Abstract
People can obtain the highest privileges and control devices by Android root. However, an Android phone has been rooted, it is difficult for the user to update the Android system. Aiming at these problems, this paper proposes a maintaining root via custom Android kernel across Over-The-Air (OTA) upgrade. By customizing the kernel in boot and recovery, the boot will be replaced with rooted boot after updating automatically, so that system not only can be updated successfully but also maintain root. Experiments show that there is no abnormal between rooted mobile with a customized kernel and normal mobile during a minor system update.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gasparis, I., Qian, Z., Song, C., Krishnamurthy, S.V.: Detecting android root exploits by learning from root providers. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1129–1144. USENIX Association (2017)
Kapoor, R., Agarwal, S.: Sustaining superior performance in business ecosystems: evidence from application software developers in the iOS and android smartphone ecosystems. Organ. Sci. 28(3), 531–551 (2017)
Jo, H.J., Choi, W., Na, S.Y., Woo, S., Lee, D.H.: Vulnerabilities of android OS-based telematics system. Wirel. Pers. Commun. 92(4), 1511–1530 (2017)
SuperSU. https://play.google.com/store/apps/details?id=eu.chainfire.supersu&hl=en_US. Accessed 30 May 2018
FlashFire. https://forum.xda-developers.com/general/paid-software/flashfire-t3075433. Accessed 30 May 2018
Salehi, M., Daryabar, F., Tadayon, M.H.: Welcome to binder: a kernel level attack model for the binder in android operating system. In: 2016 8th International Symposium on Telecommunications (IST), pp. 156–161. IEEE (2016)
Guri, M., Poliak, Y., Shapira, B., Elovici, Y.: JoKER: trusted detection of kernel rootkits in android devices via JTAG interface. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 65–73. IEEE (2015)
Zhu, R., Tan, Y.-A., Zhang, Q., Li, Y., Zheng, J.: Determining image base of firmware for ARM devices by matching literal pools. Digit. Invest. 16, 19–28 (2016)
Ju, M., Kim, H., Kang, M., Kim, S.: Efficient memory reclaiming for mitigating sluggish response in mobile devices. In: 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), pp. 232–236. IEEE (2015)
Chen, W., Xu, L., Li, G., Xiang, Y.: A lightweight virtualization solution for android devices. IEEE Trans. Comput. 64(10), 2741–2751 (2015)
Zhang, X., Tan, Y.-A., Zhang, C., Xue, Y., Li, Y., Zheng, J.: A code protection scheme by process memory relocation for android devices. Multimedia Tools Appl. 77(9), 11137–11157 (2018)
Xue, Y., Zhang, X., Yu, X., Zhang, Y., Tan, Y.-A., Li, Y.: Isolating host environment by booting android from OTG devices. Chin. J. Electron. 27(3), 617–624 (2018)
Samsung Odin. https://samsungodin.com/. Accessed 30 May 2018
Tan, Y.-A., et al.: A root privilege management scheme with revocable authorization for android devices. J. Netw. Comput. Appl. 107(4), 69–82 (2018)
TWRP. https://twrp.me/. Accessed 30 May 2018
Corral, L., Georgiev, A.B., Janes, A., Kofler, S.: Energy-aware performance evaluation of android custom kernels. In: 2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software (GREENS), pp. 1–7. IEEE (2015)
Zhu, R., Zhang, B., Mao, J., Zhang, Q., Tan, Y.-A.: A methodology for determining the image base of ARM-based industrial control system firmware. Int. J. Crit. Infrastruct. Prot. 16(3), 26–35 (2017)
Acknowledgement
This work was supported by The Fundamental Research Funds for Beijing Universities of Civil Engineering and Architecture (Response by ZhangYu), and also Excellent Teachers Development Foundation of BUCEA (Response by ZhangYu), and also National Key R&D Program of China (No. 2016YFC060090).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zucheng, H., Lu, L., Yuanzhang, L., Yu, Z., Qikun, Z. (2018). Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade. In: Vaidya, J., Li, J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11334. Springer, Cham. https://doi.org/10.1007/978-3-030-05051-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-05051-1_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05050-4
Online ISBN: 978-3-030-05051-1
eBook Packages: Computer ScienceComputer Science (R0)