跳到主要內容

簡易檢索 / 詳目顯示

研究生: 曾毓傑
Yu-Chieh Tseng
論文名稱: RootGuard: A Behavioral-based Solution to Android Root Privilege Escalation
指導教授: 許富皓
Fu-Hau Hsu
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 40
中文關鍵詞: 安卓作業系統惡意程式權限提升行為行動裝置
外文關鍵詞: Android, Malware, Root Privilege Escalation, Behavioural, Mobile
相關次數: 點閱:10下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著智慧型手機的大量普及,智慧型手機已經成為重要的日常工
    具,其可以做的事情已經足以比擬一台桌上型電腦。而在智慧型手機
    成為提供重要服務的工具,像是存取網路銀行、線上消費、辦公文件
    等,其安全性就顯得更加重要。目前Google所開發的Android手機作
    業系統是市佔率最高,自然就成為很多惡意攻擊的目標。
    在目前眾多針對Android系統的攻擊中,其中一種手法是取得手
    機的最高管理者權限(Root Escalation),一旦惡意程式透過系統的
    漏洞拿到管理者權限,惡意程式便可以在手機中植入各種惡意的系統
    監控,以及任意的資源存取,也可以在暗中安裝各種程式到手機中,
    對手機將造成極大的傷害。
    本論文提出一個系統RootGuard,透過修改Android底層的Linux
    Kernl去偵測系統中是否有任何的惡意舉動,以程式行為為基礎去偵測
    這些惡意軟體,並而做出防範的行動,來達到阻止惡意程式入侵系統
    的行為。


    Smartphone has gain a lot of attention in recent years. It pro-
    vides lots of important features such as checking bank accounts and
    receive emails. It has been as important as a PC nowadays. As the
    importance of smartphone arise, the security has became a signi cant
    consideration. Currently, Google has developed an operating system
    Android with highest market share. So it has been a main target for
    attackers.
    Among the attack methods, Root Escalation is one of the most
    frequently used method to attack Android system. Once the attacker
    gain root privilege of system, he or she can do almost anything they
    want, including accessing user's private data and inject malicious ap-
    plications into the phone. This may cause a lot of damage for user.
    This paper propose a system called RootGuard. It modi es the
    Linux kernel underlying the Android framework to achieve detecting
    any illegal behaviours in the system. Further more, it stops the ma-
    licious applications by applying policies of illegal behaviours. Finally,
    this system can prevent user from Root Escalation attack.

