Experimenting with system and Libc call interception attacks on ARM-based Linux kernel

  • Authors:
  • Hyeong-chan Lee;Chung Hui Kim;Jeong Hyun Yi

  • Affiliations:
  • Soongsil University, Seoul, South Korea;Soongsil University, Seoul, South Korea;Soongsil University, Seoul, South Korea

  • Venue:
  • Proceedings of the 2011 ACM Symposium on Applied Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Linux is one of the highly portable operating systems for embedded systems such as tablet PC. Recently it has been used for a smartphone operating system based on ARM processor. In ×86-based Linux, system call and standard library interception attacks using a Loadable Kernel Module (LKM) have been reported. Those attacks are usually used so that the attacker sets up a backdoor or makes a rootkit with root privilege. In this paper, we report that those attacks also are available in an ARM-based Linux which is popularly adopted for smartphone OS including Android. We also implement those attacks on Maemo platform on Nokia N900, show their empirical results, and then discuss some countermeasures thereof.