JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface

Mordechai Guri, Yuri Poliak, Bracha Shapira, Y. Elovici
{"title":"JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface","authors":"Mordechai Guri, Yuri Poliak, Bracha Shapira, Y. Elovici","doi":"10.1109/Trustcom.2015.358","DOIUrl":null,"url":null,"abstract":"Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as the monitored OS can be compromised via application, kernel or boot-loader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task in practice. In this paper we present 'JoKER' - a system which aims at detecting rootkits in the Android kernel by utilizing the hardware's Joint Test Action Group (JTAG) interface for trusted memory forensics. Our framework consists of components that extract areas of a kernel's memory and reconstruct it for further analysis. We present the overall architecture along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG's main purpose is system testing, it can also be used for malware detection where traditional methods fail.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Trustcom/BigDataSE/ISPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom.2015.358","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29

Abstract

Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as the monitored OS can be compromised via application, kernel or boot-loader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task in practice. In this paper we present 'JoKER' - a system which aims at detecting rootkits in the Android kernel by utilizing the hardware's Joint Test Action Group (JTAG) interface for trusted memory forensics. Our framework consists of components that extract areas of a kernel's memory and reconstruct it for further analysis. We present the overall architecture along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG's main purpose is system testing, it can also be used for malware detection where traditional methods fail.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
JoKER:通过JTAG接口对Android设备中的内核rootkit进行可信检测
智能手机和平板电脑已成为恶意软件的主要目标,因为它们持有宝贵的私人和企业信息。虽然反病毒(AV)程序可以成功检测恶意应用程序(应用程序),但它们对低级rootkit仍然无效,这些rootkit通过掩盖自己的存在来逃避检测机制。此外,与被监视的操作系统在同一物理设备上运行的任何检测机制都可能通过应用程序、内核或引导加载程序漏洞受到损害。因此,移动设备中内核rootkit的可信检测在实践中是一项具有挑战性的任务。在本文中,我们介绍了“JoKER”——一个旨在通过利用硬件的联合测试行动组(JTAG)接口进行可信内存取证来检测Android内核中的rootkit的系统。我们的框架由一些组件组成,这些组件提取内核的内存区域并对其进行重构以供进一步分析。我们给出了整体架构及其实现,并证明了系统可以成功地检测内核中隐形rootkit的存在。结果表明,尽管JTAG的主要目的是系统测试,但它也可以用于传统方法无法检测的恶意软件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware WAVE: Secure Wireless Pairing Exploiting Human Body Movements Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1