DocumentCode :
153566
Title :
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
Author :
Xiaoyong Zhou ; Yeonjoon Lee ; Nan Zhang ; Naveed, Muhammad ; Xiaofeng Wang
Author_Institution :
Sch. of Inf. & Comput., Indiana Univ., Bloomington, IN, USA
fYear :
2014
fDate :
18-21 May 2014
Firstpage :
409
Lastpage :
423
Abstract :
Android phone manufacturers are under the perpetual pressure to move quickly on their new models, continuously customizing Android to fit their hardware. However, the security implications of this practice are less known, particularly when it comes to the changes made to Android´s Linux device drivers, e.g., those for camera, GPS, NFC etc. In this paper, we report the first study aimed at a better understanding of the security risks in this customization process. Our study is based on ADDICTED, a new tool we built for automatically detecting some types of flaws in customized driver protection. Specifically, on a customized phone, ADDICTED performs dynamic analysis to correlate the operations on a security-sensitive device to its related Linux files, and then determines whether those files are under-protected on the Linux layer by comparing them with their counterparts on an official Android OS. In this way, we can detect a set of likely security flaws on the phone. Using the tool, we analyzed three popular phones from Samsung, identified their likely flaws and built end-to-end attacks that allow an unprivileged app to take pictures and screenshots, and even log the keys the user enters through touch screen. Some of those flaws are found to exist on over a hundred phone models and affect millions of users. We reported the flaws and helped the manufacturers fix those problems. We further studied the security settings of device files on 2423 factory images from major phone manufacturers, discovered over 1,000 vulnerable images and also gained insights about how they are distributed across different Android versions, carriers and countries.
Keywords :
Android (operating system); computer crime; device drivers; flaw detection; smart phones; ADDICTED tool; Android Linux device driver customizations; Android OS; Android phone manufacturers; Linux files; Linux layer; Samsung phones; customized driver protection; customized phone; device files; dynamic analysis; end-to-end attacks; flaws detection; phone models; security flaws; security hazards; security implications; security risks; security settings; security-sensitive device; Cameras; Hardware; Kernel; Linux; Performance evaluation; Security; Smart phones; Android Security; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2014 IEEE Symposium on
Conference_Location :
San Jose, CA
ISSN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2014.33
Filename :
6956578
Link To Document :
بازگشت