Abstract
Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted open source software stacks for smartphones is Android that comes with a strong security infrastructure for mobile devices. However, as with any remote platform, a service provider or device owner needs assurance that the device is in a trustworthy state before releasing sensitive information to it. Trusted Computing provides a mechanism of establishing such an assurance. Through remote attestation, tc allows a service provider or a device owner to determine whether the device is in a trusted state before releasing protected data to or storing private information on the phone. However, existing remote attestation techniques cannot be deployed on Android due to the unique, vm-based architecture of the software stack. In this paper, we present an attestation mechanism tailored specifically for Android that can measure the integrity of a device at two levels of granularity. Our approach allows a challenger to verify the integrity of Android not only at the operating system level but also that of code executing on top of the vm. We present the implementation details of our architecture and show through evaluation that our architecture is feasible both in terms of time complexity and battery consumption.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
PandaLabs: PandaLabs Q1 2008 report (2008), http://pandalabs.pandasecurity.com/blogs/images/PandaLabs/2008/04/01/Quarterly_Report_PandaLabs_Q1_2008.pdf
Gartner Research (2009) Press Release, http://www.gartner.com/it/page.jsp?id=985912
Google: Android Home Page (2009), http://www.android.com .
AdMob Mobile Metrics: Mobile Metrics Report (June 2009), http://metrics.admob.com/2009/07/june-2009-mobile-metrics-report/ .
Pearson, S.: Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2002)
TCG: Trusted Computing Group (2010), http://www.trustedcomputinggroup.org/
Zovi, D.A.D.: Advanced Mac OS X Rootkits. In: Black Hat Technical Security Conference USA (2009), https://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html
Miller, C., Mulliner, C.: Fuzzing the Phone in your Phone. In: Black Hat Technical Security Conference USA (2009), https://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html
Burns, J.: Exploratory Android Surgery. In: Black Hat Technical Security Conference USA (2009), https://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html
Evers, J.: Russian Phone Trojan Tries to Ring Up Charges – Zdnet Australia (2006), http://www.zdnet.com.au/news/security/soa/Russian-phone-Trojan-tries-to-ring-up-charges/0,130061744,139240795,00.htm
Google: Android Abstract ClassLoader (2009), http://developer.android.com/reference/java/lang/ClassLoader.html
Mobile Phone Work Group Mobile Trusted Module Overview Document, http://www.trustedcomputinggroup.org/resources/mobile_phone_work_group_mobile_trusted_module_overview_document
Strasser, M., Stamer, H., Molina, J.: Software-based TPM Emulator, http://tpm-emulator.berlios.de/
Ekberg, J., Kylaanpaa, M.: Mobile Trusted Module (MTM)–An Introduction (2007)
Ekberg, J.E., Bugiel, S.: Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments. In: STC 2009: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 9–18. ACM, New York (2009)
IAIK: About IAIK/OpenTC PrivacyCA (2010), http://trustedjava.sourceforge.net/index.php?item=pca/about .
Google: Android Market (2009), http://www.android.com/market.html .
Schmidt, A., Kuntze, N., Kasper, M.: On the deployment of Mobile Trusted Modules. Arxiv preprint arXiv:0712.2113 (2007)
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium (2004)
Oberheide, J.: A Look at a Modern Mobile Security Model: Google’s Android Platform. In: Annual CanSecWest Applied Security Conference (March 2009), http://jon.oberheide.org/research/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nauman, M., Khan, S., Zhang, X., Seifert, JP. (2010). Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform . In: Acquisti, A., Smith, S.W., Sadeghi, AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-13869-0_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13868-3
Online ISBN: 978-3-642-13869-0
eBook Packages: Computer ScienceComputer Science (R0)