On Root Detection Strategies for Android Devices

12/03/2020
by   Raphael Bialon, et al.
0

The Android operating system runs on the majority of smartphones nowadays. Its success is driven by its availability to a variety of smartphone hardware vendors on the one hand, and the customization possibilities given to its users on the other hand. While other big smartphone operating systems restrict user configuration to a given set of functionality, Android users can leverage the whole potential of their devices. This high degree of customization enabled by a process called rooting, where the users escalate their privileges to those of the operating system, introduces security, data integrity and privacy concerns. Several rooting detection mechanisms for Android devices already exist, aimed at different levels of detection. This paper introduces further strategies derived from the Linux ecosystem and outlines their usage on the Android platform. In addition, we present a novel remote rooting detection approach aimed at trust and integrity checks between devices in wireless networks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/09/2022

It's TEEtime: Bringing User Sovereignty to Smartphones

The majority of smartphones either run iOS or Android operating systems....
research
02/04/2021

Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones

The majority of smartphones either run iOS or Android operating systems....
research
05/24/2019

Scan-and-Pay on Android is Dangerous

Mobile payments have increased significantly in the recent years and one...
research
02/22/2020

An Empirical Study of Android Security Bulletins in Different Vendors

Mobile devices encroach on almost every part of our lives, including wor...
research
03/20/2022

Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications

Most users have no idea that their Android devices are equipped with man...
research
04/20/2022

Exploring Widevine for Fun and Profit

For years, Digital Right Management (DRM) systems have been used as the ...
research
06/01/2016

It's Time: OS Mechanisms for Enforcing Asymmetric Temporal Integrity

Mixed-criticality systems combine real-time components of different leve...

Please sign up or login with your details

Forgot password? Click here to reset