Insights Into Rooted and Non-Rooted Android Mobile Devices with Behavior Analytics

Insights Into Rooted and Non-Rooted Android Mobile Devices with Behavior Analytics

Insights into Rooted and Non-Rooted Android Mobile Devices with Behavior Analytics Yun Shen Nathan Evans Azzedine Benameur Symantec Research Labs Symantec Research Labs Symantec Research Labs Dublin Herndon Herndon Ireland USA USA [email protected] Nathan_Evans@syman- Azzedine_Benameur@syman- tec.com tec.com ABSTRACT source license, and is derived in large part from Linux. This In the Android community, a commonly held belief is that has allowed the Android ecosystem to grow and prosper. rooted devices are more at-risk than their standard coun- However, its open source nature has also led to extensive terparts. Many applications include “protections” that dis- customization of the operating system (fragmentation), un- able certain functionality in the presence of a “rooted” de- locked phones and a desire from some users for the ability vice. In this paper, we carry out a detailed quantitative to update and maintain their software as well as their op- analysis on 6.14 million Android devices comparing rooted erating system as they see fit. This has led to unlocking and non-rooted devices across a broad range of character- bootloaders, flashing custom ROMs and rooting of devices istics. Specifically our study focuses on measuring and an- becoming more commonplace. alyzing various behavioral differences between rooted and It is often mentioned [19, 15] that “rooting” an Android mo- non-rooted devices, and how such differences impact the se- bile device opens it up to more dangerous malware and se- curity of rooted devices, e.g. making them more suscepti- curity risks. Intuitively, this makes sense: “rooting” a device ble to malware or at higher risk. We further leverage our means allowing access to the lowest layers of the operat- insights and implement a machine learning system to deter- ing system, possibly circumventing built-in security mea- mine whether a device is rooted based on a comprehensive sures such as application sandboxing and limiting software set of features with an accuracy of approximately 90%. to known sources. However, some users choose to take on this apparent risk for various reasons, including the free- CCS Concepts dom to install a wider range of applications, remove so- called “bloatware” that is factory or carrier installed and •Security and privacy → Mobile platform security; update/customize their operating system. •Computing methodologies → Machine learning; Due to the real or perceived impact on security, many mo- bile applications also check for the presence of root access Keywords and may alter their functionality if detected. Some of the mobile security, rooted mobile device, machine learning reasons for this are “Bring your own device” (BYOD) pol- icy enforcement and security evaluation. Examples of soft- 1. INTRODUCTION ware including these checks are banking applications, media streaming applications, mobile device management software It is undeniable that Android has become the most impor- and security software. In [10], the authors demonstrate that tant operating system for mobile devices including smart- nearly all of the most popular security and MDM applica- phones and tablets. As of the end of 2014, Android was tion for Android contain some functionality for detecting installed on more than 78% [3] of smartphones sold glob- whether a device is rooted or not. ally and over 70% of tablets sold. The success of Android is interesting partly because of its open nature. The ma- Knowing a device is rooted is important for certain appli- jority of the Android source code is released under an open cations, but can easily be tricked, is one of the motivations for this study, raising the question of whether or not we can detect that a device is rooted solely based on application Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies behavior and/or mobile device characteristics. To that end, are not made or distributed for profit or commercial advantage and that we believe this paper to be the first to analyze a large popu- copies bear this notice and the full citation on the first page. Copy- lation of real-world Android mobile devices with the specific rights for components of this work owned by others than ACM must focus on detailing the differences and similarities between be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior rooted and non-rooted devices. In addition to analyzing a specific permission and/or a fee. Request permissions from Permis- large amount of data gathered on mobile devices, we also [email protected]. raise the bigger question of whether rooted devices are, in SAC 2016,April 04-08, 2016, Pisa, Italy general, more “dangerous” than non-rooted devices. c 2016 ACM. ISBN 978-1-4503-3739-7/16/04. $15.00 Using data from 6.14 million