Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Emulating the Android Boot Process

Technical Report ·
DOI:https://doi.org/10.2172/1890781· OSTI ID:1890781
 [1];  [1];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Critical vulnerabilities continue to be discovered in the boot process of Android smartphones used around the world. The entire device's security is compromised if boot security is compromised, so any weakness presents undue risk to users. Vulnerabilities persist, in part, because independent security analysts lack access and appropriate tools. In response to this gap, we implemented a procedure for emulating the early phase of the Android boot process. This work demonstrated feasibility and utility of emulation in this space. By using HALucinator, we derived execution context and data flow, as well as incorporated peripheral hardware behavior. While smartphones with shared processors have substantial code overlap regardless of vendor, generational changes can have a significant impact. By applying our approach to older and modern devices, we learned interesting characteristics about the system. Such capabilities introduce new levels of introspection and operation understanding not previously available to mobile researchers.
Research Organization:
Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA); USDOE Laboratory Directed Research and Development (LDRD) Program
DOE Contract Number:
NA0003525
OSTI ID:
1890781
Report Number(s):
SAND2022-13571; 710490
Country of Publication:
United States
Language:
English

Similar Records

Hardware Fuzzing with An Emulator
Technical Report · Sun Sep 01 00:00:00 EDT 2024 · OSTI ID:2480163

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Journal Article · Wed Jul 14 20:00:00 EDT 2021 · Journal of Systems Architecture · OSTI ID:1977682

Control of an External Microcontroller using the Android Operating System
Technical Report · Tue Aug 06 00:00:00 EDT 2013 · OSTI ID:1089875

Related Subjects