Android Binder Security Note

نویسنده

  • Tomáš Rosa
چکیده

This memo describes certain details of the Android mechanism of passing binder through another binder. The aim of this paper is to describe certain technical details of this mechanism as well as to point out some obvious security weaknesses. For the sake of simplicity, we do not include description of the whole Android binder framework here. The interested reader may check the OpenBinder documentation by Dianne K. Hackborn that is still available in [1]. Despite it not being compatible with the Android binder framework, a lot of OpenBinder general ideas seem to still apply.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Context-Aware Kernel IPC Firewall for Android

Our phones go wherever we go. Ever present, and with ever more data and connections, smartphones hold as much sensitive data as traditional systems but do not have the same protections. Android’s recent 6.0 (Marshmallow) release introduced much needed dynamic permission checks for applications. However, this does not go far enough in adapting to mobile phone’s unique security needs. Smartphones...

متن کامل

BinderCracker: Assessing the Robustness of Android System Services

In Android, communications between apps and system services are supported by a transaction-based InterProcess Communication (IPC) mechanism. Binder, as the cornerstone of this IPC mechanism, separates two communicating parties as client and server. As with any client–server model, the server should not make any assumption on the validity (sanity) of client-side transaction. To our surprise, we ...

متن کامل

STAB Fuzzing: A Study of Android’s Binder IPC and Linux/Android Fuzzing

This paper focuses on describing the necessary background to begin working with Binder: Android’s Interprocess Communication (IPC) mechanism, and Linux/Android system call (“syscall”) fuzzing tools. The objective was to study Android and Binder along with system call fuzzing in order to learn more about Android, Binder IPC, and vulnerability detection and analysis. Our study was further concent...

متن کامل

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices

It is becoming a global trend for company employees equipped with mobile devices to access company’s assets. Besides enterprise apps, lots of personal apps from various untrusted app stores may also be installed on those devices. To secure the business environment, policy enforcement on what, how, and when certain apps can access system resources is required by enterprise IT. However, Android, ...

متن کامل

Android Application Development & Its Security

In this paper we will look at the Android platform and Android based mobile application development & its security. Further we will look to explore an Android application available in google play store My Notepad. This application is used to save notes by using easy direct manipulation. It is featured with functions as Voice Navigation and Voice Based Searching, it requires internet connection ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011