2020
DOI: 10.1155/2020/8866996
|View full text |Cite
|
Sign up to set email alerts
|

SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization

Abstract: The root privilege escalation attack is extremely destructive to the security of the Android system. SEAndroid implements mandatory access control to the system through the SELinux security policy at the kernel mode, making the general root privilege escalation attacks unenforceable. However, malicious attackers can exploit the Linux kernel vulnerability of privilege escalation to modify the SELinux security labels of the process arbitrarily to obtain the desired permissions and undermine system security. Ther… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Whereas, dynamic analysis helps to detect and prevent indirect information flow at runtime. [31] proposed an optimization scheme for SELinux mechanism based on security label randomization. At Android runtime, the system randomizes the security label mapping inside and outside the kernel to protect the privileged security labels of the system from being illegally obtained and tampered by attackers.…”
Section: Further Research Directionsmentioning
confidence: 99%
“…Whereas, dynamic analysis helps to detect and prevent indirect information flow at runtime. [31] proposed an optimization scheme for SELinux mechanism based on security label randomization. At Android runtime, the system randomizes the security label mapping inside and outside the kernel to protect the privileged security labels of the system from being illegally obtained and tampered by attackers.…”
Section: Further Research Directionsmentioning
confidence: 99%