首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android
【24h】

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android

机译:JGRE:Android中的JNI全局引用耗尽漏洞分析

获取原文

摘要

Android system applies a permission-based security model to restrict unauthorized apps from accessing system services, however, this security model cannot constrain authorized apps from sending excessive service requests to exhaust the limited system resource allocated for each system service. As references from native code to a Java object, JNI Global References (JGR) are prone to memory leaks, since they are not automatically garbage collected. Moreover, JGR exhaustion may lead to process abort or even Android system reboot when the victim process could not afford the JGR requests triggered by malicious apps through inter-process communication. In this paper, we perform a systematic study on JGR exhaustion (JGRE) attacks against all system services in Android. Our experimental results show that among the 104 system services in Android 6.0.1, 32 system services have 54 vulnerabilities. Particularly, 22 system services can be successfully attacked without any permission support. After reporting those vulnerabilities to Android security team and getting confirmed, we study the existing ad hoc countermeasures in Android against JGRE attacks. Surprisingly, among the 10 system services that have been protected, 8 system services are still vulnerable to JGRE attacks. Finally, we develop an effective defense mechanism to defeat all identified JGRE attacks by adopting Android's low memory killer (LMK) mechanism.
机译:Android系统应用基于权限的安全模型来限制未经授权的应用程序访问系统服务,但是,此安全模型不能限制授权的应用程序发送过多的服务请求以耗尽为每个系统服务分配的有限系统资源。作为从本机代码到Java对象的引用,JNI全局引用(JGR)易于发生内存泄漏,因为它们不会自动进行垃圾回收。此外,当受害进程无法通过进程间通信承受由恶意应用触发的JGR请求时,JGR耗尽可能导致进程中止甚至Android系统重新启动。在本文中,我们对针对Android中所有系统服务的JGR耗尽(JGRE)攻击进行了系统的研究。我们的实验结果表明,在Android 6.0.1中的104个系统服务中,有32个系统服务具有54个漏洞。特别是,无需任何许可支持就可以成功攻击22种系统服务。向Android安全团队报告这些漏洞并得到确认后,我们研究了Android中针对JGRE攻击的临时对策。令人惊讶的是,在受保护的10个系统服务中,有8个系统服务仍然容易受到JGRE攻击。最后,我们采用Android的低内存杀手(LMK)机制,开发了一种有效的防御机制来击败所有已识别的JGRE攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号