TY - CHAP
T1 - Detecting android kernel rootkits via JTAG memory introspection
AU - Guri, Mordechai
AU - Poliak, Yuri
AU - Shapira, Bracha
AU - Elovici, Yuval
N1 - Publisher Copyright:
© 2018 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business.
PY - 2017/1/1
Y1 - 2017/1/1
N2 - Smartphones and tablets have become prime targets for malware, due to the valuable personal and corporate information they hold. While antivirus (AV) programs may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that are able to evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism running on the same physical device as the monitored OS can be compromised via application, kernel, or bootloader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task. We present a system aimed at detecting rootkits in the Android kernel, utilizing the hardware’s Joint Test Action Group (JTAG) interface for trusted memory forensics and OS introspection. Our framework consists of components that extract areas of a kernel’s memory and reconstruct it for further analysis. We present the overall architecture, along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG’s main purpose is system testing, it can also be used for malware detection where traditional methods fail.
AB - Smartphones and tablets have become prime targets for malware, due to the valuable personal and corporate information they hold. While antivirus (AV) programs may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that are able to evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism running on the same physical device as the monitored OS can be compromised via application, kernel, or bootloader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task. We present a system aimed at detecting rootkits in the Android kernel, utilizing the hardware’s Joint Test Action Group (JTAG) interface for trusted memory forensics and OS introspection. Our framework consists of components that extract areas of a kernel’s memory and reconstruct it for further analysis. We present the overall architecture, along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG’s main purpose is system testing, it can also be used for malware detection where traditional methods fail.
UR - http://www.scopus.com/inward/record.url?scp=85052480245&partnerID=8YFLogxK
U2 - 10.1201/b21885-7
DO - 10.1201/b21885-7
M3 - Chapter
AN - SCOPUS:85052480245
SN - 9781138033573
SP - 165
EP - 186
BT - Intrusion Detection and Prevention for Mobile Ecosystems
PB - CRC Press
ER -