On return oriented programming threats in Android runtime
Android has taken a large share of operating systems forsmart devices including smartphones, and has been an attractive target to theattackers. The arms race between attackers and defenders typically occurs ontwo front lines — the latest attacking technology and the latest updates to theoperating sy...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4023 https://ink.library.smu.edu.sg/context/sis_research/article/5025/viewcontent/pst17__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5025 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-50252018-05-28T03:57:26Z On return oriented programming threats in Android runtime RAJA, Akshaya Venkateswara LEE, Jehyun GAO, Debin Android has taken a large share of operating systems forsmart devices including smartphones, and has been an attractive target to theattackers. The arms race between attackers and defenders typically occurs ontwo front lines — the latest attacking technology and the latest updates to theoperating system (including defense mechanisms deployed). In terms of attackingtechnology, Return-Oriented Programming (ROP) is one of the most sophisticatedattack methods on Android devices. In terms of the operating system updates,Android Runtime (ART) was the latest and biggest change to the Android family.In this paper, we investigate the extent to which Android Runtime (ART) makesReturn-Oriented Programming (ROP) attacks easier or more difficulty. Inparticular, we show that by updating system libraries and adoptingAhead-of-Time compiling instead of Justin-Time compiling in the ARTarchitecture, a larger number and more diverse gadgets are disclosed to ROPattackers, which serve as direct ingredients to ROP attacks. We show thatbetween three and six times more gadgets are found on the ART adopted versionsof Android due to the new ART runtime. Moreover, in constrained situationswhere an attacker requires specific instructions and target registers, Androidrunning ART provides up to 30% more conditional coverage than pre-ART Androiddoes. We additionally demonstrate a sample ROP attack on postART Android thatwould not have been possible on pre-ART Android. 2017-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4023 info:doi/10.1109/PST.2017.00038 https://ink.library.smu.edu.sg/context/sis_research/article/5025/viewcontent/pst17__1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Android Runtime Return-Oriented Programming Software attacks Information Security OS and Networks |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Android Runtime Return-Oriented Programming Software attacks Information Security OS and Networks |
spellingShingle |
Android Runtime Return-Oriented Programming Software attacks Information Security OS and Networks RAJA, Akshaya Venkateswara LEE, Jehyun GAO, Debin On return oriented programming threats in Android runtime |
description |
Android has taken a large share of operating systems forsmart devices including smartphones, and has been an attractive target to theattackers. The arms race between attackers and defenders typically occurs ontwo front lines — the latest attacking technology and the latest updates to theoperating system (including defense mechanisms deployed). In terms of attackingtechnology, Return-Oriented Programming (ROP) is one of the most sophisticatedattack methods on Android devices. In terms of the operating system updates,Android Runtime (ART) was the latest and biggest change to the Android family.In this paper, we investigate the extent to which Android Runtime (ART) makesReturn-Oriented Programming (ROP) attacks easier or more difficulty. Inparticular, we show that by updating system libraries and adoptingAhead-of-Time compiling instead of Justin-Time compiling in the ARTarchitecture, a larger number and more diverse gadgets are disclosed to ROPattackers, which serve as direct ingredients to ROP attacks. We show thatbetween three and six times more gadgets are found on the ART adopted versionsof Android due to the new ART runtime. Moreover, in constrained situationswhere an attacker requires specific instructions and target registers, Androidrunning ART provides up to 30% more conditional coverage than pre-ART Androiddoes. We additionally demonstrate a sample ROP attack on postART Android thatwould not have been possible on pre-ART Android. |
format |
text |
author |
RAJA, Akshaya Venkateswara LEE, Jehyun GAO, Debin |
author_facet |
RAJA, Akshaya Venkateswara LEE, Jehyun GAO, Debin |
author_sort |
RAJA, Akshaya Venkateswara |
title |
On return oriented programming threats in Android runtime |
title_short |
On return oriented programming threats in Android runtime |
title_full |
On return oriented programming threats in Android runtime |
title_fullStr |
On return oriented programming threats in Android runtime |
title_full_unstemmed |
On return oriented programming threats in Android runtime |
title_sort |
on return oriented programming threats in android runtime |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/4023 https://ink.library.smu.edu.sg/context/sis_research/article/5025/viewcontent/pst17__1_.pdf |
_version_ |
1770574133894053888 |