Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 4121765, 13 pages
https://doi.org/10.1155/2017/4121765
Research Article

Android Rooting: An Arms Race between Evasion and Detection

School of Electronic Engineering, Soongsil University, Seoul, Republic of Korea

Correspondence should be addressed to Souhwan Jung; rk.ca.uss@jnawhuos

Received 1 May 2017; Revised 31 July 2017; Accepted 16 August 2017; Published 29 October 2017

Academic Editor: Zonghua Zhang

Copyright © 2017 Long Nguyen-Vu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

We present an arms race between rooting detection and rooting evasion. We investigate different methods to detect rooted device at both Java and native level and evaluate the counterattack from major hooking tools. To this end, an extensive study of Android rooting has been conducted, which includes the techniques to root the device and make it invisible to the detection of mobile antimalware product. We then analyze the evasion loopholes and in turn enhance our rooting detection tool. We also apply evasion techniques on rooted device and compare our work with 92 popular root checking applications and 18 banking and finance applications. Results show that most of them do not suffice and can be evaded through API hooking or static file renaming. Furthermore, over 28000 Android applications have been analyzed and evaluated in order to diagnose the characteristics of rooting in recent years. Our study shows that rooting has become more and more prevalent as an inevitable trend, and it raises big security concerns regarding detection and evasion. As a proof of concept, we have published our rooting detection application to Google Play Store to demonstrate the work presented in this paper.