Check Point has released new research entitled “Man in the Binder: He Who Controls the IPC, Controls the Droid.” The study of Android’s unique operating system (OS) architecture showed the potential capture of data and information being stored and communicated on Android devices through the Binder, the message passing mechanism in Inter-process Communication (IPC).
Researchers in Check Point’s Malware and Vulnerability Research Group uncovered that as the single point of communication, the Binder is a natural target for Android malware. In a typical OS, a process will hold dozens of handles for the system's hardware: hard disk, display adapter, network card, etc. Due to Android's OS architecture, a process can achieve the same tasks, controlling all of an application’s interactions through the Binder. Data communicated over the Binder can be captured, and Check Point’s research demonstrated the ability to intercept sensitive details such as keyboard, in-app and SMS data.
“Through our Man in the Binder research, we noted several architectural concepts in Android’s unique OS architecture. Specifically, we discuss the data communication capabilities the IPC provides in Android devices,” said Nitay Artenstein, security researcher at Check Point Software Technologies. “The Binder can become the new frontier of mobile malware attacks; its greatest value for attackers is the lack of widespread awareness on its role in the Android OS. Our hope is that with this research, the security and development communities will be better equipped to protect and secure the data going through the Binder.”
Key Findings:
• Man in the Binder uncovers the role of the Binder, a message-passing mechanism for Android devices.
• Through in-depth research on the Binder’s central role in Android OS architecture, Check Point demonstrated that information sent and received through applications on a device, including those that are secured through two-factor authentication, encryption lines, and other security measures, can be intercepted.
• Examples of data intercepted via the Binder in this research included device keyboard input, in-application activities such as banking transactions, and SMS messages.
• Check Point is highlighting the potential for new Android malware, and encourages security professionals and Android developers alike take note and collaborate on the issue, as well as research new protection mechanisms.