DOI QR코드

DOI QR Code

A Study for Protecting the Virtual Memory of Applications

어플리케이션의 가상 메모리 보호를 위한 연구

  • Received : 2016.09.09
  • Accepted : 2016.10.12
  • Published : 2016.12.31

Abstract

As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

Keywords

References

  1. A.S. Tanenabum, "Modern operating systems 3rd," Pearson, pp. 186-187, 2014.
  2. http://koreajoongangdaily.joins.com/news/article /Article.aspx?aid=2983882
  3. https://developer.android.com/studio/profile/ddm s.html
  4. D. Apostolopoulos, G. Marinakis, C. Ntantogian, C. Xenakis, "Discovering authentication credentials in volatile memory of android mobile devices," Proceedings of Conference on International Federation for Information Processing, pp. 178-185, 2013.
  5. I.N. Fovino, M. Taddeo, I. Kounelis, "In-memory credentials robbery on android phones," Proceedings of IEEE World Congress on Internet Security, pp. 88-93, 2013.
  6. http://www.wechat.com/en/
  7. F. Zhou, Y. Yang, Z. Ding, G. Sun, "Dump and analysis of android volatile memory on wechat," Proceedings of IEEE International Conference on Communications, pp. 7151-7156, 2015.
  8. http://www.cheatengine.org/
  9. https://gameguardian.net/forum/
  10. http://sbgamehacker-apk.com/
  11. http://man7.org/linux/man-pages/man2/ptrace.2.html
  12. http://man7.org/linux/man-pages/man7/capabil ities.7.html
  13. https://github.com/citypw/lcamtuf-memfetch
  14. https://en.wikipedia.org/wiki/Android_(operatin g_system)
  15. https://developer.android.com/studio/command-line/adb.html
  16. http://lxr.free-electrons.com/ident?v=3.18&i=mem_open
  17. http://lxr.free-electrons.com/ident?v=3.18&i=mm_access
  18. https://developer.android.com/ndk/index.html
  19. https://developer.android.com/training/articles/perf-jni.html