DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement

📅 2026-01-16
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the systemic security risks arising from inconsistent cryptographic implementations in the Android ecosystem, driven by vendor and chipset heterogeneity. We present DroidCCT—the first distributed, passive testing framework designed for real-world devices—and conduct a transparent compliance assessment over trillions of Android Keystore operations spanning 500 million devices. Through large-scale passive measurement, cryptographic artifact analysis, randomness evaluation, and side-channel vulnerability detection, we uncover critical flaws across platforms, including weak random number generation and timing side channels. Our findings demonstrate that heterogeneous implementations significantly undermine cryptographic reliability, underscoring the urgent need for fault-resilient and side-channel-resistant cryptographic designs in mobile systems.

Technology Category

Application Category

📝 Abstract
We develop DroidCCT, a distributed test framework to evaluate the scale of a wide range of failures/bugs in cryptography for end users. DroidCCT relies on passive analysis of artifacts from the execution of cryptographic operations in the Android ecosystem to identify weak implementations. We collect trillions of samples from cryptographic operations of Android Keystore on half a billion devices and apply severalanalysis techniques to evaluate the quality of cryptographic output from these devices and their underlying implementations. Our study reveals several patterns of bugs and weakness in cryptographic implementations from various manufacturers and chipsets. We show that the heterogeneous nature of cryptographic implementations results in non-uniform availability and reliability of various cryptographic functions. More importantly, flaws such as the use of weakly-generated random parameters, and timing side channels may surface across deployments of cryptography. Our results highlight the importance of fault- and side-channel-resistant cryptography and the ability to transparently and openly test these implementations.
Problem

Research questions and friction points this paper is trying to address.

cryptographic compliance
side-channel vulnerabilities
weak randomness
heterogeneous implementations
Android Keystore
Innovation

Methods, ideas, or system contributions that make the work stand out.

cryptographic compliance testing
trillion-scale measurement
side-channel vulnerability
Android Keystore
distributed test framework
🔎 Similar Papers
No similar papers found.
Daniel Moghimi
Daniel Moghimi
Senior Research Scientist, Google
Hardware SecuritySystem SecurityCryptanalysisSide-Channel AttacksMicroarchitectural Attacks
A
Alexandru-Cosmin Mihai
Google
B
Borbala Benko
Google
C
Catherine Vlasov
Google
E
Elie Bursztein
Google
Kurt Thomas
Kurt Thomas
Research Scientist @ Google
Computer SecuritySocial NetworksLarge-scale MeasurementUnderground EconomiesMalware
L
Laszlo Siroki
Google
P
Pedro Barbosa
Google
R
Rémi Audebert
Google