Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade

People can obtain the highest privileges and control devices by Android root. However, an Android phone has been rooted, it is difficult for the user to update the Android system. Aiming at these problems, this paper proposes a maintaining root via custom Android kernel across Over-The-Air (OTA) upgrade. By customizing the kernel in boot and recovery, the boot will be replaced with rooted boot after updating automatically, so that system not only can be updated successfully but also maintain root. Experiments show that there is no abnormal between rooted mobile with a customized kernel and normal mobile during a minor system update.

[1]  Srikanth V. Krishnamurthy,et al.  Detecting Android Root Exploits by Learning from Root Providers , 2017, USENIX Security Symposium.

[2]  Dong Hoon Lee,et al.  Vulnerabilities of Android OS-Based Telematics System , 2017, Wirel. Pers. Commun..

[3]  Majid Salehi,et al.  Welcome to Binder: A kernel level attack model for the Binder in Android operating system , 2016, 2016 8th International Symposium on Telecommunications (IST).

[4]  Luis Corral,et al.  Energy-Aware Performance Evaluation of Android Custom Kernels , 2015, 2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software.

[5]  Shiva Agarwal,et al.  Sustaining Superior Performance in Business Ecosystems: Evidence from Application Software Developers in the iOS and Android Smartphone Ecosystems , 2017, Organ. Sci..

[6]  Hyeonggyu Kim,et al.  Efficient memory reclaiming for mitigating sluggish response in mobile devices , 2015, 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).

[7]  Yu-an Tan,et al.  A methodology for determining the image base of ARM-based industrial control system firmware , 2017, Int. J. Crit. Infrastructure Prot..

[8]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[9]  Yuanzhang Li,et al.  Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..

[10]  Wenzhi Chen,et al.  A Lightweight Virtualization Solution for Android Devices , 2015, IEEE Transactions on Computers.

[11]  Mordechai Guri,et al.  JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface , 2015, TrustCom 2015.

[12]  Yuan Xue,et al.  A code protection scheme by process memory relocation for android devices , 2017, Multimedia Tools and Applications.

[13]  Yuan Xue,et al.  Isolating Host Environment by Booting Android from OTG Devices , 2018 .