skip to main content
10.1145/3007788.3007795acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Analysis of Trusted Execution Environment usage in Samsung KNOX

Published:12 December 2016Publication History

ABSTRACT

Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. In order to mitigate risks arising from attacks, various approaches have been proposed including the use of Trusted Execution Environment (TEE) to isolate and protect the execution of sensitive code from the rest of the system, e.g. applications and other software.However, users remain at risk of exploits via several types of software vulnerabilities - indicating that enterprises have failed to deliver the required protection, despite the use of existing isolation technologies. In this paper, we investigate Samsung KNOX and its usage of TEE as being the current technology providing secure containers. First, we study how KNOX uses TEE and perform analysis on its design consideration from a system vulnerabilities perspective. Second, we analyse and discuss recent attacks on KNOX and how those attacks exploit system vulnerabilities. Finally, we present new shortcomings emerging from our analysis of KNOX architecture. Our research exhibits that system vulnerabilities are the underlying cause of many attacks on systems and it reveals how they affect fundamental design security principles when the full potential of TEE is not exploited.

References

  1. Dendroid malware can take over your camera, record audio, and sneak into Google Play. https://blog.lookout.com/blog/2014/03/06/dendroid/.Google ScholarGoogle Scholar
  2. Samsung. samsung unveils samsung KNOX for secure byod. http://www.samsung.com/uk/news/local/samsung-unveils-samsung-knox-for-secure-byod,2013.Google ScholarGoogle Scholar
  3. A software level analysis of trustzone os and trustlets in samsung galaxy phone. https://www.sensepost.com/blog/2013/a-software-level-analysis-of-trustzone-os-and-trustlets-in-samsung-galaxy-phone.Google ScholarGoogle Scholar
  4. Spotify. https://play.google.com/store/apps.Google ScholarGoogle Scholar
  5. Xposed module repository. http://xposed.info.Google ScholarGoogle Scholar
  6. CVE Details: CVE security vulnerability database. Security vulnerabilities, exploits, references and more. http://www.cvedetails.com/, 2016.Google ScholarGoogle Scholar
  7. ARM. ARM TrustZone.Google ScholarGoogle Scholar
  8. A. Atamli-Reineh and A. Martin. Securing application with software partitioning: A case study using SGX. In SecureComm, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. A. Balisane and A. Martin. Trusted execution environment-based authentication gauge (TEEBAG). In NSPW. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In MobiSys. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Eduard. Google patches 40 vulnerabilities in Android. 2016.Google ScholarGoogle Scholar
  12. J.-E. Ekberg, K. Kostiainen, and N. Asokan. The untapped potential of trusted execution environments on mobile devices. IEEE S&P, 2014.Google ScholarGoogle Scholar
  13. N. Hardy. The confused deputy: (or why capabilities might have been invented). ACM SIGOPS, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Huawei. Two privilege escalation vulnerabilities in Huawei mate 7 smartphones. http://www.huawei.com/en/psirt/security-advisories/hw-432799, 2015.Google ScholarGoogle Scholar
  15. U. Kanonov and A. Wool. Secure containers in Android: the samsung KNOX case study. CoRR, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: Formal verification of an os kernel. In SIGOPS, SOSP '09, pages 207--220, New York, NY, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Leicher, A. U. A. U. Schmidt, Y. Shah, I. Cha, and K. Prussia. Trusted Computing enhanced OpenID. In ICITST, 2010.Google ScholarGoogle Scholar
  18. W. Li, M. Ma, J. Han, Y. Xia, B. Zang, C.-k. Chu, and T. Li. Building trusted path on untrusted device drivers for mobile devices. In APSys. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Martin. The ten-page introduction to Trusted Computing. Technical Report RR-08-11, 2008.Google ScholarGoogle Scholar
  20. J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. SIGOPS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. F. McKeen, I. Alexandrovich, and A. Berenzon. Innovative instructions and software model for isolated execution. HASP, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Mimoso. NSA-approved samsung KNOX stores pin in cleartext. DEFCON, 2014.Google ScholarGoogle Scholar
  23. B. Parno, J. M. McCune, and A. Perrig. Bootstrapping Trust in Commodity Computers. In IEEE S&P, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Petracca, Y. Sun, T. Jaeger, and A. Atamli. Audroid: Preventing attacks on audio channels in mobile devices. In ACSAC, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. Petracca, Y. Sun, T. Jaeger, and A. Atamli. Be aware: Controlling apps' access to sensitive audio-visual devices in mobile platforms. arXiv preprint arXiv:1604.02171, 2016.Google ScholarGoogle Scholar
  26. D. Rosenberg. QSEE TrustZone Kernel Integer Overfow Vulnerability. In Black Hat US, 2014.Google ScholarGoogle Scholar
  27. M. Salvador. Samsung pay: Tokenized numbers, flaws and issues. DEFCON, 2016.Google ScholarGoogle Scholar
  28. Samsung-KNOX. Samsung. whitepaper: Mobile malware and enterprise security.).Google ScholarGoogle Scholar
  29. R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In NDSS, 2011.Google ScholarGoogle Scholar
  30. D. Shen. Exploiting Trustzone on Android. In Black Hat US, 2015.Google ScholarGoogle Scholar
  31. X. Zhang and W. Du. Attacks on Android clipboard. In DIMVA. Springer, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  32. Y. Zhang, Z. Chen, H. Xue, and T. Wei. Fingerprints On Mobile Devices: Abusing and Leaking. In Black Hat US, 2015.Google ScholarGoogle Scholar
  33. X. Zheng, L. Yang, J. Ma, G. Shi, and D. Meng. TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms. In ISCC, 2016.Google ScholarGoogle Scholar
  1. Analysis of Trusted Execution Environment usage in Samsung KNOX

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SysTEX '16: Proceedings of the 1st Workshop on System Software for Trusted Execution
      December 2016
      54 pages
      ISBN:9781450346702
      DOI:10.1145/3007788

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 December 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader