Boxify: Full-Fledged App Sandboxing for Stock Android

Boxify: Full-Fledged App Sandboxing for Stock Android

Boxify: Full-fledged App Sandboxing for Stock Android Michael Backes, Saarland University and Max Planck Institute for Software Systems (MPI-SWS); Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp von Styp-Rekowsky, Saarland University https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backes This paper is included in the Proceedings of the 24th USENIX Security Symposium August 12–14, 2015 • Washington, D.C. ISBN 978-1-939133-11-3 Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Boxify: Full-fledged App Sandboxing for Stock Android Michael Backes Sven Bugiel Christian Hammer CISPA, Saarland University & MPI-SWS CISPA, Saarland University CISPA, Saarland University [email protected] [email protected] [email protected] Oliver Schranz Philipp von Styp-Rekowsky CISPA, Saarland University CISPA, Saarland University [email protected] [email protected] Abstract toring (IRM) [28] as an alternative approach that We present the first concept for full-fledged app integrates security policy enforcement directly into sandboxing on stock Android. Our approach is based Android’s application layer, i.e., the apps’ code. on application virtualization and process-based priv- However, this dichotomy is unsatisfactory for end- ilege separation to securely encapsulate untrusted users: While OS security extensions provide stronger apps in an isolated environment. In contrast to all security guarantees and are preferable in the long run, related work on stock Android, we eliminate the ne- they require extensive modifications to the operating cessity to modify the code of monitored apps, and system and Android application framework. Since thereby overcome existing legal concerns and deploy- the proposed solutions are rarely adopted [54, 53] by ment problems that rewriting-based approaches have Google or the device vendors, users have to resort to been facing. We realize our concept as a regular An- customized aftermarket firmware [4, 6] if they wish droid app called Boxify that can be deployed without to deploy new security extensions on their devices. firmware modifications or root privileges. A system- However, installing a firmware forms a technological atic evaluation of Boxify demonstrates its capability barrier for most users. In addition, fragmentation of to enforce established security policies without incur- the Android ecosystem [46] and vendor customiza- ring a significant runtime performance overhead. tions impede the provisioning of custom-built ROMs for all possible device configurations in the wild. In contrast, solutions that rely on inlined reference 1 Introduction monitoring avoid this deployment problem by mov- ing the reference monitor to the application layer Security research of the past five years has shown that and allowing users to install security extensions in the privacy of smartphone users—and in particular of the form of apps. However, the currently available Android OS users, due to Android’s popularity and solutions provide only insufficient app sandboxing open-source mindset—is jeopardized by a number functionality [36] as the reference monitor and the of different threats. Those include increasingly so- untrusted application share the same process space. phisticated malware and spyware [63, 39, 62], overly Hence, they lack the strong isolation that would curious libraries [25, 32], but also developer negli- ensure tamper-protection and non-bypassability of gence and absence of fail-safe defaults in the Android the reference monitor. Moreover, inlining reference SDK [33, 29]. To remedy this situation, the develop- monitors requires modification and hence re-signing ment of new ways to protect the end-users’ privacy of applications, which violates Android’s signature- has been an active topic of Android security research based same-origin model and puts these solutions during the last years. into a legal gray area. Status quo of deploying Android security ex- tensions. From a deployment perspective, the pro- The sweet spot. The envisioned app sandboxing posed solutions followed two major directions: The solution provides immediate strong privacy protec- majority of the solutions [26, 44, 45, 16, 21, 64, 52, 56] tion against rogue applications. It would combine the extended the UID-centered security architecture of security guarantees of OS security extensions with Android. In contrast, a number of solutions [38, the deployability of IRM solutions, while simultane- 59, 23, 49, 22, 15] promote inlined reference moni- ously avoiding their respective drawbacks. Effectively, USENIX Association 24th USENIX Security Symposium 691 such a solution would provide an OS-isolated refer- Android app. To retain compatibility of isolated ence monitor that can be deployed entirely as an apps with the standard Android app runtime, we app on stock Android without modifications to the solved the key technical challenge of designing and firmware or code of the monitored applications. implementing an efficient app virtualization layer. Our contributions. In this paper we present a 2. We realize our concept as an app called Boxify, novel concept for Android app sandboxing based on which is the first solution that ports app virtual- app virtualization, which provides tamper-protected ization to the Android OS. Boxify is deployable reference monitoring without firmware alterations, as a regular app on stock Android (no firmware root privileges or modifications of apps. The key idea modification and no root privileges required) and of our approach is to encapsulate untrusted apps in a avoids the need to modify sandboxed apps. restricted execution environment within the context of another, trusted sandbox application. To establish 3. We systematically evaluate the efficacy and effi- a restricted execution environment, we leverage An- ciency of Boxify from different angles including droid’s “isolated process” feature, which allows apps its security guarantees, different use-cases, perfor- to totally de-privilege selected components—a fea- mance penalty, and Android API version depen- ture that has so far received little attention beyond dence across multiple Android OS versions. the web browser. By loading untrusted apps into a de-privileged, isolated process, we shift the problem The remainder of this paper is structured as follows. of sandboxing the untrusted apps from revoking their In §2, we provide necessary technical background privileges to granting their I/O operations whenever information on Android. We define our objectives the policy explicitly allows them. The I/O opera- and discuss related work in §3. In §4, we present our tions in question are syscalls (to access the file system, Boxify design and implementation, which we evaluate network sockets, bluetooth, and other low-level re- in §5. We conclude the paper in §6. sources) and the Binder IPC kernel module (to access the application framework). We introduce a novel 2 Background on Android OS app virtualization environment that proxies all syscall and Binder channels of isolated apps. By intercepting Android OS is an open-source software stack (see Fig- any interaction between the app and the system (i.e., ure 1) for mobile devices consisting of a Linux ker- kernel and app framework), our solution is able to en- nel, the Android application framework, and system force established and new privacy-protecting policies. apps. The application framework together with the Additionally, it is carefully crafted to be transparent pre-installed system apps implement the Android to the encapsulated app in order to keep the app application API. The software stack can be extended agnostic about the sandbox and retain compatibility with third-party apps, e.g., from Google Play. to the regular Android execution environment. By executing the untrusted code as a de-privileged pro- Android Security Model. On Android, each ap- cess with a UID that differs from the sandbox app’s plication runs in a separate, simple sandboxed envi- UID, the kernel securely and automatically isolates ronment that isolates data and code execution from at process-level the reference monitor implemented other apps. In contrast to traditional desktop operat- by the sandbox app from the untrusted processes. ing systems where applications run with the privileges Technically, we build on techniques that were found of the invoking user, Android assigns a unique Linux successful in related work (e.g., libc hooking [59]) user ID (UID) to every application at installation while introducing new techniques such as Binder IPC time. Based on this UID, the components of the redirection through ServiceManager hooking. We re- Android software stack enforce access control rules alize our concept as a regular app called Boxify that that govern the app sandboxing. To understand the can be deployed on stock Android. To the best of our placement of the enforcement points, one has to con- knowledge, Boxify is the first solution to introduce sider how an app can interact with other apps (and application virtualization to stock Android. processes) in the system: In summary, we make the following contributions: Like any other Linux process, an app process uses syscalls to the Linux kernel to access low-level re- 1. We present a novel concept for application virtual- sources, such as files. The kernel enforces discre- ization on Android that leverages the security pro- tionary access control (DAC) on such syscalls based vided by isolated processes

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us