Curtailing privilege escalation attacks over asynchronous channels on Android


Abstract: Recently we presented QuantDroid [7], a quantitative approach towards mitigating privilege escalation attacks on Android. By monitoring all synchronous IPC via overt channels on-the-fly, a so called flow-graph service detects an abnormal amount of traffic exchanged between DVMs running different Apps to indicate a potential horizontal privilege escalation attack. However, although certainly a valuable first step, our initial QuantDroid approach fails when dealing with asynchronous IPC via persistent storage containers on the Android system. To also address this issue, in this work we extend QuantDroid to QuantDroid++ by providing i) a central storage of taints when operating on system-internal databases of Android, ii) an extension of the SQL cursor object to preserve taints and link requested data with such taints, and, finally iii) an inspection of the information flow with such newly available taints for all relevant database operations.

Sources:

DOI
Google Scholar

Location:

Reims, France

Booktitle:

2014 14th International Conference on Innovations for Community Services (I4CS)

Pages:

87–94

Publication Date:

June 2014

Authors:

Katharina Mollus, Dirk Westhoff, and Tobias Markmann

BibTeX: