Skip to main content

Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11334))

  • 1480 Accesses

Abstract

People can obtain the highest privileges and control devices by Android root. However, an Android phone has been rooted, it is difficult for the user to update the Android system. Aiming at these problems, this paper proposes a maintaining root via custom Android kernel across Over-The-Air (OTA) upgrade. By customizing the kernel in boot and recovery, the boot will be replaced with rooted boot after updating automatically, so that system not only can be updated successfully but also maintain root. Experiments show that there is no abnormal between rooted mobile with a customized kernel and normal mobile during a minor system update.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gasparis, I., Qian, Z., Song, C., Krishnamurthy, S.V.: Detecting android root exploits by learning from root providers. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1129–1144. USENIX Association (2017)

    Google Scholar 

  2. Kapoor, R., Agarwal, S.: Sustaining superior performance in business ecosystems: evidence from application software developers in the iOS and android smartphone ecosystems. Organ. Sci. 28(3), 531–551 (2017)

    Article  Google Scholar 

  3. Jo, H.J., Choi, W., Na, S.Y., Woo, S., Lee, D.H.: Vulnerabilities of android OS-based telematics system. Wirel. Pers. Commun. 92(4), 1511–1530 (2017)

    Article  Google Scholar 

  4. SuperSU. https://play.google.com/store/apps/details?id=eu.chainfire.supersu&hl=en_US. Accessed 30 May 2018

  5. FlashFire. https://forum.xda-developers.com/general/paid-software/flashfire-t3075433. Accessed 30 May 2018

  6. Salehi, M., Daryabar, F., Tadayon, M.H.: Welcome to binder: a kernel level attack model for the binder in android operating system. In: 2016 8th International Symposium on Telecommunications (IST), pp. 156–161. IEEE (2016)

    Google Scholar 

  7. Guri, M., Poliak, Y., Shapira, B., Elovici, Y.: JoKER: trusted detection of kernel rootkits in android devices via JTAG interface. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 65–73. IEEE (2015)

    Google Scholar 

  8. Zhu, R., Tan, Y.-A., Zhang, Q., Li, Y., Zheng, J.: Determining image base of firmware for ARM devices by matching literal pools. Digit. Invest. 16, 19–28 (2016)

    Article  Google Scholar 

  9. Ju, M., Kim, H., Kang, M., Kim, S.: Efficient memory reclaiming for mitigating sluggish response in mobile devices. In: 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), pp. 232–236. IEEE (2015)

    Google Scholar 

  10. Chen, W., Xu, L., Li, G., Xiang, Y.: A lightweight virtualization solution for android devices. IEEE Trans. Comput. 64(10), 2741–2751 (2015)

    Article  MathSciNet  Google Scholar 

  11. Zhang, X., Tan, Y.-A., Zhang, C., Xue, Y., Li, Y., Zheng, J.: A code protection scheme by process memory relocation for android devices. Multimedia Tools Appl. 77(9), 11137–11157 (2018)

    Article  Google Scholar 

  12. Xue, Y., Zhang, X., Yu, X., Zhang, Y., Tan, Y.-A., Li, Y.: Isolating host environment by booting android from OTG devices. Chin. J. Electron. 27(3), 617–624 (2018)

    Article  Google Scholar 

  13. Samsung Odin. https://samsungodin.com/. Accessed 30 May 2018

  14. Tan, Y.-A., et al.: A root privilege management scheme with revocable authorization for android devices. J. Netw. Comput. Appl. 107(4), 69–82 (2018)

    Article  Google Scholar 

  15. TWRP. https://twrp.me/. Accessed 30 May 2018

  16. Corral, L., Georgiev, A.B., Janes, A., Kofler, S.: Energy-aware performance evaluation of android custom kernels. In: 2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software (GREENS), pp. 1–7. IEEE (2015)

    Google Scholar 

  17. Zhu, R., Zhang, B., Mao, J., Zhang, Q., Tan, Y.-A.: A methodology for determining the image base of ARM-based industrial control system firmware. Int. J. Crit. Infrastruct. Prot. 16(3), 26–35 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by The Fundamental Research Funds for Beijing Universities of Civil Engineering and Architecture (Response by ZhangYu), and also Excellent Teachers Development Foundation of BUCEA (Response by ZhangYu), and also National Key R&D Program of China (No. 2016YFC060090).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Qikun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zucheng, H., Lu, L., Yuanzhang, L., Yu, Z., Qikun, Z. (2018). Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade. In: Vaidya, J., Li, J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11334. Springer, Cham. https://doi.org/10.1007/978-3-030-05051-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05051-1_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05050-4

  • Online ISBN: 978-3-030-05051-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics