4.6 Article

JNI Global References Are Still Vulnerable: Attacks and Defenses

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.2995542

Keywords

Java; Androids; Humanoid robots; Smart phones; Google; Tools; Computer crashes; JNI global reference; Android; DoS attack; JGRE

Funding

  1. National Natural Science Foundation of China [61872438, U1736209, 61572278]
  2. Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang [2018R01005]
  3. Zhejiang Key RD [2019C03133]

Ask authors/readers for more resources

This article investigates the vulnerabilities in system services and resources in Android, particularly the issue of denial-of-service attacks caused by the exhaustion of JNI global references (JGR). Through analysis and tool development, multiple vulnerabilities were discovered in different Android versions, and a new defense method was proposed.
System services and resources in Android are accessed through IPC-based mechanisms. Previous research has demonstrated that they are vulnerable to the denial-of-service attack (DoS attack). For instance, the JNI global reference (JGR), which is widely used by system services, can be exhausted to cause the system reboot (hence the name JGRE attack). Even though the Android team tries to fix the problem by enforcing security checks, we find that it is still possible to construct a JGR exhaustion DoS attack in the latest Android system. In this article, we propose a new JGR exhaustion DoS attack, which is effective in different Android versions, including the latest one (i.e., Android 10). Specifically, we developed JGREAnalyzer, a tool that can systematically detect JGR vulnerable services APIs via a call graph analysis and a forwarding reachability analysis. We applied this tool to different Android versions and found multiple vulnerabilities. In particular, among 148 system services in Android 10, 12 of them have 21 vulnerabilities. Among them, 9 can be successfully exploited without any permissions. We further analyze the root cause of the vulnerabilities and propose a new defense to mitigate the JGRE attack by restricting resource consumption via global reference counting.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available