JoKER: Trusted detection of kernel rootkits in android devices via JTAG interface

Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici

2015 IEEE Trustcom/BigDataSE/ISPA 1, 65-73, 2015

Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as the monitored OS can be compromised via application, kernel or boot-loader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task in practice. In this paper we present ‘JoKER’ – a system which aims at detecting rootkits in the Android kernel by utilizing the hardware’s Joint Test Action Group (JTAG) interface for trusted memory forensics. Our framework consists of components that extract areas of a kernel’s memory and reconstruct it for further analysis. We …