Security Issues in the Android Cross-Layer Architecture

09/04/2012
by   Alessandro Armando, et al.
0

The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. We argue that such vulnerabilities are largely related to the interplay among layers composing the Android stack. Thus, we also argue that such interplay has been underestimated from a security point-of-view and a systematic analysis of the Android interplay has not been carried out yet. To this aim, in this paper we provide a simple model of the Android cross-layer interactions based on the concept of flow, as a basis for analyzing the Android interplay. In particular, our model allows us to reason about the security implications associated with the cross-layer interactions in Android, including a recently discovered vulnerability that allows a malicious application to make Android devices totally unresponsive. We used the proposed model to carry out an empirical assessment of some flows within the Android cross-layered architecture. Our experiments indicate that little control is exercised by the Android Security Framework (ASF) over cross-layer interactions in Android. In particular, we observed that the ASF lacks in discriminating the originator of a flow and sensitive security issues arise between the Android stack and the Linux kernel, thereby indicating that the attack surface of the Android platform is wider than expected.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/22/2020

An Empirical Study of Android Security Bulletins in Different Vendors

Mobile devices encroach on almost every part of our lives, including wor...
research
12/06/2017

Android Multi-Level System Permission Management Approach

With the expansion of the market share occupied by the Android platform,...
research
10/11/2021

Towards a Principled Approach for Dynamic Analysis of Android's Middleware

The Android middleware, in particular the so-called systemserver, is a c...
research
12/14/2020

Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)

We analyze the prandom pseudo random number generator (PRNG) in use in t...
research
04/12/2022

ASVAAN: Semi-automatic side-channel analysis of Android NDK

Android is the most popular operating systems for smartphones and is als...
research
01/11/2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

Billions of users rely on the security of the Android platform to protec...
research
12/21/2017

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

Vendors in the Android ecosystem typically customize their devices by mo...

Please sign up or login with your details

Forgot password? Click here to reset