检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:朱舒阳 梁彬[1,2] 白石磊 杨超群 石文昌[1,2] ZHU Shu-yang;LIANG Bin;BAI Shi-lei;YANG Chao-qun;SHI Wen-chang(Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) of Ministry of Education,Beijing 100872,China;School of Information,Renmin University of China,Beijing 100872,China)
机构地区:[1]中国人民大学数据工程与知识工程教育部重点实验室,北京100872 [2]中国人民大学信息学院,北京100872
出 处:《北京理工大学学报》2019年第1期81-87,共7页Transactions of Beijing Institute of Technology
基 金:国家自然科学基金资助项目(61170240;91418206;61472429);国家科技重大专项资助项目(2012ZX01039-004)
摘 要:Android系统中的Root是指利用系统漏洞或者通过刷机使得应用能够执行需要Root权限的操作.用户常常出于个性化设备、安装特权应用等目的将设备Root,而对设备Root会引入很大的安全风险.攻击方得到Root权限后可以进行静默安装恶意应用、窃取用户敏感数据及篡改应用程序等恶意操作.由于上述安全风险的存在,Android系统和大多数应用程序不希望设备被Root.为此,Google移动服务框架中的SafetyNet模块提供了平台级的Root检测.但SafetyNet Root检测机制本身的安全性及健壮性尚不完全清晰,突出的问题是此机制是否可能被绕开还不明了.为此,本文使用逆向工程的方法分析了Google移动服务框架中SafetyNet的Root检测机制,并结合Root的技术原理,分析了相关检测机制的实现方式并发现了其中的弱点.通过攻击实验,成功地揭示了Google平台级Root检测机制实现中存在有较高的安全风险,难以检测本文设计的Root方法.Android Rooting refers to making the target application perform privileged operations(as root user)by exploiting system vulnerabilities or flashing devices.Some user might root their devices to customize devices or run the Apps that require root privileges.Unfortunately,rooting a device will introduce some serious security risks.Attackers'application can perform malicious actions by requesting root privileges,such as installing malicious application stealthy,stealing user sensitive data and tempering the application.Considering the security risks,Android platform vendor(Google)and some sensitive applications developers don't want the device to be rooted.Consequently,Google developed Root detection mechanisms in platform level.However,the security of these Root detection mechanisms is still unclear.To analyze the evadable ability of their detection by sophisticated Root methods,the reverse engineering techniques were employed to investigate the security of the Root detection mechanism.Analyzing the implementation of some popular Root detection mechanisms,the weakness was found based on the Root technical principle.Some attack experiments were carried out to demonstrate a number of Root detection mechanisms.Results show that,the Root detection mechanism developed by Google possesses a high security risk,and the proposed Root methods can evade the attacks successfully.And this work implies that the security of the current Root detection mechanisms should be further improved.
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.137.165.75