    摘要. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Abstract. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii 謝誌. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1 Android Architecture . . . . . . . . . . . . . . . . . 4 2.2 Android Security . . . . . . . . . . . . . . . . . . . 5 2.3 Shell Execution . . . . . . . . . . . . . . . . . . . . 6 2.4 Vulnerabilities . . . . . . . . . . . . . . . . . . . . . 7 2.4.1 Rage Against the Cage . . . . . . . . . . . . . . . . 7 2.4.2 CVE-2011-1823 . . . . . . . . . . . . . . . . . . . . . 8 2.4.3 CVE-2013-2094 . . . . . . . . . . . . . . . . . . . . . 8 2.5 Known Malwares . . . . . . . . . . . . . . . . . . . 9 2.5.1 DroidKungFu . . . . . . . . . . . . . . . . . . . . . . 9 2.5.2 DroidDream . . . . . . . . . . . . . . . . . . . . . . 10 2.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . 10 3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4 System Design . . . . . . . . . . . . . . . . . . . . . . . . . 13 4.1 General Pattern in Root Privilege Escalation Attack 13 4.2 Behaviour-based Detection . . . . . . . . . . . . . . 14 4.3 Shell Detection . . . . . . . . . . . . . . . . . . . . 15 4.3.1 Standard Input . . . . . . . . . . . . . . . . . . . . . 15 4.3.2 Command String . . . . . . . . . . . . . . . . . . . . 15 4.3.3 Interactive . . . . . . . . . . . . . . . . . . . . . . . 16 4.4 RootGuard . . . . . . . . . . . . . . . . . . . . . . 16 4.4.1 System Calls . . . . . . . . . . . . . . . . . . . . . . 17 4.4.2 Whitelisting . . . . . . . . . . . . . . . . . . . . . . 18 5 Evaluation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5.1 Implementation . . . . . . . . . . . . . . . . . . . . 19 5.2 E ectiveness . . . . . . . . . . . . . . . . . . . . . 19 5.2.1 False Negative . . . . . . . . . . . . . . . . . . . . . 19 5.2.2 False Positive . . . . . . . . . . . . . . . . . . . . . . 20 5.3 Performance . . . . . . . . . . . . . . . . . . . . . . 22 5.4 Limitation . . . . . . . . . . . . . . . . . . . . . . . 23 6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    [1] BI Intellengence. Chart of the day: Smartphone sales
    are on the verge of overtaking feature phone sales.
    http://www.businessinsider.com/chart-of-the-day-
    smartphones-to-beat-feature-phone-sales-2013-6, June
    2013.
    [2] Google Inc. Google I/O 2013 keynote. https://developers.
    google.com/live/shows/517795853, May 2013.
    [3] TrendMicro Inc. 2012 mobile threat and security roundup. http:
    //www.trendmicro.com/cloud-content/us/pdfs/security-
    intelligence/reports/rpt-repeating-history.pdf, 2013.
    [4] Google Inc. Android architecture. http://developer.android.
    com/images/system-architecture.jpg, May 2013.
    [5] The IEEE and The Open Group. sh - shell, the standard
    command language interpreter. http://pubs.opengroup.org/
    onlinepubs/9699919799/utilities/sh.html.
    [6] Intrepidus Group. Android root source code: Looking at
    the c-skills. https://intrepidusgroup.com/insight/2010/09/
    android-root-source-code-looking-at-the-c-skills/.
    [7] C-Skills. Droid2. http://c-skills.blogspot.tw/2010/08/
    droid2.html.
    [8] National Vulnerability Database. Vulnerability summary for
    cve-2011-1823. http://web.nvd.nist.gov/view/vuln/detail?
    vulnId=CVE-2011-1823.
    [9] Xuxian Jiang. Gingermaster: First android malware utilizing
    a root exploit on android 2.3 (gingerbread). http://www.csc.
    ncsu.edu/faculty/jiang/GingerMaster/.
    [10] C-Skills. yummy yummy, gingerbreak! http://c-skills.
    blogspot.tw/2011/04/yummy-yummy-gingerbreak.htmll.
    [11] National Vulnerability Database. Vulnerability summary for
    cve-2013-2094. http://web.nvd.nist.gov/view/vuln/detail?
    vulnId=CVE-2013-2094.
    [12] Joe Damato. A closer look at a recent privilege escalation bug
    in linux (cve-2013-2094). http://timetobleed.com/a-closer-
    look-at-a-recent-privilege-escalation-bug-in-linux-
    cve-2013-2094/.
    [13] Xuxian Jiang. Security alert: New sophisticated android malware
    droidkungfu found in alternative chinese app markets. http://
    www.csc.ncsu.edu/faculty/jiang/DroidKungFu.html.
    [14] Lookout. Security alert: Droiddream malware found in ocial
    android market. https://blog.lookout.com/blog/2011/03/
    01/security-alert-malware-found-in-official-android-
    market-droiddream/.
    [15] Lookout. Android malware droiddream: How it works.
    https://blog.lookout.com/blog/2011/03/02/android-
    malware-droiddream-how-it-works/.
    [16] Lookout. Security alert: Droiddreamlight, new malware from
    the developers of droiddream. https://blog.lookout.com/
    blog/2011/05/30/security-alert-droiddreamlight-new-
    malware-from-the-developers-of-droiddream/.
    [17] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P Cox,
    Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. Taint-
    droid: An information-
    ow tracking system for realtime privacy
    monitoring on smartphones.
    [18] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer,
    and Ahmad-Reza Sadeghi. Xmandroid: A new android evolution
    to mitigate privilege escalation attacks. Technische Universitat
    Darmstadt, Technical Report TR-2011-04, 2011.
    [19] Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and
    Marcel Winandy. Privilege escalation attacks on android. In In-
    formation Security, pages 346{360. Springer, 2011.
    [20] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer,
    Ahmad-Reza Sadeghi, and Bhargava Shastry. Towards taming
    privilege-escalation attacks on android.
    [21] Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. Hey, you,
    get o of my market: Detecting malicious apps in ocial and
    alternative android markets. In NDSS, 2012.
    [22] Yeongung Park, ChoongHyun Lee, Chanhee Lee, J Lim, Sangchul
    Han, Minkyu Park, and Seong-Je Cho. Rgbdroid: a novel
    response-based approach to android privilege escalation attacks.
    In Proceedings of the 5th USENIX conference on Large-Scale Ex-
    ploits and Emergent Threats, LEET, volume 12, pages 9{9, 2012.
    [23] Oracle vm virtualbox. https://www.virtualbox.org/.
    [24] Contagio mobile. http://contagiominidump.blogspot.com/.
    [25] Androidrank market analysis, stats and rankings. http://www.
    androidrank.org/.
    [26] Antutu benchmark. https://play.google.com/store/apps/
    details?id=com.antutu.ABenchMark.
    [27] Andebench. https://play.google.com/store/apps/details?
    id=com.eembc.coremark.

    QR CODE
    :::