Papers
Topics
Authors
Recent
Search
2000 character limit reached

On Root Detection Strategies for Android Devices

Published 3 Dec 2020 in cs.CR and cs.NI | (2012.01812v1)

Abstract: The Android operating system runs on the majority of smartphones nowadays. Its success is driven by its availability to a variety of smartphone hardware vendors on the one hand, and the customization possibilities given to its users on the other hand. While other big smartphone operating systems restrict user configuration to a given set of functionality, Android users can leverage the whole potential of their devices. This high degree of customization enabled by a process called rooting, where the users escalate their privileges to those of the operating system, introduces security, data integrity and privacy concerns. Several rooting detection mechanisms for Android devices already exist, aimed at different levels of detection. This paper introduces further strategies derived from the Linux ecosystem and outlines their usage on the Android platform. In addition, we present a novel remote rooting detection approach aimed at trust and integrity checks between devices in wireless networks.

Citations (2)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.