Hellaphone: Replacing the Java in Android



Similar documents
How to Remotely Track Any Lost Smartphone, Tablet, or PC

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Mobile Operating Systems & Security

Mobile web apps: The best option for business? A whitepaper from mrc

Minimum Requirements for Web Based Applications

A Beginners Guide To Responsive, Mobile & Native Websites 2013 Enhance.ie.All Rights Reserved.

Android: How To. Thanks. Aman Nijhawan

SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J A N D O B J 3-2)

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

Introduction to Android

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger

SeeTec ExpansionPackage

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

10 steps to better secure your Mac laptop from physical data theft

Workshop on Android and Applications Development

AC1750 Smart WiFi Router ac Dual Band Gigabit

Native v HTML5 An Event Planner s Primer

Mobile Communicator for Mobile Devices

Chris Boykin VP of Professional Services

Android Operating System

Mobile Phones Operating Systems

N750 Wireless Dual Band Gigabit Router Premium Edition

ShareLink 200 Setup Guide

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Do you know what makes NetSupport Manager so unique?

Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are

COMMONLY, the problem that most any computing platform will have is interoperability, and

User Manual Version p BETA III December 23rd, 2015

Analysis of advanced issues in mobile security in android operating system

How To Get More Data From Airtel For Free

AC1200 WiFi High-Speed DSL Modem Router Simultaneous Dual Band Gigabit

separate the content technology display or delivery technology

NetSupport Manager v11

N600 Wireless Dual Band Router

Kaspersky Lab Mobile Device Management Deployment Guide

CS378 -Mobile Computing. Android Overview and Android Development Environment

WHITEPAPER BEST PRACTICES IN MOBILE APPLICATION TESTING

AC1450 Smart WiFi Router ac Dual Band Gigabit

Conducting Virtual Meetings

NEW! CLOUD APPS ReadyCLOUD & genie remote access

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

Chapter 1 Hardware and Software Introductions of pcduino

Connecting Your Device to a Wireless Network

Introduction. Installation of SE S AM E BARCODE virtual machine distribution. (Windows / Mac / Linux)

WATTLE. Adobe Connect 9.4 Upgrade Key Differences. Author: Jo Jo Maung, Business Analyst, ITS Version: 1.3 Date: 16 September 2015.

R6250 Smart WiFi Router - AC Dual Band Gigabit

Who is Watching You? Video Conferencing Security

Are free Android virus scanners any good?

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

Hacking your Droid ADITYA GUPTA

AC1600 WiFi VDSL/ADSL Modem Router ac Dual Band Gigabit

Discover Broadband. A quick guide to your Virgin Broadband service

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

MOBILE MARKETING. A guide to how you can market your business to mobile phone users. 2 April 2012 Version 1.0

Mitel Unified Communicator Advanced

AC1200 WiFi Modem Router Essentials Edition

Porting VNC to Mobile Platforms

AC1200 WiFi DSL Modem Router ac Dual Band Gigabit

The Mobile Device and Operating System Landscape

AC750 WiFi Modem Router ac Dual Band Gigabit

VoipSwitch softphones

Page 18. Using Software To Make More Money With Surveys. Visit us on the web at:

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

Fall Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

MITEL UNIFIED COMMUNICATOR ADVANCED

ANDROID OPERATING SYSTEM

Feature List for Kaspersky Security for Mobile

ECE 455/555 Embedded System Design. Android Programming. Wei Gao. Fall

10 Quick Tips to Mobile Security

User Guide Vodafone Pocket WiFi Pro. Designed by Vodafone

Introduction to Android

Mobile Softphone. Mobile softphones. iphone mobile softphone

Spring Hill State Bank Mobile Banking FAQs

Getting Familiar With Android

Compatibility Testing for Mobile Apps and Websites

Samsung KNOX User Guide KNOX for Consumers Edition

AT&T Connect System Requirements for End Users v9.5. March 2013

White Paper. Freeance Mobile for Cityworks

There are a variety of ways to read ebooks from the Stirling Libraries and Archives ebooks Collection.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,

Transcription:

Hellaphone: Replacing the Java in Sandia National Labs July 2012 Collaborators: Joshua Landgraf, Joel Armstrong Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy s National Nuclear Security Administration under contract DE-AC03-94AL85000. SAND 2012-5278C.

Biography Computer engineer by training (RIT) Been interested in operating systems since high school Work for Sandia National Labs, California High performance computing Mobile Security I like open source and Sandia is down with that Goal: open up as much of my work as possible

Totally ruling the world A computer in my pocket? Awesome! It can make phone calls too? Smartphones Nifty sensors: camera, GPS, accelerometer Read email, browse the web, take pictures, get driving directions, play games Manage your passwords, 2 factor auth, Google Wallet

Why smartphones kinda suck Blackberry, iphone, Windows: all closed-source RIM will decrypt your messages for the government [6][5] iphone Tracks your movements [1] DoS attack via SMS [2] Windows Nobody has one! DoS d via SMS [7] CarrierIQ [3]

But is still cool, right? Linux-based Open-source Tons of devices (phones, tablets, laptops) Write your own applications no developer fees, no market fees! You can hack the OS if you want Big community of developers and OS hackers

kinda sucks too I have to program in WHAT? Vendors have no incentive to update the OS How much do you trust Joe Random s ICS Rom? Security ain t so hot DEF CON 19: fake OTA updates CarrierIQ Malicious apps [4] About 15 million lines of code, not including Linux. Not very documented hope you like digging! 1.2 GHz processor, 512 MB of RAM, runs like a dog

as a Linux platform is unattractive for hacking, sure Really just a thick layer of Java spread on top of a thin Linux cracker Mostly standard Linux underneath Comes with a little busybox environment Cyanogenmod ships a rather nice environment with bash etc. Let s scrape away the Java and build on Linux Bonus: we ll get tons of compatible hardware with all the drivers already written

Open-source operating system from Bell Labs, now owned by Vita Nuova Implements the Dis virtual machine Runs natively or hosted on Linux/Windows/OS X/Plan 9 Inspired by Plan 9 Compiles fast, launches fast Runs in a few megabytes About 1 million LOC total This includes the applications and code for native booting (which we don t use) Why not run it on top of s Linux? We get all the hardware drivers (binary blobs, yay!) Makes updating easy no flashing ROMs

- Java = Linux The first thing we do, let s kill all the Java Every Java process spawns from "zygote" Eliminate it from /init.rc But / is reset every boot! You can build your own custom ROM Or use our script to grab the running boot image, modify it, and reflash

+ = Hellaphone Adapt to build for Use AGCC script to build with compilers and libs Most of the Linux code is suitable Some tweaks were needed in bits of assembly or C Had to create support for various bits of hardware Framebuffer adapted from OLPC code Mouse code to parse touchscreen inputs Convert /dev/input events to text and make it available Hack the window manager to make it suitable for a phone.

The old window manager

The new phone-friendly window manager

The drop-down menu

It has a browser too

Phone-specific stuff devphone talks to the radio Presents a file system interface To make a phone call: echo dial 15551234567 > /phone/phone To receive incoming calls, read from /phone/phone Read will block until a call is incoming Similar interface for SMS Nobody wants to make phone calls like that So we wrote a dialer app and an SMS app Also made early drafts at WiFi and audio drivers (both semi-functional)

Dialing application

SMS application

Neat things to try sandboxing - one instance of OS per app Security hacks If accelerometer reads > 10G, wipe the SD card Fun with 9P Easy to access your files at home Easy to share files with nearby phones Use 9P to export your phone s devices and control them from your PC Anti-theft programs are now easy Just import your phone s GPS device and camera (Thief is probably pretty perplexed anyway)

Conclusion It s not that hard to strip down for your own purposes With a bit more work, could be a viable smartphone OS It s fast It s light It s easy to work on It already comes with a bunch of software and infrastructure, you re not going from scratch No app store, but if you didn t write it yourself, you can t trust it anyway, right?

Get in! Code at http://bitbucket.org/floren/inferno

I [1] Alasdair Allan. Got an iphone or 3G ipad? Apple is recording your moves. http://radar.oreilly.com/2011/04/apple-location-tracking.html, April 2011. [2] Dan Goodin. Hijacking iphones and other smart devices using SMS. http://www.theregister.co.uk/2009/07/31/smart_phone_hijacking/, July 2009. [3] Dan Goodin. BUSTED! Secret app on millions of phones logs key taps. http://www.theregister.co.uk/2011/11/30/smartphone_spying_app/, November 2011. [4] Dan Goodin. Malicious apps infiltrate Google s Market. http://www.theregister.co.uk/2011/12/12/android_market_malware/, December 2011. [5] Kathleen Hall. BlackBerry to co-operate with police after youths used BBM to organize riots. http://www.computerweekly.com/news/2240105290/ Blackberry-to-co-operate-with-police-after-youths-used-BBM-to-organise-riots. [6] Josh Halliday. BlackBerry wins the battle but not the war in India. http://www.guardian.co.uk/technology/2010/sep/01/blackberry-india-rim, September 2010. [7] Tom Warren. Windows Phone SMS attack discovered, reboots device and disables messaging hub. http://www.winrumors.com/ windows-phone-sms-attack-discovered-reboots-device-and-disables-messaging-hub/, December 2011.