首页> 外文会议>IEEE International Conference on Software Maintenance and Evolution >Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices
【24h】

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices

机译:刺绣:修补弱势群体的碎片化Android设备的二进制代码

获取原文

摘要

The rapid-iteration, web-style update cycle of Android helps fix revealed security vulnerabilities for its latest version. However, such security enhancements are usually only available for few Android devices released by certain manufacturers (e.g., Google's official Nexus devices). More manufactures choose to stop providing system update service for their obsolete models, remaining millions of vulnerable Android devices in use. In this situation, a feasible solution is to leverage existing source code patches to fix outdated vulnerable devices. To implement this, we introduce Embroidery, a binary rewriting based vulnerability patching system for obsolete Android devices without requiring the manufacturer's source code against Android fragmentation. Embroidery patches the known critical framework and kernel vulnerabilities in Android using both static and dynamic binary rewriting techniques. It transplants official patches (CVE source code patches) of known vulnerabilities to different devices by adopting heuristic matching strategies to deal with the code diversity introduced by Android fragmentation, and fulfills a complex dynamic memory modification to implement kernel vulnerabilities patching. We employ Embroidery to patch sophisticated Android kernel and framework vulnerabilities for various manufactures' obsolete devices ranging from Android 4.2 to 5.1. The result shows the patched devices are able to defend against known exploits and the normal functions are not affected.
机译:快速迭代,Android的网页风格的更新周期可以帮助其最新版本的修订透露的安全漏洞。然而,这样的安全增强功能通常只适用于少数由某些制造商(例如,谷歌官方的Nexus设备)发布的Android设备。更多的厂商选择停止其过时的车型提供系统升级服务,在使用剩余百万脆弱的Android设备。在这种情况下,一个可行的解决方案是利用现有的源代码补丁来修复过时的易受攻击的设备。要实现这一点,我们引进刺绣,二进制改写过时的Android设备基于漏洞补丁的系统,而不需要对Android的碎片化制造商的源代码。刺绣补丁的Android使用静态和动态二进制重写技术已知的关键架构和内核的漏洞。它采用启发式匹配策略,以应付由Android碎片引入的代码移植多样性已知的漏洞,以不同的设备的官方补丁(CVE源代码补丁),并满足复杂的动态内存修改器内核漏洞补丁。我们采用刺绣修补复杂的Android内核和架构漏洞的各种制造商的范围从Android 4.2版本到5.1过时的设备。结果表明了该补丁的设备能够抵御已知漏洞的正常功能不会受到影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号