Cocon Security Issues In Android Custom Roms

c0c0n 2011 Goa, India
1 / 23
Slide 1 of Cocon Security Issues In Android Custom Roms
Slide 2 of Cocon Security Issues In Android Custom Roms
Slide 3 of Cocon Security Issues In Android Custom Roms
Slide 4 of Cocon Security Issues In Android Custom Roms
Slide 5 of Cocon Security Issues In Android Custom Roms
Slide 6 of Cocon Security Issues In Android Custom Roms
Slide 7 of Cocon Security Issues In Android Custom Roms
Slide 8 of Cocon Security Issues In Android Custom Roms
Slide 9 of Cocon Security Issues In Android Custom Roms
Slide 10 of Cocon Security Issues In Android Custom Roms
Slide 11 of Cocon Security Issues In Android Custom Roms
Slide 12 of Cocon Security Issues In Android Custom Roms
Slide 13 of Cocon Security Issues In Android Custom Roms
Slide 14 of Cocon Security Issues In Android Custom Roms
Slide 15 of Cocon Security Issues In Android Custom Roms
Slide 16 of Cocon Security Issues In Android Custom Roms
Slide 17 of Cocon Security Issues In Android Custom Roms
Slide 18 of Cocon Security Issues In Android Custom Roms
Slide 19 of Cocon Security Issues In Android Custom Roms
Slide 20 of Cocon Security Issues In Android Custom Roms
Slide 21 of Cocon Security Issues In Android Custom Roms
Slide 22 of Cocon Security Issues In Android Custom Roms
Slide 23 of Cocon Security Issues In Android Custom Roms

Abstract

Examines the security risks inherent in Android custom ROMs, demonstrating common misconfigurations in aftermarket firmware and a proof-of-concept data theft tool.

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation examines the security risks inherent in Android custom ROMs, covering common misconfigurations found in aftermarket firmware and demonstrating a proof-of-concept data theft tool.

Key Topics Covered

Custom ROM Ecosystem:

  • Android ROM is the OS firmware layer consisting of kernel, Dalvik, libraries, framework, and vendor applications
  • Stock ROMs are pre-installed by manufacturers; custom ROMs are aftermarket versions not officially supported
  • Popular custom ROMs include CyanogenMod, MIUI (Chinese origin, mimics iPhone), and OMFGB
  • Sources include cyanogenmod.com, miui.org, XDA Developers, and various underground forums
  • ROM cookers create custom versions for fun, profit, or the “they can” attitude

Why Security Review is Needed:

  • Android malware and exploits are increasing rapidly
  • Employees pressure organizations to integrate Android into corporate infrastructure
  • CyanogenMod is considered a viable corporate alternative, but security has not been thoroughly evaluated
  • Custom ROMs may contain undisclosed modifications

Security Issues Identified:

  • USB Debugging Enabled: ADB allows file push/pull, system partition remount, silent software installation, and fastboot with different kernels
  • ADB Shell Root Mode: Special setting making ADB run as root, activated at boot time via build.prop in boot image ramdisk
  • ADB Shell over WiFi: Allows ADB access over wireless network, combining with root mode effectively hands over the device
  • System Permissions: /system should be read-only, but many ROM cookers set 777 permissions, opening doors for rootkits, trojans, and malware
  • Unknown Source Installation: Custom ROM forums encourage enabling unknown sources, bypassing Android Market restrictions
  • SU Access: Switch user binary indicates rooted device; default protection from unauthorized execution is limited to Superuser.apk
  • Custom Recovery Images: Provide unrestricted root access by default; entering recovery mode is trivially easy

Proof-of-Concept Tool:

  • Demonstrated a data theft tool targeting these vulnerabilities
  • Intentionally not developed to full extent to avoid script kiddie misuse

Protection Recommendations:

  • Developers: Avoid unnecessary settings for normal users, recommend closing unknown source settings
  • Users: Examine development processes, ask questions, run security audit tools (“Are You Insecure” tool demonstrated)

Actionable Takeaways

  1. Custom ROMs introduce multiple security risks through misconfigurations
  2. Root mode via ADB combined with WiFi access creates critical attack surface
  3. Permissive file system permissions on /system enable persistent malware
  4. Organizations should perform security audits before approving custom ROMs for corporate use
  5. Users should verify ROM security settings before installation

Embed This Presentation

See Also

mobile android