Decomposable Trust for Android Applications

被引:2
作者
Fernandes, Earlence [1 ]
Aluri, Ajit [1 ]
Crowell, Alexander [1 ]
Prakash, Atul [1 ]
机构
[1] Univ Michigan, Comp Sci & Engn, Ann Arbor, MI 48109 USA
来源
2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS | 2015年
基金
美国国家科学基金会;
关键词
Android; Virtualization; Root Exploits; Trust Decomposition;
D O I
10.1109/DSN.2015.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current operating system designs require applications (apps) to implicitly place trust in a large amount of code. Taking Android as an example, apps must trust both the kernel as well as privileged userspace services that consist of hundreds of thousands of lines of code. Malware apps, on the other hand, aim to exploit any vulnerabilities in the above large trusted base to escalate their privileges. Once malware escalates its privileges, additional attacks become feasible, such as stealing credentials by scanning memory pages or intercepting user interactions of sensitive apps, e.g., those used for banking or health management. This paper introduces a novel mechanism, called Anception, that strategically deprivileges a significant portion of the kernel and system services, moving them to an untrusted container, thereby significantly reducing the attack surface for privilege escalation available to malware. Anception supports unmodified apps, running on a modified Android kernel. It achieves performance close to native Android on several popular macrobenchmarks and provides security against many types of known Android root exploits.
引用
收藏
页码:343 / 354
页数:12
相关论文
共 39 条
  • [1] AMIRI SANI A., 2014, P 12 INT C MOB SYST, P259
  • [2] Andrus J, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P173
  • [3] [Anonymous], CVE20111823
  • [4] [Anonymous], P 3 ANN HAIF EXP SYS
  • [5] [Anonymous], P NETW DISTR SYST SE
  • [6] [Anonymous], 4 ACM C DAT APPL SEC
  • [7] [Anonymous], USENIX SECURITY SECU
  • [8] [Anonymous], DUAL ANDR US XEN EFF
  • [9] ARTENSTEIN N., 2014, EUR BLACKHAT C AMST
  • [10] Barr Ken, 2010, Operating Systems Review, V44, P124, DOI 10.1145/1899928.1899945