论文标题
Asvaan:Android NDK的半自动侧通道分析
ASVAAN: Semi-automatic side-channel analysis of Android NDK
论文作者
论文摘要
Android是智能手机最受欢迎的操作系统,也以其灵活性和安全性而闻名。但是,尽管总体上认为它非常安全,但偶尔仍然会发现一些漏洞,这些漏洞允许用户敏感信息绕过安全控制和边界:其中,如今的侧渠道漏洞是一个重大问题。尽管有几种类型的侧通道漏洞,但专注于API的漏洞仍然代表着一个值得探索的领域,到目前为止,该领域经常经过手动分析。仅在最近几年,由于操作系统的代码库的增加而创建了一些自动解决方案,这些解决方案专注于对Android的侧渠道缺陷进行自动扫描;但是,他们提出了一些局限性。 本文介绍了一种新的方法来发现Android NDK侧通道泄漏,从未通过使用自动或半自动解决方案来研究作者知识。工作中描述的方法允许在几个Android NDK功能中识别8个以上的新侧通道泄漏,这些函数允许通过精确的应用程序进行推断,并且网站在受害设备上启动。这些发现代表了Android NDK功能中第一个发现的侧通道泄漏,并负责任地向Google的Android安全团队披露。
Android is the most popular operating systems for smartphones and is also well-known for its flexibility and security. However, although it is overall considered very secure, there are still some vulnerabilities occasionally discovered that allow getting user sensitive information bypassing security controls and boundaries: among these, side-channel vulnerabilities are a significant concern these days. Although there are several types of side-channel vulnerabilities, ones focused on APIs still represent a great area to explore, which, until now, has often been analysed manually. Only in the latest years, there have been published some automatic solutions which focus on performing automatic scanning of side-channel flaws in Android, created due to the increasing codebase of the operating system; however, they present some limitations. This paper introduces a new approach to discover Android NDK side-channel leaks, which at the best of the author knowledge have never been investigated through the usage of automatic or semi-automatic solutions. The approach described in the work, allowed to identify more than 8 new side-channel leaks in several Android NDK functions,which permitted to infer with great accuracy application and websites launches on a victim device. The findings represents the first discovered side-channel leaks in Android NDK functions, and were responsibly disclosed to the Android Security Team of Google.