Abstract
ASLR (address space layout randomization) and ROP (return oriented programming) attacks have been happening for years on the PC platform. Android devices are ripe for these same attacks. Android has made mitigation efforts, mostly in the Zygote (mother of all Java processes), which is presently exposed to a vast number of ASLR bypassing exploits. We carefully re-analyzed the Zygote process creation model. We include mitigations not only for ASLR but also for ROP attacks. We demonstrate that Android becomes robust against most of the ROP exploits by running such attacks on the device, in the presence of our solution. We compare our solution with existing solutions and show that ours is a more effective approach to mitigate ASLR and ROP attacks on ARM based Android devices. Our changes do not interfere with the normal functioning of the Android device and can be easily incorporated as a secure replacement for the existing Zygote that is presently exposed to a vast number of ASLR bypassing vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Drake, J.: Stagefright: scary code in the heart of Android. BlackHat USA, August 2015. Slides: https://www.blackhat.com/docs/us-15/materials/us-15-Drake-Stagefright-Scary-Code-In-The-Heart-Of-Android.pdf, video: https://www.youtube.com/watch?v=71YP65UANP0
Shacham, H., Page, M., Pfaff, B., Goh, E.-J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298–307. ACM (2004). http://www.hovav.net/dist/asrandom.pdf
Shacham, H.: The geometry of innocent flesh on the bone: return-into-LIBC without function calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 552–561. ACM (2007)
Kornau, T.: Return oriented programming for the ARM architecture. Master’s thesis, Ruhr-Universitat Bochum, Germany (2010). http://zynamics.com/downloads/kornau-tim-diplomarbeit-rop.pdf
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346–360. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-18178-8_30
Pappas, V., Polychronakis, M., Keromytis, A.D.: Transparent ROP exploit mitigation using indirect branch tracing. Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 2013), pp. 447–462 (2013)
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 559–572. ACM (2010). http://cseweb.ucsd.edu/~hovav/dist/noret-ccs.pdf
Backes, M., Bugiel, S., Schranz, O., von Styp-Rekowsky, P., Weisgerber, S.: ARTist: the Android runtime instrumentation and security toolkit. arXiv preprint arXiv:1607.06619 (2016)
Huang, Z., Zheng, T., Liu, J.: A dynamic detection method against ROP attack on ARM platform. In: Proceedings of the Second International Workshop on Software Engineering for Embedded Systems, pp. 51–57. IEEE Press (2012)
Lee, B., Lu, L., Wang, T., Kim, T., Lee, W.: From Zygote to Morula: fortifying weakened ASLR on Android. In: IEEE Symposium on Security and Privacy (2014)
Shetti, P.: Enhancing the security of Zygote/Morula in Android Lollipop. Master’s thesis, Amrita Vishwa Vidyapeetham, Ettimadai, Tamil Nadu, India, June 2015. Advisor: Prabhaker Mateti. http://cecs.wright.edu/~pmateti/Students/
Carlini, N., Wagner, D.: ROP is still dangerous: breaking modern defenses. In: USENIX Security, vol. 14 (2014)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Parikh, V., Mateti, P. (2017). ASLR and ROP Attack Mitigations for ARM-Based Android Devices. In: Thampi, S., MartÃnez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-6898-0_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6897-3
Online ISBN: 978-981-10-6898-0
eBook Packages: Computer ScienceComputer Science (R0)