cessing critical data (such as PayPal and even Google
Pay) do not notice system modifications performed
through Magisk (when enabling Magisk Hide and re-
packaging Magisk Manager), while Fides reliably de-
tects an unverified boot chain. As a consequence of
the verifiably unaltered system state, software-based
security features like SELinux can also be expected to
be working as intended.
In summary, it is now possible for service oper-
ators to establish trust in mobile clients and reliably
deny access to compromised instances, even in cases
where Google’s own protection mechanisms fail to do
so. In case exploits are an issue for certain sensitive
applications, Fides can be configured to only trust fully
patched devices (a property which cannot be spoofed
in software, since it is attested by the hardware). It is
therefore easily possible to trade off compatibility for
increased security. Our freely available libraries can
easily be integrated into the connectivity establishment
workflows of existing services, as it only relies on TLS.
REFERENCES
AOSP (17th Apr. 2018). Protecting against Security Threats
with SafetyNet. U R L: https://developer.android.com/
training/safetynet/ (visited on 11/01/2019).
AOSP (23rd Jan. 2019a). Android keystore system. U R L: ht
tps://developer.android.com/training/articles/keystore
(visited on 20/02/2019).
AOSP (7th May 2019b). Distribution dashboard. U R L: https:
//developer.android.com/about/dashboards/ (visited on
10/05/2019).
AOSP (2019c). Android Keystore - Version Binding. U R L:
https://source.android.com/security/keystore/version-
binding (visited on 20/02/2019).
AOSP (2019d). Security-Enhanced Linux in Android. U R L:
https://source.android.com/security/selinux/ (visited on
19/02/2019).
AOSP (2019e). Trusty TEE. U R L : https://source.android.
com/security/trusty/ (visited on 11/01/2019).
Arnautov, Sergei et al. (2016). ‘SCONE: Secure Linux Con-
tainers with Intel SGX’. In: OSDI 2016. USENIX Asso-
ciation, pp. 689–703.
Baumann, Andrew, Marcus Peinado and Galen C. Hunt
(2014). ‘Shielding Applications from an Untrusted Cloud
with Haven’. In: OSDI 2014. USENIX Association,
pp. 267–283.
Cooijmans, Tim, Joeri de Ruiter and Erik Poll (2014). ‘Ana-
lysis of Secure Key Storage Solutions on Android’. In:
Security and Privacy in Smartphones & Mobile Devices
– SPSM@CCS. ACM, pp. 11–20.
Desnos, Anthony and Geoffroy Gueguen (2011). ‘Android:
From Reversing to Decompilation’. In: Proc. of Black
Hat Abu Dhabi, pp. 1–24.
FIDO Alliance (June 2018). Hardware-backed Keystore
Authenticators (HKA) on Android 8.0 or Later Mo-
bile Devices. U R L : https : / / fidoalliance . org / wp -
content / uploads / Hardware - backed Keystore White
Paper June2018.pdf (visited on 14/01/2019).
Google Inc. (18th Apr. 2017). Android 7.0 Compatibility
Definition. U R L: https://source.android.com/compatibili
ty/7.0/android-7.0-cdd.pdf (visited on 20/02/2019).
Google Inc. (8th Feb. 2019). Android 9.0 Compatibil-
ity Definition. U R L : https : / / source . android . com /
compatibility / 9 / android - 9 - cdd . pdf (visited on
20/02/2019).
Hoekstra, Matthew et al. (2013). ‘Using innovative instruc-
tions to create trustworthy software solutions’. In: Work-
shop on Hardware and Architectural Support for Security
and Privacy – HASP. ACM, p. 11.
Huang, Heqing et al. (2013). ‘A Framework for Evaluating
Mobile App Repackaging Detection Algorithms’. In:
Trust and Trustworthy Computing. Ed. by Michael Huth
et al. Berlin, Heidelberg: Springer, pp. 169–186.
Mayrhofer, Ren
´
e et al. (2019). ‘The Android Platform Se-
curity Model’. In: CoRR abs/1904.05572. arXiv: 1904.
05572. U R L: http://arxiv.org/abs/1904.05572.
Pr
¨
unster, Bernd, Edona Fasllija and Dominik Mocher (July
2019). ‘Master of Puppets: Trusting Silicon in the Fight
for Practical Security in Fully Decentralised Peer-to-
Peer Networks’. In: 16th International Conference on
Security and Cryptography. SciTePress. U R L: https :
//graz.pure.elsevier.com/en/publications/master- of-
puppets-trusting-silicon-in-the-fight-for-practical-sec.
In press.
Ren, Chuangang, Kai Chen and Peng Liu (2014). ‘Droid-
marking: Resilient SoftwareWatermarking for Impeding
Android Application Repackaging’. In: 29th ACM/IEEE
international conference on Automated software engin-
eering, pp. 635–646.
Sabt, Mohamed and Jacques Traor
´
e (2016). ‘Breaking into
the keystore: A practical forgery attack against Android
keystore’. In: European Symposium on Research in Com-
puter Security. Springer, pp. 531–548.
Sadeghi, Alireza et al. (2017). ‘A Taxonomy and Qualitative
Comparison of Program Analysis Techniques for Secur-
ity Assessment of Android Software’. In: IEEE Trans.
Software Eng. 43, pp. 492–530.
Shinde, Shweta et al. (2017). ‘Panoply: Low-TCB Linux
Applications With SGX Enclaves’. In: Network and Dis-
tributed System Security Symposium – NDSS 2017. The
Internet Society.
Tsai, Chia-che, Donald E. Porter and Mona Vij (2017).
‘Graphene-SGX: A Practical Library OS for Unmodified
Applications on SGX’. In: USENIX Annual Technical
Conference 2017. USENIX Association, pp. 645–658.
Zhou, Wu, Xinwen Zhang and Xuxian Jiang (2013). ‘Ap-
pInk: Watermarking Android Apps for Repackaging De-
terrence’. In: Proceedings of the 8th ACM SIGSAC sym-
posium on Information, computer and communications
security - ASIA CCS ’13. New York, USA: ACM Press.
Ziegler, Dominik et al. (July 2018). ‘Spoof-of-Work: Eval-
uating Device Authorisation in Mobile Mining Pro-
cesses’. In: 15th International Conference on Security
and Cryptography. Vol. 2: SECRYPT. Portugal: SciTe-
Press, pp. 380–387.
Fides: Unleashing the Full Potential of Remote Attestation
321