




已阅读5页,还剩14页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
JSupercomput(2014)67:738756DOI10.1007/s11227-013-0991-yUnifiedsecurityenhancementframeworkfortheAndroidoperatingsystemChanheeLeeJonghwaKimSeong-jeChoJongmooChoiYeongungParkPublishedonline:6August2013SpringerScience+BusinessMediaNewYork2013AbstractInthesedaystherearemanymaliciousapplicationsthatcollectsensitiveinformationownedbythird-partyapplicationsbyescalatingtheirprivilegestothehigherlevelontheAndroidoperatingsystem.Anattackofobtainingtheroot-levelprivilegeintheAndroidoperatingsystemcanbeaseriousthreattousersbecauseitcanbreakdownthewholesystemsecurity.ThispaperproposesanewAndroidsecurityframeworkthatcanmeetthefollowingthreegoals:(1)preventingprivilegeescalationattacks,(2)maintainingsystemintegrity,and(3)protectingusersper-sonalinformation.Toachievethesegoals,ourproposedframeworkintroducesthreemechanisms:RootPrivilegeProtection(RPP),ResourceMisuseProtection(RMP),andPrivateDataProtection(PDP).RPPkeepstrackofalistoftrustedprogramswithroot-levelprivilegesandcandetectandrespondtomalwarethatillegallytriestoacquireroot-levelprivilegesbyexploitingsystem-levelvulnerabilities.RMPkeepstrackofalistofcriticalsystemresourcesandcanprotectsystemresourcesfromil-legalmanipulationbymaliciousapplications.PDPkeepspersonalinformationsafebyenforcingstrictaccesscontrolssothatevenprivilegedapplicationscannotaccessusersprivatedataiftheapplicationsviolatetheleastprivilegerule.TheframeworkC.LeeJ.KimS.-j.Cho(B)J.ChoiDepartmentofComputerScience,DankookUniversity,Yongin-si,Gyeonggi-do,Koreae-mail:sjchodankook.ac.krC.Leee-mail:lchan12dankook.ac.krJ.Kime-mail:zcbm4321dankook.ac.krJ.Choie-mail:choijmdankook.ac.krY.ParkTheAttachedofETRI,Jeonmin-dong,Yuseong-gu,Daejeon,Koreae-mail:santaparkensec.re.krUnifiedsecurityenhancementframeworkfortheAndroidoperating739isverifiedusingexperimentsontheAndroidoperatingsystem,whichshowsthatourframeworkachievedthegoalswithprocessingoverheadsof25.33%onaverage.KeywordsSmartphonesecurityAndroidPrivilegeescalationattacksSystemintegrityPrivacyprotectionUnifiedsecurityframework1IntroductionAssmartphoneusageincreases,moredevelopersbecomeinvolvedinimplementingapplicationsforsmartphones(alsocalledasApps).ThenumberofAppsintheAp-plesAppstorehasbeenreportedtobemorethan3billion1,andAndroidAppsareexpectedtobemorethanthatnumbersinceithastheopen-platformstrategy.How-ever,thisexplosiveincreaseinthenumberofapplicationsmakesAndroidsecurityevenmoreimportant.Inthispaper,wediscusssecuritythreatsrelatedtosmartphonesandproposeanovelsecurityframeworkespeciallyfortheAndroidoperatingsystem(OS).Sincemanyapplicationsaredevelopedbyvariousthird-partydevelopersandcom-panies,theAndroidOStreatsallapplicationsaspotentiallymalicious.TheAndroidOSprovidestwosecurityenforcingfeatures:sandboxingandtheprivilege-basedac-cesscontrol.Eachapplicationrunsinitsownvirtualmachinesothatitsexecutionisisolated,andtheprivilege-basedaccesscontrolorchestratesdatatobereferencedonlybyapplicationsthathavetherelevantpermissions.However,theAndroidOSssecuritymodelhasbeenshowntobestillvulnerabletoapplication-levelprivilegeescalationattacks26includingconfuseddeputyat-tacksandcollusionattacks.TheAndroidOSdoesnotdealwithtransitiveprivilegeusages,whichallowsapplicationstobypassrestrictionsimposedbythepermissionmodel.Therefore,thepermission-basedsecuritymodelcannotfullyprotectuserspersonalinformationunderprivilegeescalationattacksand,asaresult,avarietyofprivilegeescalationattackshavebeenreportedontheAndroidOS.ManystudieshaveshownthatmaliciousapplicationscanbeinstalledontheAndroidOSandcanstealusersprivatedatathroughtraditionalattacksorprivilegeescalationattacks(see,forexample,theBaseBridge6,DroidKungFu4,6,7,DroidDream4,6,8,andGingerMaster9).IntheAndroidOS,ifanapplication(orprocess)obtainstherootprivilege,theapplicationhasfullaccessestothefilesystem(werefertothisapplicationasapriv-ilegedapplication).Sinceaprivilegedapplicationhasafullaccesspermissiontothesystem,privilegeescalationattacksgrantmalwareorunauthorizedapplicationswiththefullaccesspermissiontothesystem.Ifanattackercanillegallyelevatehim-self/herselftorootprivileges,he/shecangainaccessestoanysensitivedataontheuserssmartphone.Tocountermeasureagainstprivilegeescalationattacksandtoprotectpersonalin-formation,varioussecurityextensionsandenhancementstotheAndroidOShavebeenproposed,suchasXManDroid2,3,RGBDroid5,Kirin10,Saint11,Apex12,TaintDroid1,QUIRE13,andsoon.However,aswewillelaborateinfurtherdetailsonrelatedworkinSect.2,noneoftheexistingsolutionssufficiently740C.Leeetal.andefficientlyprotectusersprivateinformationfromprivilegeescalationattacks.Someapproachescannotdetecttransitivepermissionusageattacksorfailtoprotectthesystemagainstmalwareandsophisticatedrun-timeattacks.Othersrelyontheuserstotakesecuritydecisionsortosufferinefficiency.Inthispaper,weproposeaunifiedandeffectivekernel-levelsecurityframeworkinorderto(1)preventprivilegeescalationattacks,(2)prohibitmaliciousapplicationsfrommanipulatingcriticalsystemresources,and(3)protectusersprivatedatafromillegallyprivilegedprogramsintheAndroidenvironment.OurproposedframeworkcansecuretheAndroidOSbyintroducingthreemechanisms:RootPrivilegeProtec-tion(RPP),ResourceMisuseProtection(RMP),andPrivateDataProtection(PDP).TheRPPmechanismmakesuseofadatastructure,calledpWhiteList,whichkeepstrackofalistoftrustedprogramswithrootprivileges.AnyprogramnotrecordedinpWhiteListcannotrunwithrootlevelprivileges.Aftergainingrootlevelprivilegesviaprivilegeescalationattacks,ifanymalwareorapplicationnotonthelisttriestoopen,read,orwritefileswithoutrelevantpermissions,ourframeworkwilldetectandpreventtheaccessesusingtheRPPmechanism.TheRMPmechanismkeepstrackofimportantsystemresources,usingtheCriticalListdatastructure,thatarevitalintheAndroidOS.Thismechanismpreventssuchcriticalresourcesfrombeingmodifiedbyevenaprocesswithroot-levelprivileges.Tosecurepersonalinformationincludingprivatedatainsmartphones,ourPDPmechanismdisallowstrustedprogramstoaccesssensitivedatathroughenforcingtheleastprivilegeprincipleinthepermission-basedaccesscontrol.Anattackerormal-warecanevadetheRPPmechanismbydirectlyexploitingvulnerabilitiesintrustedprogramswithroot-levelprivilegesorescalatingprivileges.ThePDPmechanismcandefeatthisevasionbyprohibitinguncontrolledaccesstoprivatedatathroughthesystemcallinspection.Ourframeworkusessystem-centricapproachesbyallowingthekerneltoenforcesecuritydecisionsbasedonfilesanduserIDofapplications.Soitdoesnotrequireapplicationdeveloperstoaddsecurityfeaturestotheirapplications.Wedemonstratethattheproposedframeworkefficientlydetectsprivilegeescalationattacks,keepstheAndroidOSconsistent,andmitigatestheeffectsoftheattacksbyprovidingextraprivacyprotectionmeasuresforprivatedata.Theremainderofthispaperisorganizedasfollows.AfterdiscussingrelatedworkinSect.2,weproposeasecurityframeworktopreventprivilegeescalationattacks,maintainsystemintegrity,andprotectusersprivateinformationinSect.3.InSect.4,wepresenttheeffectivenessofourproposedframeworkthroughsomeexperimentsusingrealisticprivilege-relatedattackscenarios.Section5evaluatesperformanceoftheproposedframework,andconclusionsandfutureworkarediscussedinSect.6.2BackgroundsandrelatedworkInthissection,wefirstexplorehowthesecuritysensitiveinformationhasbeenleakedthroughtheprivilegeescalationattacksintheAndroidOS.Then,wesurveyseveralsecurityenforcementtechniquestoprotectsuchleakagesanddiscusshowthoseap-proachesdifferfromours.UnifiedsecurityenhancementframeworkfortheAndroidoperating7412.1InformationleakagethroughprivilegeescalationattacksTheAndroidOSsupportsseveralsecurityfeaturessuchastheprivilege-basedaccesscontrolandsandboxing14.Theprivilege-basedaccesscontrolorchestratesdatatobereferencedonlybyapplicationsthathavetherelevantpermissions.However,col-laborationsamongmultipleapplicationswithdifferentprivileges,whichoccurfre-quentlyinAndroidenvironments,maycauseprivilegeescalationattacks2,3,5,6.Typicalexamplesoftheprivilegeescalationattacksaretheconfuseddeputyattackandthecollusionattack.Theconfuseddeputyattackincludescasessuchthatama-liciousapplicationexploitsthevulnerableinterfacesofanotherprivileged(butcon-fused)application.Thecollusionattackisthatmaliciousapplicationsthatcolludetocombinetheirpermissionsallowthemtoperformactionsbeyondtheirindividualprivileges.Therealproblemoftheprivilegeescalationattacksisthattheattackscanbeex-ploitedtostealprivatedata,asreportedinseveralpapersorarticles,suchasBase-Bridge6,DroidKungFu4,6,7,DroidDream4,6,8,andGingerMaster6,9.BaseBridge6performstheprivilegeescalationattacktoelevateitsprivilegessothatitcandownloadandinstalladditionalapplicationsontoauserssmartphone.Whenaninfectedapplicationisinstalled,malwareattemptstoexploittheudevNetlinkMes-sageValidationPrivilegeEscalationVulnerability9inordertoobtainroot-levelprivileges.TheBaseBridgemalwareusestheHTTPprotocoltocommunicatewithacentralserverandtransmitpersonalinformation.BaseBridgecanalsosendpremium-rateSMSmessagestopredeterminednumbersthatisthereasonofitsnicknameasAdSMS.DroidDream,whichhasappearedintheGooglesAndroidmarket6,8,stealspersonalinformationusingthesimilarmechanismtothatofthetraditionalTrojansobservedintheWindowsoperatingsystems.SomeresearchershavereferredtheDroidDreamvariantsasmobilebotnets.Moreadvancedmalwarehasappearedinthird-partymarkets.OneexampleisDroidKungFu6,7,whichtakesadvantageofprivilegeescalationexploits,called“RageagainsttheCage.”Atleastfourwell-knownprivilegeescalationvulnerabilitieshavebeenused.TheDroidKungFumalwarecollectspersonalinformationofsmart-phonessuchasIMEI(InternationalMobileEquipmentIdentity),DeviceIDandSDKversion,andsendsthemtoaremoteserver,thentriestoobtainarootshell.TherootshellobtainedbythemalwarereceivescommandsfromaC&C(CommandandCon-trol)server,andinstallsahiddenbackdoorapplication.Asaresult,thesmartphoneinfectedwithDroidKungFubecomesabotorazombie.GingerMaster6,10issimilartoDroidKungFu.ItinfectsnormalAndroidappli-cations.Onceanapplicationisinfected,theinfectedapplicationregistersaservice,collectspersonaldataonthedevice,sendstheinformationtoaremoteserverandtriestoobtainarootshell.TherootshellinstallsanothermaliciousapplicationthatreceivescommandsfromaC&Cserver.2.2SecurityenforcementtechniquesRecently,varioustechniqueshavebeenproposedtoenforcetightersecurityontheAndroidOStopreventprivilegeescalationattacks.Examplesofthesetechniques742C.Leeetal.includeKirin11,Saint12,Apex1,TaintDroid13,QUIRE15,XManDroid2,3,andRGBDroid5.TheKirinsystemisanextensiontotheAndroidsapplicationinstallerthatsup-portssecurity-basedinstallationdecisions11.TheAndroidOSisequippedwithalotofextensiveAPIs(ApplicationProgrammingInterfaces)includingAPIstoaccesshardware,configurations,anduserdata.Theusagesofthesecurity-relatedAndroidAPIscanbemonitoredandcontrolledbyaninstallmanagementsystem.TheKirinsystemdeniestheinstallationofapplicationsthatencompassasetofAPIswhicheventuallyhaveapotentialtoviolateagivensystempolicy.ItcheckspermissionstoinfertheusagesofAPIsandmaintainspredefinedsecurityrulestomatchdanger-ouscombinationsofpermissionsusedbyapplications.AstheKirinsystemanalyzeseachindividualapplicationseparatelywithstaticrules,itcannotprotectusersfromapplicationsthatcollaboratetoleak.Saint12extendsthefunctionalitiesoftheKirinsystemtoallowrun-timein-spectionofthefullsystempermissionstatesbeforelaunchingagivenapplication.Itadoptsafine-grainedaccesscontrolmodelandgovernsinstall-timepermissionas-signmentsandrun-timeuses.Inordertopreventprivilegeescalationattacks,Saintrequiresapplicationdeveloperstoassignappropriatesecuritypoliciesontheirappli-cationsinterfacesandtoaddsecurityfeaturestotheirapplications.Sinceapplicationdevelopersmightfailtoconsiderallsecuritythreats,developer-definedpermissionsystemsaremorelikelytobeerror-pronethansystem-centricapproaches.Apex1presentsanothersolutionforthesameproblemwheretheuserisrespon-siblefordefiningrun-timeconstraintsonthetopoftheexistingAndroidpermissionfacility.Apexdoesnotaddressprivilegeescalationattackswherepermissionsaresplitovermultipleapplications.LikeSaint,itunfortunatelyreliesontheusertotakesecuritydecisions.TheseSaintandApexapproachesallowuserstospecifystaticpoliciestoshieldthemselvesfrommaliciousapplications,butdonotallowapplica-tionstomakedynamicpolicydecision.TaintDroid13presentsadynamictaintanalysistechniquetopreventunautho-rizedleakageofsensitivedataandrun-timeattacks.Thisframeworkattemptstotagobjectswithmetadatainordertotrackinformationflowsandtoenforcepoliciesbasedonthepaththatdatahastakenthroughthesystem.TaintDroidenforcesitstaintpropagationsemanticsbyinstrumentinganapplicationsDEXbytecodetotageveryvariable,pointer,andInter-ProcessCommunication(IPC)messagethatflowthroughthesystemwithataintvalue.Itrestrictstransmittingtainteddatatoaremoteserverbymonitoringtheoutboundnetworkconnections.TaintDroidhasashortcomingthatthesystemmainlyaddressesdataflows,whereasprivilegeescalationattacksalsoin-volvewithcontrolflows.TrackingthecontrolflowswithTaintDroidwilllikelyresultinmuchhigherperformancepenalties.Besides,itcannotdetectattacksthatexploitcovertchannelstoleaksensitiveinformation2,3.QUIRE15isaframeworkdesignedtoovercometheprivilegeescalationat-tacksthatexploitstheconfuseddeputyattacks.Itisfocusedonprovidingprove-nanceinformationwithalightweightmannerandpreventingaccessesofsensitivedata,ratherthanrestrictingdirectionsofdataflows.WhenthereisanIPCrequestbe-tweenAndroidapplications,itforcestheapplicationstooperatewithareducedpriv-ilegeofitscallerbytrackingthecallchainofIPCs.QUIREsapproachrequiresonlyUnifiedsecurityenhancementframeworkfortheAndroidoperating743theIPCsubsystemtobemodifiedwithnorelianceoninstrumentedcode,thereforeQUIREcanworkwithapplicationsthatusenativelibrariesandcanavoidoverheadimpartedbyinstrumentingcodetopropagatetaintvalues.However,thisapproachisapplication-centricnotsystem-centric,andQUIREdoesnotaddressprivilegeesca-lationattacksthatarebasedonmaliciouslycolludingapplications.SincetheInter-ComponentCommunication(ICC)callchainisforwardedandpropagatedbytheap-plicationsthemselves,colludingapplicationsmayforcetheICCcallchaintoobscuretheoriginatingapplication,andhence,circumventtheQUIREsdefensemechanism.Furthermore,theunexpecteddenialofaccessesbythereceiverofthecallchainmightleadtoapplicationdysfunction/crashonthecallersside2,3.XManDroid(eXtendedMonitoringonAndroid)isasystem-levelsecurityframe-workthatallowstheAndroidOStomonitorapplicationcommunicationchannelsbothinthemiddlewarelevel2andintheunderlyingLinuxKernellevel3.Theframeworkcomplieswithasystem-centricsecuritypolicyatrun-time.TheauthorsconductaheuristicanalysisofAndroidssystembehaviors(withpopularapplica-tions)toidentifyattackpatternsandtoclassifydifferentadversarymodels,andpointoutthechallengestobetackled.TheyestablishsemanticlinksbetweenIPCsanden-ablethereferencemonitortoverifythecall-chainatthemiddlewarelevel,andrealizemandatoryaccesscontrolonthefilesystemandlocalInternetsocketsatthekernellevel.Theyalsoprovideacallbackchannelbetweenthekernelandthemiddleware.Theirapproachdiffersfromoursinthattheyarefocusingonpreventionwhileoursonreaction.RGBDroid(RootingGoodByeonDroid)5,ourpreviouswork,isanewAndroidsecurityenforcementtechniquewhichdetectsandrespondstotheattacksassociatedwithescalationorabuseofprivileges.RGBDroidhasintroducedtwodatastructures,calledpWhiteListandCriticalList.Theformerisalistoftrustedprogramswhilethelatterisalistofcriticalresourcesthatevenprivilegedapplicationcannotmodify.Thecriticalresourcesaredefinedasasetofresourceswhere,iftheresourcesaremodified,consistencyoftheAndroidOSisbrokenwhicheventuallyaffectsthebehaviorsofAndroidframeworkanduserapplications.WealsohaveproposedaninnovativemechanismforRGBDroidin16.Asma-liciousapplicationsbeingevolvedtactfully,someofthemcanevadethepreviousRGBDroidsprotectionsbyexploitingvulnerabilitiesoftrustedprogramswithrootprivileges.Toovercomethisdifficulty,theauthorsin16havedevisedakernel-levelPrivateDataProtection(PDP)mechanismthatrestrictsroot-privilegedprogramsfromaccessingresourcesownedbyuser-levelapplications.Inthispaper,weintegrateallsuggestionsdevisedin5and16intoaunifiedsystematicframework,whichisonedifferencebetweenthispaperandourpreviousones.ThetwoessentialpartsthatplayacoreroleintheAndroidsecuritymodelareapplications(orprocesses)andresources.Inourunifiedframework,privilegedappli-cationsandcriticalresourcesareregulatedbyRootPrivilegeProtection(RPP)andResourceMisuseProtection(RMP)mechanisms,respectively.Notethatthesemech-anismsareowingtoourobservationthattheinteractionsbetweenapplicationsandresourcescanbecontrolledandmanagedbywell-definedsecurityrules.Also,wecarefullyarguethat,intheAndroidOS,thetraditionalconceptthatmore-privileged744C.Leeetal.applicationscanaccessdataownedbyless-privilegedapplicationsisofteninade-quate.OurarguingisassessedwiththePrivateDataProtection(PDP)mechanism.Wealsoconductimplementation-basedexperimentsandanalyzetheperformanceef-fectsofthisintegrationinarealAndroiddevice,whichisanotherdifferencebetweenthispaperandthepreviousones.3SecurityenhancementframeworkTheAndroidOSprovidesseveralbasicsecuritymechanismssuchassandboxingandfileaccesscontrolsusingUID(UserID)andGID(GroupID).However,itisbasedontheUNIX-likeaccesscontrolmodel,soaroot-privilegedapplicationcanaccessanyresourcesincludingprivacy-sensitiveinformation.Hence,attackersandmaliciousap-plicationsnaturallyfocusonobtainingtherootprivilege.Theyconducttheprivilegeescalationattacks,suchasinstallingunauthorizedapplicationsbyacquiringtherootshelloraccessinginformationthroughotherlegitimateapplications,tocompromisethetargetsystemandtostealprivateinformation.Inthispaper,weproposeaunifiedframeworktopreventtheprivilegeescalationattacks,tomaintainsystemintegrity,andtoprotectuserssensitiveinformation.Theprivilegeescalationattackisdefinedasanattackthatattackers(ormaliciousapplica-tions)exploitvulnerabilitiesofatrustedprogramwiththerootprivilegesothattheycontrolstheprogram,oratypeofintrusionthattakesadvantageofvulnerabilitiesofsystemprogramstograntattackerselevatedaccessestothesystem.Forinstance,vold(VolumeManagerDaemon),thatisaprocessexecutedwiththerootprivile
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 改编舟过安仁500字(11篇)
- 词法规则在初中英语阅读理解中的应用研究
- 公交公司春季活动方案
- 伟大的母爱550字10篇
- 公交阅读日活动方案
- 公务文明活动方案
- 公司ktv唱歌活动方案
- 公司一周岁庆活动方案
- 2025至2030年中国修正带带芯行业投资前景及策略咨询报告
- 扶与不扶650字14篇
- 健身房安全知识培训
- 初中地理七下8.3.2《撒哈拉以南非洲》教学设计
- 铝锭应用行业分析
- 策划视频大赛策划方案
- 心衰的中西医结合治疗
- 《如何阅读文献》课件
- 公路技术状况检测与评定-公路技术状况评定
- 高中化学课本实验全(附答案)
- 乡村医生从业管理条例
- 圆锥体积公式的推导(动画演示)
- 北京第八十中学英语新初一分班试卷
评论
0/150
提交评论