Browse > Article
http://dx.doi.org/10.14372/IEMEK.2016.11.6.335

A Study for Protecting the Virtual Memory of Applications  

Kim, Dong-Ryul (Korea University)
Moon, Jong-sub (Korea University)
Publication Information
Abstract
As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.
Keywords
Virtual memory protection; /proc/PID/mem; Ptrace system call; Android memory protection; Linux memory protection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://lxr.free-electrons.com/ident?v=3.18&i=mm_access
2 https://developer.android.com/ndk/index.html
3 https://developer.android.com/training/articles/perf-jni.html
4 A.S. Tanenabum, "Modern operating systems 3rd," Pearson, pp. 186-187, 2014.
5 http://koreajoongangdaily.joins.com/news/article /Article.aspx?aid=2983882
6 https://developer.android.com/studio/profile/ddm s.html
7 D. Apostolopoulos, G. Marinakis, C. Ntantogian, C. Xenakis, "Discovering authentication credentials in volatile memory of android mobile devices," Proceedings of Conference on International Federation for Information Processing, pp. 178-185, 2013.
8 I.N. Fovino, M. Taddeo, I. Kounelis, "In-memory credentials robbery on android phones," Proceedings of IEEE World Congress on Internet Security, pp. 88-93, 2013.
9 http://www.wechat.com/en/
10 F. Zhou, Y. Yang, Z. Ding, G. Sun, "Dump and analysis of android volatile memory on wechat," Proceedings of IEEE International Conference on Communications, pp. 7151-7156, 2015.
11 http://www.cheatengine.org/
12 https://gameguardian.net/forum/
13 http://sbgamehacker-apk.com/
14 http://man7.org/linux/man-pages/man2/ptrace.2.html
15 http://man7.org/linux/man-pages/man7/capabil ities.7.html
16 https://github.com/citypw/lcamtuf-memfetch
17 https://en.wikipedia.org/wiki/Android_(operatin g_system)
18 https://developer.android.com/studio/command-line/adb.html
19 http://lxr.free-electrons.com/ident?v=3.18&i=mem_open