Nov 05, 2013 (06:11 AM EST)
Android KitKat Security Teardown: 4 Hits, 1 Miss

Read the Original Article at InformationWeek

1   2  
Samsung's New Gadgets: Visual Tour
Samsung's New Gadgets: Visual Tour
(click image for larger view)
The latest version of Google's Android operating system (version 4.4) -- known as "KitKat" and released last week -- includes a slew of changes: a streamlined footprint so it can run on devices with scant RAM, better animations and graphics acceleration, plus snappier device-wide search and a new phone dialer app. But what's new on the information security front?

According to Google's developer overview, KitKat packs in "dozens of security enhancements to protect users" -- meaning bug fixes -- plus an experimental boot verification feature and better sandbox. Those features, plus the patches, have already been shared with handset manufacturers, carriers and the Android Open Source Project (AOSP).

Based on teardowns of that code, here's a rundown of the Android security changes -- including why they're important, and what they'll offer users -- as well as one glaring omission:

1. Verified Boot Combats Rootkits

Android 4.4 builds an optional -- and "experimental" -- verified-boot capability into the kernel. According to Google, the feature, dubbed device-mapper-verity (dm-verity), "helps prevent persistent rootkits that can hold onto root privileges and compromise devices."

[ Do you think BYOD presents special security challenges? See It's Not 'Mobile Security,' It's Just Security. ]

In particular, the feature can spot rootkits that have a more privileged access level than security tools, and which are thus able to fool those malware-detection programs. "The dm-verity feature lets you look at a block device, the underlying storage layer of the file system, and determine if it matches its expected configuration," according to Google. If the cryptographic hash of a program has changed, it means malware is likely at work.

While this feature is great news for stopping malware, kernel-level file system integrity validation could make life difficult for Android modders. "By verifying the integrity of the device's file system at a low level via cryptography, rooting the phone becomes a thing of the past for most devices that come with a locked-down bootloader," according a study of Android 4.4 conducted by the Romanian information security firm BitDefender. "This means that alternative ROMs such as CyanogenMod, Paranoid Android or others will have a hard time getting on devices other than developer or Nexus ones running stock Android."

2. Android Sandbox Gets SELinux Boost

Android 4.3 (Jelly Bean) saw the addition of the Linux security module known as security-enhanced Linux (SELinux), which was developed by the National Security Agency more than 10 years ago, and which allows a number of security policies -- including access controls -- to be enforced in Linux.

In Android 4.3, SELinux was available only in "permissive mode," meaning it was could only be used for logging purposes, rather than policy enforcement. With Android 4.4, however, SELinux can be used in "enforcing" mode, meaning its use can be made mandatory. As a result, the module can be used "to prevent privilege escalation attacks such as an application gaining root privileges over the device, regardless of the application's permissions," according to BitDefender.

3. Strong Crypto Improvements

Android 4.4 now has certificate pinning, which Google said "detects and prevents the use of fraudulent Google certificates used in secure SSL/TLS communications." In addition, Android now flashes a warning "if any certificate has been added to the device certificate store that could allow monitoring of encrypted network traffic."

Both features are designed to ensure that a digital certificate is the real deal -- not a fake planted to allow a third party to eavesdrop on the device. "Long story short, if a digital certificate for a specific site has been fraudulently obtained by either breaking into the [certificate authority] or by just tricking them into issuing a new certificate on somebody else's behalf, Android will notify the user that the certificate's fingerprint does not match what Google has on record," according to BitDefender.

But that security improvement may also make life difficult for intrusion detection systems. "This is a welcome mitigation against man-in-the-middle attacks, but will also make traffic scanning via SSL more difficult for security solutions running in enterprises," said BitDefender.