PtmxGuard: An Improved Method for Android Kernel to Prevent Privilege Escalation Attack

  • Kong B
  • Li Y
  • Ma L
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Vulnerabilities in Android kernel give opportunity for attacker to damage the system. Privilege escalation is one of the most dangerous attacks, as it helps attacker to gain root privilege by exploiting kernel vulnerabilities. Mitigation technologies, static detection methods and dynamic defense methods have been suggested to prevent privilege escalation attack, but they still have some disadvantages. In this paper, we propose an improved method named PtmxGuard to enhance Android kernel and defeat privilege escalation attack. We focus on a typical attack pattern that attacker hijacks the control flow of Android kernel to modify process credentials by corrupting critical global function pointers. PtmxGuard enforces Code Pointer Integrity to Android kernel, checks the accuracy and reliability of those pointers when they're triggered by related system calls, and intercepts the system calls when attack activities are detected. Experiment result demonstrates that PtmxGuard can defense privilege escalation attack effectively.

Cite

CITATION STYLE

APA

Kong, B., Li, Y., & Ma, L.-P. (2017). PtmxGuard: An Improved Method for Android Kernel to Prevent Privilege Escalation Attack. ITM Web of Conferences, 12, 05010. https://doi.org/10.1051/itmconf/20171205010

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free