WOOTdroid: Whole-system Online On-device Tracing for Android
Simon Althaus, Nikolaos Alexopoulos, Max Mühlhäuser, Christian Reuter, Ephraim Zimmer
TLDR
WOOTdroid enables robust, whole-system online tracing for Android, capturing syscalls and Binder IPC without OS modifications or app instrumentation.
Key contributions
- WOOTdroid provides robust whole-system online tracing for stock Android without OS modification.
- WDSys (eBPF) traces 33% more syscalls than ftrace with minimal overhead (3.6% Geekbench).
- WDBind captures and decodes security-relevant Binder IPC parcels in the kernel.
- Closes the semantic gap between low-level events and high-level application behavior.
Why it matters
Current Android system auditing struggles with lost events and a semantic gap in Binder IPC, often requiring OS modifications or easily evadable app instrumentation. WOOTdroid offers a novel, non-invasive solution for comprehensive, real-time tracing on stock Android. This significantly enhances security auditing and forensic capabilities by providing a complete, high-fidelity view of system and application interactions.
Original Abstract
System auditing on Android faces two problems. First, existing syscall tracers lose events under load, silently overwriting entries faster than a user space reader can drain them. Second, security-relevant application behavior is mediated through Binder, Android's kernel IPC mechanism, and is therefore hidden from the syscall layer. The Binder parcels that the kernel does see carry no method names or typed arguments, a disconnect between low-level events and high-level behavior known as the semantic gap. Existing approaches address the semantic gap either by modifying the Android platform, making them difficult to adjust to OS updates, or by instrumenting the traced application in user space, which sophisticated adversaries can evade by bypassing the instrumented framework APIs. We present WOOTdroid, a design and prototype for on-device tracing on stock Android that addresses both problems without OS modification or application instrumentation. WDSys, an eBPF port of eAudit-style syscall auditing, runs on current Android with at most 3.6% Geekbench overhead and traces 33% more syscalls than ftrace. WDBind captures Binder parcels in the kernel and decodes them out-of-process against a framework signature table extracted via Java reflection. We demonstrate WOOTdroid on Pixel 9 devices running Android 16 with an end-to-end case study reconstructing ten security-relevant Binder transactions.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.