{"title":"All your Root Checks are Belong to Us: The Sad State of Root Detection","authors":"Nathan S. Evans, Azzedine Benameur, Yun Shen","doi":"10.1145/2810362.2810364","DOIUrl":null,"url":null,"abstract":"In our research, most of our analysis was based on statically reverse engineering the applications. However we wanted to combine this with dynamic analysis to make sure our findings were correct and observable at runtime. For this, we initially created \"AndroPoser\". AndroPoser is a library we inject into Android processes leveraging a feature of the dynamic linker that allows us to transparently modify the runtime behavior of selected functions using LD_PRELOAD. This dynamic library interposition allowed us to hook functions and modify the data they manipulate and/or their return code. We realized that this could be used not only as a support tool for our analysis, but also to subdue any native code that checks for evidence of root access.","PeriodicalId":332932,"journal":{"name":"Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2810362.2810364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
In our research, most of our analysis was based on statically reverse engineering the applications. However we wanted to combine this with dynamic analysis to make sure our findings were correct and observable at runtime. For this, we initially created "AndroPoser". AndroPoser is a library we inject into Android processes leveraging a feature of the dynamic linker that allows us to transparently modify the runtime behavior of selected functions using LD_PRELOAD. This dynamic library interposition allowed us to hook functions and modify the data they manipulate and/or their return code. We realized that this could be used not only as a support tool for our analysis, but also to subdue any native code that checks for evidence of root access.