The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix domain sockets have not been examined comprehensively, despite playing a crucial role in the IPC of highly privileged system daemons. In this paper, we propose SAUSAGE, an efficient novel static analysis framework to study the security properties of these sockets. SAUSAGE considers access control policies implemented in the Android security model, as well as authentication checks implemented by the daemon binaries. It is a fully static analysis framework, specifically designed to analyze Unix domain socket usage in Android system daemons, at scale. We use this framework to analyze 200 Android images across eight popular smartphone vendors spanning Android versions 7-9. As a result, we uncover multiple access control misconfigurations and insecure authentication checks. Our notable findings include a permission bypass in highly privileged Qualcomm system daemons and an unprotected socket that allows an untrusted app to set the scheduling priority of other processes running on the system, despite the implementation of mandatory SELinux policies. Ultimately, the results of our analysis are worrisome; all vendors except the Android Open Source Project (AOSP) have access control issues, allowing an untrusted app to communicate to highly privileged daemons through Unix domain sockets introduced by hardware manufacturer or vendor customization.
翻译:Android 操作系统目前是世界上最受欢迎的移动操作系统。 Android 操作系统目前是世界上最受欢迎的移动操作系统。 Android 以Linux 为基础, 因此继承了它的特征, 包括它的内部处理通信(IPC) 机制。 这些机制被程序用来相互沟通, 并被广泛用于Android 。 虽然对Android 专用的 IPC 机制进行了广泛的研究, 但Unix 域套接字系统还没有经过全面审查, 尽管它在IPC 中扮演了高度特权系统守护程序的关键角色。 在本文中, 我们提出 SAUSAGE, 一个高效的新颖的静态分析框架, 以研究这些保密的保密配置。 SAUSAGE 考虑在Android 安全模式中实施的访问控制政策, 以及由守护者执行的认证检查程序。 这是一个完全固定的分析框架, 专门用来分析Android 域的Unix 域内置系统使用Oral- sildroalalalal IM 系统。 我们使用了一个非保密的系统, IMelviewalalalalalalalal liction liction listal Appolding Produstration Apple 。