unique Android devices, we DOI: http://dx.doi.org/10.1145/2851613.2851713 580 demonstrate that contrary to our initial hypothesis, non- 3. ROOTED VS. NONROOTED rooted devices tend to have more applications installed than In this section we present our analysis and highlight the rooted, even when excluding system and pre-installed appli- differences and similarities between rooted and non-rooted cations; and non-rooted devices a greater average number devices observed in our data set. We have narrowed down of application updates than rooted. We also find that non- the scope of the data to attempt to answer questions that rooted devices on average send and receive more data than we think are interesting, or results that may be surprising rooted devices, possibly due to the higher number of applica- as they uphold or refute preconceptions about the behavior tions installed. Surprisingly, we find that rooted devices do of rooted device users. Prior to beginning our exploration not in general have more malware installed than non-rooted ofthemobiledataset,wecreatedalistofsomecharacteris- devices. tics we expected to observe, as well as some commonly held Building on top of these insights and mobile behavior prop- beliefs surrounding the reasons that a user would root their erties, we create an ensemble machine learning [9] classifica- phone (see Section 5). Below, we briefly list two of the ques- tion model that allows us to take our dataset (with a total tions we posed: 1) do users of rooted phones install more of 73 features) and train a model for determining whether a software because they are more technical, have the ability to device falls into the rooted category or the non-rooted cate- add app stores, etc.? and 2) do rooted devices have differ- gory. Our classifier is able to achieve an AUC score of 0.96 ent networking behavior than non-rooted (more data sent/re- with an accuracy of approximately 90%. ceived, more connections, etc.)? We provide data and ex- plore the answers to these questions in Section 3.1. Then, in The rest of the paper is divided as follows: Section 2 includes Section 3.2 we touch on perhaps a more important question: a summary of the data and the collection method. Section 3 3) do rooted devices exhibit more “risky” behavior than their then provides a deep dive analysis of the data, from the per- non-rooted counterparts? spective of whether or not rooted devices exhibit different characteristics. Next, Section 4 describes a machine learning 3.1 Device Behavior model we developed in an attempt to automatically classify a device as rooted or not based on features extracted from 3.1.1 Application Installation our data set. Section 5 covers related work in the Android For this experiment, we set out to determine if the number of malware and device analysis space. Finally, Section 6 con- apps installed on mobile phones is correlated with whether cludes the paper and discusses possible future work based or not the phone is rooted. Our hypothesis was that phones on the results of our analysis. that were rooted would have more apps installed on average than phones that were not rooted. There are a few themes 2. DATA SET that led us to this hypothesis: more technical users root their phones and also install more apps, some apps are only The data used for our analysis is a subset of the CompanyX available to rooted devices (or in third party app stores), Mobile Intelligence mobile data set. The Data is collected and finally developers may root their devices to test apps. as an opt-in feature of CompanyX’s mobile security solution “CompanyX Mobile Security”, and is comprised of user data To test this hypothesis, we first began by analyzing the av- from more than 6.14 million unique Android devices. Per erage number of apps installed on devices in our sample set. device data is collected, after explicit user consent, on the The results of this analysis are given in Figure 1a. From this device in an event driven manner, and uploaded to the back figure, we observe that our initial hypothesis about rooted end approximately twice a month (variations depend on net- users installing more apps on average is not supported (and work connection state, device usage, etc.). Data is stored in further confirmed by Welch’s t-Test with p-value=0.00001). a SQL-like database and is retained for 3 years. In fact, non-rooted devices have on average almost twice as many apps installed. In order to keep our analysis tractable we limited our exper- imentstoasampleofthedataset.Thesampleismadeup To further investigate this finding, we limited the plot to of the latest data available to us at the time of writing; 4 include only “system” apps1 in Figure 1b, which reveals the months of data running from the beginning of January, 2015 likely source of the discrepancy in the increased number of to the end of April, 2015.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us