Ex-vivo dynamic analysis framework for Android device drivers

2020 IEEE Symposium on Security and Privacy (SP)(2020)

引用 23|浏览6
暂无评分
摘要
The ability to execute and analyze code makes many security tasks such as exploit development, reverse engineering, and vulnerability detection much easier. However, on embedded devices such as Android smartphones, executing code in-vivo, on the device, for analysis is limited by the need to acquire such devices, the speed of the device, and in some cases the need to flash custom code onto the devices. The other option is to execute the code ex-vivo, off the device, but this approach either requires porting or complex hardware emulation. In this paper, we take advantage of the observation that many execution paths in drivers are only superficially dependent on both the hardware and kernel on which the driver executes, to create an ex-vivo dynamic driver analysis framework for Android devices that requires neither porting nor emulation. We achieve this by developing a generic evasion framework that enables driver initialization by evading hardware and kernel dependencies instead of precisely emulating them, and then developing a novel Ex-vivo AnalySIs framEwoRk (EASIER) that enables off-device analysis with the initialized driver state. Compared to on-device analysis, our approach enables the use of userspace tools and scales with the number of available commodity CPU's, not the number of smartphones. We demonstrate the usefulness of our framework by targeting privilege escalation vulnerabilities in system call handlers in platform device drivers. We find it can load 48/62 (77%) drivers from three different Android kernels: MSM, Xiaomi, and Huawei. We then confirm that it is able to reach and detect 21 known vulnerabilities. Finally, we have discovered 12 new bugs which we have reported and confirmed.
更多
查看译文
关键词
driver initialization,evading hardware,kernel dependencies,off-device analysis,initialized driver state,on-device analysis,platform device drivers,Android kernels,Android device drivers,security tasks,vulnerability detection,embedded devices,Android smartphones,custom code,Huawei,Xiaomi,MSM,userspace tools,Ex-vivo AnalySIs framEwoRk,generic evasion framework,ex-vivo dynamic driver analysis framework,execution paths,complex hardware emulation,code ex-vivo
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要