SlideShare une entreprise Scribd logo
1  sur  18
RootGuard: Protecting 
Rooted Android Phones 
Yuru Shao, Xiapu Luo, and Chenxiong Qian, 
The Hong Kong Polytechnic University 
June 18 2014
Outline 
 Introduction 
 Related Work 
 System Overview 
 Proposed Approach 
 Result and Conclusion
Introduction 
 Most popular smartphone operating system 
 Limitations – ROOT! 
 ROOT security threats 
-access to entire system and low-level hardware 
 Root-management 
 RootGuard
Related Work 
 Rooting android and managing root privilege 
 Security flaws in available root-management tools 
1. Behaving like legitimate apps. 
2. Rootmanagement tools cannot defend themselves. 
 Attacking the root request Intent 
-Intent spoofing. 
-Intent hijacking and eavesdropping.
Related Work 
 Attacking su 
 Attacking Superuser’s policy storage 
 Attacking the local socket file 
 ROOTGUARD 
1. Provides fine-grain control. 
2. Defends itself against attacks
System Overview 
 The root-privilege management model.
System Overview 
 RootGuard-enhanced root-management model.
Design and Implementation 
 RootGuard’s three main components consist of SuperuserEx.
Design and Implementation 
 SuperuserEx 
-Offer user a GUI. Built on top of the open source. 
 Policy storage database 
-/etc/rootguard 
-/dev/rootguard 
 Kernel module 
-Linux Security Module(LSM) 
-LSM hooks. -rg_mount 
-System call hook. –sys_execve 
 Security Server
Design and Implementation 
 Default policies 
-apps for browsing the entire file system and editing files 
-apps for backing up files 
-security apps providing real-time detection and protection 
-apps for accessing and configuring hardware settings. 
 Mounting system partitions. - /system 
 Accessing hardware devices. -/dev 
 Accessing system files or other apps’ private data. 
 Manipulating process memory
Evaluation 
 Threat 1: Silent installation and uninstallation. 
-pm install, pm uninstall 
 Threat 2: Antimalware tool termination. 
-kill 
 Threat 3: Irremovability. 
-system/app 
 Threat 4: Access to other apps’ private data. 
 Threat 5: Back doors. 
 Threat 6: Rootkits and bootkits.
Case studies showing 
RootGuard’s effectiveness 
 RootSmart (Threats 1, 3, and 5). 
-download other malware from remote servers 
-creating a backdoor (/system/xbin/smart/sh) into the 
system partition 
 AVPass (Threat 4). 
- modify the signature databases of many popular 
antimalware apps
Case studies showing 
RootGuard’s effectiveness 
 DKFBootKit (Threat 6) 
-mounts the system partition as writable 
-copies itself into the /system/lib directory 
-replaces several commonly used utility programs 
(for example, ifconfig and mount) 
 PoC app (Threat 2) 
-terminates process by executing the kill <pid> command 
-query key components of an antimalware tool and 
disable them
Result 
 RootGuard-enhanced device user experience 
-Titanium Backup, CPU Tuner, Root Explorer, LBE 
Privacy Guard, and Root App Delete 
-Inspect in SuperuserEx and modify policy
Performance overhead 
 AnTuTu benchmark for two Google Nexus S 
-basic AOSP 
-RootGuard
Performance overhead
Other Security Considerations 
 Kernel-mode rootkits 
 Exploit kernel vulnerabilities 
 Direct kernel object modification (DKOM) 
 Disabled support for the Linux loadable kernel module 
(LKM) 
 Who knows RootGuard’s default policies
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones

Contenu connexe

Tendances

Tendances (20)

Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Ht w25
Ht w25Ht w25
Ht w25
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Os security issues
Os security issuesOs security issues
Os security issues
 
Goals of protection
Goals of protectionGoals of protection
Goals of protection
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Host security
Host securityHost security
Host security
 
Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 7Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 7
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Stormwatch micration
Stormwatch micrationStormwatch micration
Stormwatch micration
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 
operating system
operating systemoperating system
operating system
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
O p
O pO p
O p
 

Similaire à Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones

Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memorysecurityxploded
 
Yet Another Android Rootkit
Yet Another Android RootkitYet Another Android Rootkit
Yet Another Android RootkitFFRI, Inc.
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxGiuseppe Paterno'
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacksUltraUploader
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating Systemsohaildanish
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervChapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervEstelaJeffery653
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkDefCamp
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Operating System
Operating SystemOperating System
Operating SystemSyahida
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTJOLLUSUDARSHANREDDY
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application SecuritySunipa Bera
 
