Cargando…

An Android Inline Hooking Framework for the Securing Transmitted Data

Information leaks can occur through many Android applications, including unauthorized access to sensors data. Hooking is an important technique for protecting Android applications and add security features to them even without its source code. Various hooking frameworks are developed to intercept ev...

Descripción completa

Detalles Bibliográficos
Autores principales: Tan, Yu-an, Feng, Shuo, Cheng, Xiaochun, Li, Yuanzhang, Zheng, Jun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7435958/
https://www.ncbi.nlm.nih.gov/pubmed/32731597
http://dx.doi.org/10.3390/s20154201
_version_ 1783572443333394432
author Tan, Yu-an
Feng, Shuo
Cheng, Xiaochun
Li, Yuanzhang
Zheng, Jun
author_facet Tan, Yu-an
Feng, Shuo
Cheng, Xiaochun
Li, Yuanzhang
Zheng, Jun
author_sort Tan, Yu-an
collection PubMed
description Information leaks can occur through many Android applications, including unauthorized access to sensors data. Hooking is an important technique for protecting Android applications and add security features to them even without its source code. Various hooking frameworks are developed to intercept events and process their own specific events. The hooking tools for Java methods are varied, however, the native hook has few methods. Besides, the commonly used Android hook frameworks cannot meet the requirement of hooking the native methods in shared libraries on non-root devices. Even though some approaches are able to hook these methods, they have limitations or are complicated to implement. In the paper, a feasible hooking approach for Android native methods is proposed and implemented, which does not need any modifications to both the Android framework and app’s code. In this approach, the method’s reference address is modified and control flow is redirected. Beyond that, this study combines this approach with VirtualXposed which aims to run it without root privileges. This hooking framework can be used to enforce security policies and monitor sensitive methods in shared objects. The evaluation of the scheme demonstrates its capability to perform hook operation without a significant runtime performance overhead on real devices and it is compatible and functional for the native hook.
format Online
Article
Text
id pubmed-7435958
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-74359582020-08-24 An Android Inline Hooking Framework for the Securing Transmitted Data Tan, Yu-an Feng, Shuo Cheng, Xiaochun Li, Yuanzhang Zheng, Jun Sensors (Basel) Article Information leaks can occur through many Android applications, including unauthorized access to sensors data. Hooking is an important technique for protecting Android applications and add security features to them even without its source code. Various hooking frameworks are developed to intercept events and process their own specific events. The hooking tools for Java methods are varied, however, the native hook has few methods. Besides, the commonly used Android hook frameworks cannot meet the requirement of hooking the native methods in shared libraries on non-root devices. Even though some approaches are able to hook these methods, they have limitations or are complicated to implement. In the paper, a feasible hooking approach for Android native methods is proposed and implemented, which does not need any modifications to both the Android framework and app’s code. In this approach, the method’s reference address is modified and control flow is redirected. Beyond that, this study combines this approach with VirtualXposed which aims to run it without root privileges. This hooking framework can be used to enforce security policies and monitor sensitive methods in shared objects. The evaluation of the scheme demonstrates its capability to perform hook operation without a significant runtime performance overhead on real devices and it is compatible and functional for the native hook. MDPI 2020-07-28 /pmc/articles/PMC7435958/ /pubmed/32731597 http://dx.doi.org/10.3390/s20154201 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tan, Yu-an
Feng, Shuo
Cheng, Xiaochun
Li, Yuanzhang
Zheng, Jun
An Android Inline Hooking Framework for the Securing Transmitted Data
title An Android Inline Hooking Framework for the Securing Transmitted Data
title_full An Android Inline Hooking Framework for the Securing Transmitted Data
title_fullStr An Android Inline Hooking Framework for the Securing Transmitted Data
title_full_unstemmed An Android Inline Hooking Framework for the Securing Transmitted Data
title_short An Android Inline Hooking Framework for the Securing Transmitted Data
title_sort android inline hooking framework for the securing transmitted data
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7435958/
https://www.ncbi.nlm.nih.gov/pubmed/32731597
http://dx.doi.org/10.3390/s20154201
work_keys_str_mv AT tanyuan anandroidinlinehookingframeworkforthesecuringtransmitteddata
AT fengshuo anandroidinlinehookingframeworkforthesecuringtransmitteddata
AT chengxiaochun anandroidinlinehookingframeworkforthesecuringtransmitteddata
AT liyuanzhang anandroidinlinehookingframeworkforthesecuringtransmitteddata
AT zhengjun anandroidinlinehookingframeworkforthesecuringtransmitteddata
AT tanyuan androidinlinehookingframeworkforthesecuringtransmitteddata
AT fengshuo androidinlinehookingframeworkforthesecuringtransmitteddata
AT chengxiaochun androidinlinehookingframeworkforthesecuringtransmitteddata
AT liyuanzhang androidinlinehookingframeworkforthesecuringtransmitteddata
AT zhengjun androidinlinehookingframeworkforthesecuringtransmitteddata