Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems
Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems Seyed Mohammadjavad Seyed Talebi and Hamid Tavakoli, UC Irvine; Hang Zhang and Zheng Zhang, UC Riverside; Ardalan Amiri Sani, UC Irvine; Zhiyun Qian, UC Riverside https://www.usenix.org/conference/usenixsecurity18/presentation/talebi This paper is included in the Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA ISBN 978-1-939133-04-5 Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems Seyed Mohammadjavad Seyed Talebi?, Hamid Tavakoli?, Hang Zhang†, Zheng Zhang†, Ardalan Amiri Sani?, Zhiyun Qian† ?UC Irvine, †UC Riverside Abstract 1 Introduction Mobile systems, such as smartphones and tablets, incor- Today, mobile systems, such as smartphones and tablets, porate a diverse set of I/O devices, such as camera, audio incorporate a diverse set of I/O devices, e.g., camera, dis- devices, GPU, and sensors. This in turn results in a large play, sensors, accelerators such as GPU, and various net- number of diverse and customized device drivers running work devices. These I/O devices are the main driving in the operating system kernel of mobile systems. These force for product differentiation in a competitive market. device drivers contain various bugs and vulnerabilities, It is reported that there are more than a thousand Android making them a top target for kernel exploits [78]. Un- device manufacturers and more than 24,000 distinct An- fortunately, security analysts face important challenges droid devices seen just in 2015 [1].
[Show full text]