首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android
【24h】

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android

机译:JGRE:Android中的JNI全球参考耗尽漏洞分析

获取原文

摘要

Android system applies a permission-based security model to restrict unauthorized apps from accessing system services, however, this security model cannot constrain authorized apps from sending excessive service requests to exhaust the limited system resource allocated for each system service. As references from native code to a Java object, JNI Global References (JGR) are prone to memory leaks, since they are not automatically garbage collected. Moreover, JGR exhaustion may lead to process abort or even Android system reboot when the victim process could not afford the JGR requests triggered by malicious apps through inter-process communication. In this paper, we perform a systematic study on JGR exhaustion (JGRE) attacks against all system services in Android. Our experimental results show that among the 104 system services in Android 6.0.1, 32 system services have 54 vulnerabilities. Particularly, 22 system services can be successfully attacked without any permission support. After reporting those vulnerabilities to Android security team and getting confirmed, we study the existing ad hoc countermeasures in Android against JGRE attacks. Surprisingly, among the 10 system services that have been protected, 8 system services are still vulnerable to JGRE attacks. Finally, we develop an effective defense mechanism to defeat all identified JGRE attacks by adopting Android's low memory killer (LMK) mechanism.
机译:Android系统应用于基于权限的安全模型来限制未经授权的应用程序访问系统服务,但是,此安全模型无法将授权的应用程序解释发送过多服务请求以排除为每个系统服务分配的有限系统资源的限制。作为从本机代码到Java对象的引用,JNI全局引用(JGR)易于内存泄漏,因为它们不会自动收集垃圾。此外,当受害者进程无法通过进程间通信时无法提供恶意应用程序触发的JGR请求时,JGR耗尽可能导致流程中止甚至Android系统重新启动。在本文中,我们对Android中的所有系统服务的JGR耗尽(JGRE)攻击进行了系统研究。我们的实验结果表明,在Android 6.0.1中的104个系统服务中,32个系统服务有54个漏洞。特别是,在没有任何权限支持的情况下,可以成功地攻击22个系统服务。在向Android Security团队报告这些漏洞并确认后,我们研究了Android对JGRE攻击的现有特设对策。令人惊讶的是,在受保护的10个系统服务中,8个系统服务仍然容易受到JGRE攻击的影响。最后,我们通过采用Android的低记忆杀手(LMK)机制,制定有效的防御机制来打败所有已识别的JGRE攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号