Security Issues in Android Custom ROM’s

c0c0n 2011

07 October 2011

Talk: Security Issues in Android Custom ROM’s

Abstract

Android is one of the fastest growing mobile operating system from google has caught large amount of developer attention due to its open nature. We see large amount of community developers working on Custom aftermarket ROM’s and various stats suggest people using the stock OS is far less then the custom ROM users. Some of the Major Custom ROM makers Include Cyanogen and MIUI. This talk will focus on generic approaches taken by custom rom developers and number of security issues arising due to this. Along with ways and means to make sure the user remains secured. we will also be launching a custom application checking all these settings and suggesting action you need to take to get back to secure state.

Slides

Whitepaper

This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.

https://anantshri.info/articles/android_cust_rom_security.html

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation examines the security risks inherent in Android custom ROMs, covering common misconfigurations found in aftermarket firmware and demonstrating a proof-of-concept data theft tool.

Key Topics Covered

Custom ROM Ecosystem:

Why Security Review is Needed:

Security Issues Identified:

Proof-of-Concept Tool:

Protection Recommendations:

Actionable Takeaways

  1. Custom ROMs introduce multiple security risks through misconfigurations
  2. Root mode via ADB combined with WiFi access creates critical attack surface
  3. Permissive file system permissions on /system enable persistent malware
  4. Organizations should perform security audits before approving custom ROMs for corporate use
  5. Users should verify ROM security settings before installation