Abstract
Android root is the voluntary and legitimate process of gaining the highest privilege and full control over a user's Android device. To facilitate the popular demand, a unique Android root ecosystem has formed where a variety of root providers begin to offer root as a service. Even though legitimate, many convenient one-click root methods operate by exploiting vulnerabilities in the Android system. If not carefully controlled, such exploits can be abused by malware author to gain unauthorized root privilege. To understand such risks, we undertake a study on a number of popular yet mysterious Android root providers focusing on 1) if their exploits are adequately protected. 2) the relationship between their proprietary exploits and publicly available ones. We find that even though protections are usually employed, the effort is substantially undermined by a few systematic and sometimes obvious weaknesses we discover. From one large provider, we are able to extract more than 160 exploit binaries that are well-engineered and up-to-date, corresponding to more than 50 families, exceeding the number of exploits we can find publicly. We are able to identify at least 10 device driver exploits that are never reported in the public. Besides, for a popular kernel vulnerability (futex bug), the provider has engineered 89 variants to cover devices with different Android versions and configurations. Even worse, we find few of the exploit binaries can be detected by mobile antivirus software.
| Original language | English |
|---|---|
| Title of host publication | CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery |
| Pages | 1093-1104 |
| Number of pages | 12 |
| ISBN (Electronic) | 9781450338325 |
| DOIs | |
| Publication status | Published - 12 Oct 2015 |
| Externally published | Yes |
| Event | 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 - Denver, United States Duration: 12 Oct 2015 → 16 Oct 2015 |
Publication series
| Name | Proceedings of the ACM Conference on Computer and Communications Security |
|---|---|
| Volume | 2015-October |
| ISSN (Print) | 1543-7221 |
Conference
| Conference | 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 |
|---|---|
| Country/Territory | United States |
| City | Denver |
| Period | 12/10/15 → 16/10/15 |
Bibliographical note
Publisher Copyright:© 2015 ACM.
Keywords
- Android root exploit
- Root provider