiSec, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. W. Yang, M. Prasad, and T. Xie. A Grey-box Approach for Automated GUI-Model Generation of Mobile Applications. In Proc. of FASE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In Proc. of IEEE Symposium on Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou. SmartDroid: an Automatic System for Revealing UI-based Trigger Conditions in Android Applications. In Proc. of CCS-SPSM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Y. Zhou and X. Jiang. Dissecting Android Malware: Characterization and Evolution. In Proc. of IEEE Symposium on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proc. of NDSS, 2012.Google ScholarGoogle Scholar

Index Terms

  1. PREC: practical root exploit containment for android devices

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CODASPY '14: Proceedings of the 4th ACM conference on Data and application security and privacy
          March 2014
          368 pages
          ISBN:9781450322782
          DOI:10.1145/2557547

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 March 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CODASPY '14 Paper Acceptance Rate19of119submissions,16%Overall Acceptance Rate149of789submissions,19%

          Upcoming Conference

          CODASPY '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader