• DocumentCode
    737286
  • Title

    Decomposable Trust for Android Applications

  • Author

    Fernandes, Earlence ; Aluri, Ajit ; Crowell, Alexander ; Prakash, Atul

  • fYear
    2015
  • fDate
    22-25 June 2015
  • Firstpage
    343
  • Lastpage
    354
  • Abstract
    Current operating system designs require applications (apps) to implicitly place trust in a large amount of code. Taking Android as an example, apps must trust both the kernel as well as privileged userspace services that consist of hundreds of thousands of lines of code. Malware apps, on the other hand, aim to exploit any vulnerabilities in the above large trusted base to escalate their privileges. Once malware escalates its privileges, additional attacks become feasible, such as stealing credentials by scanning memory pages or intercepting user interactions of sensitive apps, e.g., those used for banking or health management. This paper introduces a novel mechanism, called Anception, that strategically deprivileges a significant portion of the kernel and system services, moving them to an untrusted container, thereby significantly reducing the attack surface for privilege escalation available to malware. Anception supports unmodified apps, running on a modified Android kernel. It achieves performance close to native Android on several popular macro benchmarks and provides security against many types of known Android root exploits.
  • Keywords
    Androids; Banking; Containers; Humanoid robots; Kernel; Malware; Android; Root Exploits; Trust Decomposition; Virtualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on
  • Conference_Location
    Rio de Janeiro, Brazil
  • Type

    conf

  • DOI
    10.1109/DSN.2015.15
  • Filename
    7266863