andoid-4.4-security

2
Android KitKat Security Teardown: 4 Hits, 1 Miss Google sweetens Android with SELinux, plus anti-rootkit technology that makes life difficult for malware -- but also for Android modders. By Mathew J. Schwartz, InformationWeek November 05, 2013 URL: http://www.informationweek.com/security/mobile/android-kitkat-security-teardown-4-hits/240163560 Samsung's New Gadgets: Visual Tour (click image for larger view) The latest version of Google's Android operating system (version 4.4) -- known as "KitKat" and released last week -- includes a slew of changes: a streamlined footprint so it can run on devices with scant RAM, better animations and graphics acceleration, plus snappier device-wide search and a new phone dialer app. But what's new on the information security front? According to Google's developer overview, KitKat packs in "dozens of security enhancements to protect users" -- meaning bug fixes -- plus an experimental boot verification feature and better sandbox. Those features, plus the patches, have already been shared with handset manufacturers, carriers and the Android Open Source Project (AOSP). Based on teardowns of that code, here's a rundown of the Android security changes -- including why they're important, and what they'll offer users -- as well as one glaring omission: 1. Verified Boot Combats Rootkits Android 4.4 builds an optional -- and "experimental" -- verified-boot capability into the kernel. According to Google, the feature, dubbed device-mapper-verity (dm-verity), "helps prevent persistent rootkits that can hold onto root privileges and compromise devices." [ Do you think BYOD presents special security challenges? See It's Not 'Mobile Security,' It's Just Security. ] In particular, the feature can spot rootkits that have a more privileged access level than security tools, and which are thus able to fool those malware-detection programs. "The dm-verity feature lets you look at a block device, the underlying storage layer of the file system, and determine if it matches its expected configuration," according to Google. If the cryptographic hash of a program has changed, it means malware is likely at work. While this feature is great news for stopping malware, kernel-level file system integrity validation could make life difficult for Android modders. "By verifying the integrity of the device's file system at a low level via cryptography, rooting the phone becomes a thing of the past for most devices that come with a locked-down bootloader," according a study of Android 4.4 conducted by the Romanian information security firm BitDefender. "This means that alternative ROMs such as CyanogenMod, Paranoid Android or others will have a hard time getting on devices other than developer or Nexus ones running stock Android." 2. Android Sandbox Gets SELinux Boost Android 4.3 (Jelly Bean) saw the addition of the Linux security module known as security-enhanced Linux (SELinux), which was http://www.informationweek.com/security/mobile/android-kitkat-sec... 1 of 2 11/11/2013 10:41 PM

Upload: mihai-darstaru

Post on 16-Dec-2015

225 views

Category:

Documents


3 download

DESCRIPTION

Google sweetens Android with SELinux, plus anti-rootkit technology that makes life difficult for malware -- but alsofor Android modders.

TRANSCRIPT

  • Android KitKat Security Teardown: 4 Hits, 1 MissGoogle sweetens Android with SELinux, plus anti-rootkit technology that makes life difficult for malware -- but alsofor Android modders.By Mathew J. Schwartz, InformationWeekNovember 05, 2013URL: http://www.informationweek.com/security/mobile/android-kitkat-security-teardown-4-hits/240163560

    Samsung's New Gadgets: Visual Tour(click image for larger view)The latest version of Google's Android operating system (version 4.4) -- known as "KitKat" and released last week -- includes a slewof changes: a streamlined footprint so it can run on devices with scant RAM, better animations and graphics acceleration, plussnappier device-wide search and a new phone dialer app. But what's new on the information security front?

    According to Google's developer overview, KitKat packs in "dozens of security enhancements to protect users" -- meaning bug fixes-- plus an experimental boot verification feature and better sandbox. Those features, plus the patches, have already been sharedwith handset manufacturers, carriers and the Android Open Source Project (AOSP).Based on teardowns of that code, here's a rundown of the Android security changes -- including why they're important, and whatthey'll offer users -- as well as one glaring omission:

    1. Verified Boot Combats Rootkits

    Android 4.4 builds an optional -- and "experimental" -- verified-boot capability into the kernel. According to Google, the feature,dubbed device-mapper-verity (dm-verity), "helps prevent persistent rootkits that can hold onto root privileges and compromisedevices."

