Measuring Integrity on Mobile Phone Systems

Measuring Integrity on Mobile Phone Systems

Measuring Integrity on Mobile Phone Systems Divya Muthukumaran Anuj Sawani Joshua Schiffman Systems and Internet Systems and Internet Systems and Internet Infrastructure Security Infrastructure Security Infrastructure Security Laboratory Laboratory Laboratory Pennsylvania State University Pennsylvania State University Pennsylvania State University University Park, PA 16802 University Park, PA 16802 University Park, PA 16802 [email protected] [email protected] [email protected] Brian M. Jung Trent Jaeger Secure Systems Group Systems and Internet Samsung Electronics Co., Ltd. Infrastructure Security Suwon-City, Gyeonggi-Do, Laboratory Korea, 443-742 Pennsylvania State University [email protected] University Park, PA 16802 [email protected] ABSTRACT General Terms Mobile phone security is a relatively new field that is gather- Security ing momentum in the wake of rapid advancements in phone system technology. Mobile phones are now becoming so- Keywords phisticated smart phones that provide services beyond ba- sic telephony, such as supporting third-party applications. Integrity Measurement, Mobile Phones, SELinux Such third-party applications may be security-critical, such as mobile banking, or may be untrusted applications, such 1. INTRODUCTION as downloaded games. Our goal is to protect the integrity of Cellular communication is changing. Mobile phones have such critical applications from potentially untrusted func- become smaller, lighter, and more powerful, and support tionality, but we find that existing mandatory access con- a wide variety of applications, including text messaging, e- trol approaches are too complex and do not provide formal mail, web surfing and even multimedia transmissions. Smart integrity guarantees. In this work, we leverage the sim- phones that are a hybrid of cell phones and PDAs that can plicity inherent to phone system environments to develop handle voice and data communications, in essence function- a compact SELinux policy that can be used to justify the ing as a ”tiny computer.” This transformation motivated integrity of a phone system using the Policy Reduced In- the transition from small, custom operating environments tegrity Measurement Architecture (PRIMA) approach. We to more powerful, general purpose environments that are show that the resultant policy enables systems to be proven based on personal computer environments, such as Windows secure to remote parties, enables the desired functionality Mobile [33] and Linux phone OS projects [19, 23]. for installing and running trusted programs, and the resul- Third-party developers now provide many multimedia ap- tant SELinux policy is over 90% smaller in size. We envision plications that users can easily download onto these powerful that this approach can provide an outline for how to build new phones. The flexibility of supporting third-party appli- high integrity phone systems. cations presents security concerns for other applications that handle critical user data. For example, mobile banking ap- plications have been created for such phones [2], providing Categories and Subject Descriptors attackers with a valuable target. Worm attacks [16, 4] have been launched against the market-leading Symbian mobile D.4.6 [Operating Systems]: Security and Protection — platform [27], a variety of vulnerabilities on this platform Access Control have been identified [7, 29], and a large number of users (over 5 million in March 2006 [11]) download freeware games (i.e., potential malware) to their mobile devices. As a result, it seems likely that mobile phones, including Linux and Win- Permission to make digital or hard copies of all or part of this work for dows phones, will become targets for a variety of malware. personal or classroom use is granted without fee provided that copies are Security architectures for phone systems are emerging, but not made or distributed for profit or commercial advantage and that copies they make no concrete effort to justify critical application bear this notice and the full citation on the first page. To copy otherwise, to integrity. The Symbian security architecture distinguishes republish, to post on servers or to redistribute to lists, requires prior specific between its installer, critical applications, and untrusted ap- permission and/or a fee. SACMAT’08, June 11–13, 2008, Estes Park, Colorado, USA. plications. The Symbian approach has been effective at pro- Copyright 2008 ACM 978-1-60558-129-3/08/06 ...