Firedroid: Hardening Security in Almost-Stock Android

Firedroid: Hardening Security in Almost-Stock Android

FireDroid: Hardening Security in Almost-Stock Android Giovanni Russello Arturo Blas Jimenez Habib Naderi University of Auckland University of Auckland University of Auckland [email protected] [email protected] [email protected] Wannes van der Mark University of Auckland [email protected] ABSTRACT with the Android OS reached 75% of the total sold devices [2]. Malware poses a serious threat to Android smartphones. Current According to Google chairman Erich Schmidt, 1.3 million Android security mechanisms offer poor protection and are often too inflex- devices are activated each day [3]. As these simple statistics testify, ible to quickly mitigate new exploits. In this paper we present Fire- Android plays an important role in the mobile device market. Droid, a policy-based framework for enforcing security policies by For the Android OS, developers have created more than 700,000 interleaving process system calls. The main advantage of FireDroid applications downloadable via well-known distribution points like is that it is completely transparent to the applications as well as to the Google Play marketplace [4]. This openness is one of the key the Android OS. FireDroid enforces security policies without mod- factors contributing to the success of Android. At the same time, ifying either the Android OS or its applications. FireDroid is able however, it has raised new security concerns. Given the popular- to perform security checks on third-party and pre-installed appli- ity of Android, it is not a surprise that malware is growing rapidly. cations, as well as malicious native code. We have implemented In the last quarter of 2012, the number of unique instances of An- a novel mechanism that is able to attach, identify, monitor and en- droid malware has increased from 5,000 to 51,500 compared to the force polices for any process spawned by the Android’s mother pro- previous quarter [5]. cess Zygote. We have tested the effectiveness of FireDroid against 1.1 Motivation real malware. Moreover, we show how FireDroid can be used as a Smartphones empower users with ubiquitous computing: users swift solution for blocking OS and application vulnerabilities be- can perform the same tasks as with laptops and desktops but with fore patches are available. Finally, we provide an experimental more flexibility and mobility. In the private, public, and military evaluation of our approach showing that it has only a limited over- sectors, organisations’ personnel relies on smartphones for perform- head. Given these facts, FireDroid represents a practical solution ing sensitive tasks by installing business applications. Android pen- for strengthening security on Android smartphones. etration in the business sector is on the rise and poses serious secu- rity challenges to IT departments and CIOs [1]. Categories and Subject Descriptors Because users can install third-party applications on their smart- D.4.6 [Operating Systems]: Security and Protection—access con- phones, several security concerns may arise. For instance, mali- trols, information flow controls cious applications can upload to remote servers private information stored on the device such as contact lists, SMS and MMS messages. By exploiting pre-installed application vulnerabilities [6], malware General Terms can reset the device to its factory settings deleting all the data that Security it contains. This poses serious security concerns to sensitive cor- porate data, especially when the standard security mechanisms of- Keywords fered by the platform are not sufficient to protect the users from such attacks. Solutions such as anti-virus software are not able to Android Security Enhancement, System Call Interposition, Policy- cope with the rapid evolution of malware. As reported by Zhou and based Security Jiang in [51], the best anti-virus software is still failing to detected 21% of the malware currently in the wild. More worrisome is the 1. INTRODUCTION fact that all the anti-virus solutions are vulenerable against simple Smartphones are the most successful consumer devices to date malware transformation techniques [43]. reaching 821 million units sold to end users in the last quarter of The research community has addressed the security issues in 2012 [1]. In this very competitive market, smartphones equipped Android proposing several approaches. One approach is to iden- tify a malicious application by analysing the set of permissions it requests [32, 41]. Analysing permissions an application requires Permission to make digital or hard copies of all or part of this work for might not be very accurate at identifying real issues. For instance, personal or classroom use is granted without fee provided that copies are most malicious applications request the SMS permission. There- not made or distributed for profit or commercial advantage and that copies fore, just requesting such a permission might flag an application as bear this notice and the full citation on the first page. To copy otherwise, to malicious although it might be a legitimate application. Moreover, republish, to post on servers or to redistribute to lists, requires prior specific these approaches do not take into account the problem of colluding permission and/or a fee. applications performing privilege escalation attacks [25]. ACSAC ’13 Dec. 9-13, 2013, New Orleans, Louisiana USA Copyright 2013 ACM 978-1-4503-2015-3/13/12 ...