    [ Do you think BYOD presents special security challenges? See It's Not 'Mobile Security,' It's Just Security. ]In particular, the feature can spot rootkits that have a more privileged access level than security tools, and which are thus able to foolthose malware-detection programs. "The dm-verity feature lets you look at a block device, the underlying storage layer of the filesystem, and determine if it matches its expected configuration," according to Google. If the cryptographic hash of a program haschanged, it means malware is likely at work.

    While this feature is great news for stopping malware, kernel-level file system integrity validation could make life difficult for Androidmodders. "By verifying the integrity of the device's file system at a low level via cryptography, rooting the phone becomes a thing ofthe past for most devices that come with a locked-down bootloader," according a study of Android 4.4 conducted by the Romanianinformation security firm BitDefender. "This means that alternative ROMs such as CyanogenMod, Paranoid Android or others willhave a hard time getting on devices other than developer or Nexus ones running stock Android."

    2. Android Sandbox Gets SELinux Boost

    Android 4.3 (Jelly Bean) saw the addition of the Linux security module known as security-enhanced Linux (SELinux), which was

    http://www.informationweek.com/security/mobile/android-kitkat-sec...

    1 of 2 11/11/2013 10:41 PM

  • developed by the National Security Agency more than 10 years ago, and which allows a number of security policies -- includingaccess controls -- to be enforced in Linux.

    In Android 4.3, SELinux was available only in "permissive mode," meaning it was could only be used for logging purposes, rather thanpolicy enforcement. With Android 4.4, however, SELinux can be used in "enforcing" mode, meaning its use can be made mandatory.As a result, the module can be used "to prevent privilege escalation attacks such as an application gaining root privileges over thedevice, regardless of the application's permissions," according to BitDefender.

    3. Strong Crypto Improvements

    Android 4.4 now has certificate pinning, which Google said "detects and prevents the use of fraudulent Google certificates used insecure SSL/TLS communications." In addition, Android now flashes a warning "if any certificate has been added to the devicecertificate store that could allow monitoring of encrypted network traffic."

    Both features are designed to ensure that a digital certificate is the real deal -- not a fake planted to allow a third party to eavesdropon the device. "Long story short, if a digital certificate for a specific site has been fraudulently obtained by either breaking into the[certificate authority] or by just tricking them into issuing a new certificate on somebody else's behalf, Android will notify the user thatthe certificate's fingerprint does not match what Google has on record," according to BitDefender.

    But that security improvement may also make life difficult for intrusion detection systems. "This is a welcome mitigation againstman-in-the-middle attacks, but will also make traffic scanning via SSL more difficult for security solutions running in enterprises," saidBitDefender.

    4. Per-User VPN

    Another security improvement is the inclusion of a VPN which -- on multiuser devices, meaning tablets -- can be applied on aper-user basis. "This can allow a user to route all network traffic through a VPN without affecting other users on the device,"according to Google.

    But there is a caveat. "The downside is that -- from what we see with the AOSP build -- VPN settings are only available for the firsttablet user, while other users have to do without VPN at all," according to BitDefender.

    5. Finally, Individual App Permission Controls -- Not

    One notable omission from Android 4.4 was the promised ability to review the permissions being used by apps, and to revoke themon an app-by-app basis.

    "Back in Android 4.3, Android introduced a feature that was supposed to let users individually deny or allow permissions for everyapplication installed on the device," according to BitDefender. "The feature, buried inside an activity called App Ops, was somethingboth average users and security companies have been demanding for years and it would have been for sure nice to have itintroduced in KitKat."

    Now, however, App Ops appears to have been excised completely, following an Aug. 2, "completely remove app ops activity" changeto the Android code base made by Google.

    A Google spokeswoman didn't immediately respond to an emailed request for comment on the status of the App Ops feature.

    Numerous Security Upsides

    The uncertain status of App Ops notwithstanding, the KitKat security enhancements are good news for Android fans. As always,users of older Android devices may have to wait for weeks or months -- or forever, in the case of some particularly laggard carriersand manufacturers -- to see a KitKat update for their devices. But everyone else, including buyers of many new Android smartphonesand tablets, will get KitKat installed by default, and from a security standpoint, benefit accordingly.

    http://www.informationweek.com/security/mobile/android-kitkat-sec...

    2 of 2 11/11/2013 10:41 PM