$5.00. tecting its kernel, but some critical resources, such as phone contacts and Bluetooth pairing information, can be compro- Historically, mobile phone systems have been standalone mised by untrusted applications [24]. A mandatory access devices with custom operating systems. These consumer control framework has been developed for Linux, the Linux electronics devices were installed with software in the factory Security Modules (LSM) framework [34], but LSM-based ap- and no user interfaces were provided for typical users to proaches (e.g., SELinux [22] and AppArmor [21]) do not en- update the software. sure integrity. The SELinux LSM focuses on enforcing least As more functional, “Smart” phones began to appear, the privilege, and its policies on personal computer systems are operating system functionality requirements increased. A too complex to understand integrity completely. The Ap- consortium of phone manufacturers created the Symbian op- pArmor LSM focuses on confining network-facing daemons, erating system [27], a general-purpose, embedded operating which may prevent integrity problems from untrusted net- system targeted specifically at the phone market. work requests, but not from untrusted programs running on The Symbian operating system is most noteworthy for the system. not having a known kernel compromise in its history, but Our goal is to protect the integrity of critical phone ap- it also implements an interesting security model. The Sym- plications from the untrusted code and data of downloaded bian system defines three distinct subjects: the installer, third-party applications. The mobile banking application Symbian-signed subjects, and untrusted subjects [28]. Each above is one critical phone application. The aim is to install process is assigned to one of these three subjects depending and execute such trusted applications under the control of upon which of the three categories the originating program a phone policy for which precise integrity guarantees can be file belongs. The three subjects essentially form a Biba hier- made. We believe that mandatory access control policies archy with installer being the highest integrity level. How- are the foundation for providing such guarantees, but the ever, the choice of how files are assigned to integrity-levels policies developed thusfar are inadequate because they are is somewhat ambiguous. For example, some system files, too complex or are focused on the wrong goal. such as the Bluetooth pairing database can be modified by In this paper, we define a MAC policy for a Linux phone untrusted code, permitting untrusted devices to upload files system and enable a remote party to verify the integrity of unbeknownst to the user [24]. Although we like the small our phone systems using integrity measurements. We use number of subjects, the integrity protections provided are the SELinux LSM as the starting point, but we reduce the insufficient. policy to focus on integrity goals. In designing our phone Recently, Windows and Linux-based phone systems have policy, we use the CW-Lite integrity model [25], a weakened, begun to emerge, eating into the Symbian market share, al- but more practical, version of the Clark-Wilson integrity though it is still the operating system in over 50% of the model [6] to define our precise integrity goals. Focusing on phone devices sold. Windows and Linux systems bring both integrity, we find that the SELinux LSM policy can be re- applications and security issues to the phone market. Secu- duced dramatically, by over 90% in size thusfar, although rity in the initial versions of these phones was nearly non- we believe that much greater reductions are possible. We existent. For early Linux phones, if an attacker could get also show that the resultant policy is suitable for justifying a user to download her malware to the phone, it would be the integrity of such critical applications to remote parties trivially compromised. But, most modern phones provide using the PRIMA integrity measurement architecture [13]. users with easy mechanisms to upload new programs. As PRIMA measures the trusted code and the information flows a result, many phone system vendors are seeing that they generated by the MAC policy to ensure that the integrity need to add security enforcement. Motorola Linux phones, of the trusted code is protected from low integrity inputs such as the A1200, include a mandatory access control mod- according to the CW-Lite integrity policy. We envision that ule called MotoAC [19] and Samsung Research has explored this approach can provide an outline for how to build high SELinux on phones [35]. integrity phone systems in the future. The challenge for phone security is becoming similar to the The structure of the paper is as follows. In Section 2, we personal computer. Do the phone system vendors provide review the background of phone systems, SELinux, formal so much flexibility that the phones become impossible to integrity models, and integrity measurement that form the manage? Or can a model of security that permits the secure basis for this work. In Section 3, we define the phone sys- use of untrusted code be created? We explore the answers tem architecture, outline our policy design goals, and show to these questions in this paper. that these goals satisfy integrity requirements while permit- ting the necessary function. In Section 4, we describe the 2.2 SELinux implementation of our system on an evaluation board us- SELinux is a reference monitor for the Linux operating ing to prototype phone software. We show how our policies system [22]. SELinux enforces a mandatory access control are implemented, and how integrity measurements are gen- policy based on an extended Type Enforcement model [3].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us