$15.00 Another research trend has focused on extending the Android http://dx.doi.org/10.1145/2523649.2523678. security mechanism by enforcing fine-grained policies [40, 20, 53, 319 37], separating the runtime environment with light virtualisation code executed in a device. This makes FireDroid very effective [21, 45], and implementing full-virtualisation by hypervisor [39, also for controlling the execution of native code that is the main at- 18]. The main issue of these approaches is that they require ex- tacking vector used by malware. We have implemented FireDroid tensive modifications of the Android image installed on the device. and evaluated its effectiveness against a large set of real malware As such, the widespread adoption of these approaches is hampered samples. As another important contribution of this paper, we have by the fragmentation problem of Android [7]. Each manufacturer created a set of policies that can protect a device from attacks per- introduces its own customised OS image for coping with the dif- formed by current malware families. Moreover, FireDroid can be ferent hardware configurations. Therefore, these approaches would used to stop attacks exploiting OS and applications vulnerabilities require maintaining a customised version of Android for each hard- by simply enforcing dedicated policies. ware configuration. Moreover, they are effective only within the The rest of this paper is organised as follows. Section 2 pro- Android middleware. However, malware in the wild can easily by- vides an overview of Android and its security model. Section 3 pass these approaches given that it often relies on attacks executed presents the system model of our approach. Section 4 focuses on by native code at the Linux level [51]. the implementation details of FireDroid. The specification of the More recently, application-hardening approaches have been pro- security policy language is given in Section 5. To demonstrate the posed where third-party applications are modified to inject secu- effectiveness of FireDroid, we provide a security evaluation against rity hooks [44, 49, 19, 26, 38]. When the application package real malware and attacks in Section 6. The evaluation of FireDroid is downloaded, extra-security checks are added to the application performances is analysed in Section 7. In Section 8, we review ex- code generating a hardened version. The main advantage of these isting approaches aiming at enhancing Android security. Section 9 approaches is that (i) it does not require any changes of the Android highlights future research directions. Finally, Section 10 provides code and (ii) the hardening tools can be easily deployed as standard our concluding remarks. applications on the device. However, there are several shortcom- ings in these approaches. First of all, they rely on the user to install 2. ANDROID the hardened version of an application. Nothing can prevent the user to install the original version of an application bypassing the Android is an open-source mobile platform developed by Google security policies an organisation might want to enforce. Second, and the Open Handset Alliance (OHA) [17]. At the core of Android installing the hardened version of an application means that all the there is a Linux kernel optimised for mobile devices. In Android, data associated with the original application will be lost. The rea- applications are mostly coded in Java and compiled into Dalvik son is that Android application packages (APK) are digitally signed bytecode to be executed by the Dalvik Virtual Machine (DVM). by their developers. After the tools repackage the application, the Each Android application is executed in a dedicated DVM. At original signature is lost. Therefore for Android the hardened ver- the Linux level, each application is executed within a separate pro- sion of the application represents a new package with different ac- cess. To control access to protected resources, Android combines cess rights to the data storage. Third, because the hardening tools the traditional Linux permissions with a Mandatory Access Con- need to access the application bytecode, they can only be applied to trol (MAC) mechanism [31, 46]. During install time, applications third-party applications. Pre-installed applications and system ser- are assigned permission labels representing the resources they can vices cannot be hardened by these tools since their code is part of access during runtime. The developer of an application must de- the Android image on the device (unless they reflash the device im- clare the permissions her application requires in its package mani- age). Finally, these approaches can only control the bytecode of an fest file. Once the permissions are granted at install time, the user application.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us