Complete security package for usb thumb drive
Complete security package for usb thumb driveComplete security package for usb thumb drive
Complete security package for usb thumb driveAlexander Decker
 

Similaire à Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones (20)

Apparmor
ApparmorApparmor
Apparmor
 
Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memory
 
Yet Another Android Rootkit
Yet Another Android RootkitYet Another Android Rootkit
Yet Another Android Rootkit
 
Hunting rootkit from dark corners of memory
Hunting rootkit from dark corners of memoryHunting rootkit from dark corners of memory
Hunting rootkit from dark corners of memory
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Rootkits
RootkitsRootkits
Rootkits
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervChapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Operating System
Operating SystemOperating System
Operating System
 
Os
OsOs
Os
 
ch2.ppt
ch2.pptch2.ppt
ch2.ppt
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Complete security package for usb thumb drive
Complete security package for usb thumb driveComplete security package for usb thumb drive
Complete security package for usb thumb drive
 

Plus de Syuan Wang

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to ArduinoSyuan Wang
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Syuan Wang
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Syuan Wang
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Syuan Wang
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemSyuan Wang
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Syuan Wang
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesSyuan Wang
 

Plus de Syuan Wang (7)

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to Arduino
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality Interfaces
 

Dernier

George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 

Dernier (20)

George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 

Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones

  • 1. RootGuard: Protecting Rooted Android Phones Yuru Shao, Xiapu Luo, and Chenxiong Qian, The Hong Kong Polytechnic University June 18 2014
  • 2. Outline  Introduction  Related Work  System Overview  Proposed Approach  Result and Conclusion
  • 3. Introduction  Most popular smartphone operating system  Limitations – ROOT!  ROOT security threats -access to entire system and low-level hardware  Root-management  RootGuard
  • 4. Related Work  Rooting android and managing root privilege  Security flaws in available root-management tools 1. Behaving like legitimate apps. 2. Rootmanagement tools cannot defend themselves.  Attacking the root request Intent -Intent spoofing. -Intent hijacking and eavesdropping.
  • 5. Related Work  Attacking su  Attacking Superuser’s policy storage  Attacking the local socket file  ROOTGUARD 1. Provides fine-grain control. 2. Defends itself against attacks
  • 6. System Overview  The root-privilege management model.
  • 7. System Overview  RootGuard-enhanced root-management model.
  • 8. Design and Implementation  RootGuard’s three main components consist of SuperuserEx.
  • 9. Design and Implementation  SuperuserEx -Offer user a GUI. Built on top of the open source.  Policy storage database -/etc/rootguard -/dev/rootguard  Kernel module -Linux Security Module(LSM) -LSM hooks. -rg_mount -System call hook. –sys_execve  Security Server
  • 10. Design and Implementation  Default policies -apps for browsing the entire file system and editing files -apps for backing up files -security apps providing real-time detection and protection -apps for accessing and configuring hardware settings.  Mounting system partitions. - /system  Accessing hardware devices. -/dev  Accessing system files or other apps’ private data.  Manipulating process memory
  • 11. Evaluation  Threat 1: Silent installation and uninstallation. -pm install, pm uninstall  Threat 2: Antimalware tool termination. -kill  Threat 3: Irremovability. -system/app  Threat 4: Access to other apps’ private data.  Threat 5: Back doors.  Threat 6: Rootkits and bootkits.
  • 12. Case studies showing RootGuard’s effectiveness  RootSmart (Threats 1, 3, and 5). -download other malware from remote servers -creating a backdoor (/system/xbin/smart/sh) into the system partition  AVPass (Threat 4). - modify the signature databases of many popular antimalware apps
  • 13. Case studies showing RootGuard’s effectiveness  DKFBootKit (Threat 6) -mounts the system partition as writable -copies itself into the /system/lib directory -replaces several commonly used utility programs (for example, ifconfig and mount)  PoC app (Threat 2) -terminates process by executing the kill <pid> command -query key components of an antimalware tool and disable them
  • 14. Result  RootGuard-enhanced device user experience -Titanium Backup, CPU Tuner, Root Explorer, LBE Privacy Guard, and Root App Delete -Inspect in SuperuserEx and modify policy
  • 15. Performance overhead  AnTuTu benchmark for two Google Nexus S -basic AOSP -RootGuard
  • 17. Other Security Considerations  Kernel-mode rootkits  Exploit kernel vulnerabilities  Direct kernel object modification (DKOM)  Disabled support for the Linux loadable kernel module (LKM)  Who knows RootGuard’s default policies