Affiliation:
1. School of Computer Science, National University of Defence Technology, Changsha 410073, China
Abstract
The root privilege escalation attack is extremely destructive to the security of the Android system. SEAndroid implements mandatory access control to the system through the SELinux security policy at the kernel mode, making the general root privilege escalation attacks unenforceable. However, malicious attackers can exploit the Linux kernel vulnerability of privilege escalation to modify the SELinux security labels of the process arbitrarily to obtain the desired permissions and undermine system security. Therefore, investigating the protection method of the security labels in the SELinux kernel is urgent. And the impact on the existing security configuration of the system must also be reduced. This paper proposes an optimization scheme of the SELinux mechanism based on security label randomization to solve the aforementioned problem. At the system runtime, the system randomizes the mapping of the security labels inside and outside the kernel to protect the privileged security labels of the system from illegal obtainment and tampering by attackers. This method is transparent to users; therefore, users do not need to modify the existing system security configuration. A tamper-proof detection method of SELinux security label is also proposed to further improve the security of the method. It detects and corrects the malicious tampering behaviors of the security label in the critical process of the system timely. The above methods are implemented in the Linux system, and the effectiveness of security defense is proven through theoretical analysis and experimental verification. Numerous experiments show that the effect of this method on system performance is less than 1%, and the success probability of root privilege escalation attack is less than 10−9.
Funder
National Key Technologies Research and Development Program
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference35 articles.
1. Android and security;H. Lockheimer,2012
2. RiskRanker: scalable and accurate zero-day android malware detection;M. Grace,2012
3. EASEAndroid: automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning;R. Wang;USENIX Security,2015
4. Understanding Android Security
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
2. SELinux-based operating system security research;Second International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2023);2023-08-23
3. Agile Approach on the Performance Prediction of ARM TrustZone-based Mandatory Access Control Security Enhancement;2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2021-09