4.6 Article

JNI Global References Are Still Vulnerable: Attacks and Defenses

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.2995542

关键词

Java; Androids; Humanoid robots; Smart phones; Google; Tools; Computer crashes; JNI global reference; Android; DoS attack; JGRE

资金

  1. National Natural Science Foundation of China [61872438, U1736209, 61572278]
  2. Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang [2018R01005]
  3. Zhejiang Key RD [2019C03133]

向作者/读者索取更多资源

This article investigates the vulnerabilities in system services and resources in Android, particularly the issue of denial-of-service attacks caused by the exhaustion of JNI global references (JGR). Through analysis and tool development, multiple vulnerabilities were discovered in different Android versions, and a new defense method was proposed.
System services and resources in Android are accessed through IPC-based mechanisms. Previous research has demonstrated that they are vulnerable to the denial-of-service attack (DoS attack). For instance, the JNI global reference (JGR), which is widely used by system services, can be exhausted to cause the system reboot (hence the name JGRE attack). Even though the Android team tries to fix the problem by enforcing security checks, we find that it is still possible to construct a JGR exhaustion DoS attack in the latest Android system. In this article, we propose a new JGR exhaustion DoS attack, which is effective in different Android versions, including the latest one (i.e., Android 10). Specifically, we developed JGREAnalyzer, a tool that can systematically detect JGR vulnerable services APIs via a call graph analysis and a forwarding reachability analysis. We applied this tool to different Android versions and found multiple vulnerabilities. In particular, among 148 system services in Android 10, 12 of them have 21 vulnerabilities. Among them, 9 can be successfully exploited without any permissions. We further analyze the root cause of the vulnerabilities and propose a new defense to mitigate the JGRE attack by restricting resource consumption via global reference counting.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据