Breaking and fixing the Android Launching Flow

被引:18
作者
Armando, Alessandro [2 ,4 ]
Merlo, Alessio [1 ,5 ]
Migliardi, Mauro [6 ]
Verderame, Luca [3 ]
机构
[1] Univ Genoa, DIBRIS, Artificial Intelligence Lab AILab, I-16145 Genoa, Italy
[2] Univ Genoa, DIBRIS, I-16145 Genoa, Italy
[3] Univ Genoa, DIBRIS, Artificial Intelligence Lab, I-16145 Genoa, Italy
[4] FBK Irst, Secur & Trust Unit, Trento, Italy
[5] Univ E Campus, Novedrate, Italy
[6] Univ Padua, DEI, I-35100 Padua, Italy
关键词
Android OS; Android security; Android security framework; Zygote vulnerability; Denial-of-Service;
D O I
10.1016/j.cose.2013.03.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security model of the Android OS is based on the effective combination of a number of well-known security mechanisms (e.g. statically defined permissions for applications, the isolation offered by the Dalvik Virtual Machine, and the well-known Linux discretionary access control model). Although each security mechanism has been extensively tested and proved to be effective in isolation, their combination may suffer from unexpected security flaws. We show that this is actually the case by presenting a severe vulnerability in Android related to the application launching flow. This vulnerability is based on a security flaw affecting a kernel-level socket (namely, the Zygote socket). We also present an exploit of the vulnerability that allows a malicious application to mount a severe Denial-of-Service attack that makes the Android devices become totally unresponsive. Besides explaining the vulnerability (which affects all versions of Android up to version 4.0.3) we propose two fixes. One of the two fixes has been adopted in the official release of Android, starting with version 4.1. We empirically assess the impact of the vulnerability as well as the efficacy of the countermeasures on the end user. We conclude by extending our security analysis to the whole set of sockets, showing that other sockets do not suffer from the same vulnerability as the Zygote one. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:104 / 115
页数:12
相关论文
共 23 条
[1]  
[Anonymous], 2011, USENIX SECURITY S
[2]  
[Anonymous], 2011, TR201104 TU DARMST
[3]  
[Anonymous], COMM 2009 ICC 09 IEE
[4]  
[Anonymous], ACSAC 09 ANN COMP SE
[5]  
[Anonymous], 2011, P 1 ACM WORKSH SEC P
[6]  
Armando A., 2013, Proceedings of the 28th Annual ACM Symposium on Applied Computing, P1852, DOI DOI 10.1145/2480362.2480707
[7]  
Armando A., 2012, P 7 INT S TRUSTW GLO
[8]  
Armando A, 2012, IFIP ADV INF COMM TE, V376, P13
[9]  
CHAUDHURI A., 2009, P ACM SIGPLAN 4 WORK, P1, DOI [DOI 10.1145/1554339.1554341, 10.1145/1667209.1667211]
[10]  
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018