Feeds

Memory troubling you, Android? Surprise! Another data slurp vuln uncovered

Be careful what you install, say boffins. Again

Secure remote control for conventional and virtual desktops

Yet another Android vulnerability has been revealed by researchers presenting at the Usenix conference: the way apps use memory can be exploited to leak private information with a success rate “between 82 and 92 per cent of the time”.

Announced by the University of California, Riverside here, the researchers' paper [PDF] gives a pretty good idea of what's going on in its title: “Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks”.

They note that UI state can be spied on by a malicious app without requiring any permissions, in what they call a “UI inference attack”. Their demonstration included stealing login credentials and obtaining sensitive camera images taken by the user (in the demo case, they copied a cheque a user had shot for use with a banking app).

The paper explains that UI state reflects a specific piece of functionality at the window level – for example, in the login window the user's text inputs may change, but layout and functionality are consistent. If the attacker builds a UI state machine based on UI state signatures, they can infer UI states “in real time from an unprivileged background app”.

That might look like there's nothing to worry about. After all, knowing that a user is accessing a login screen isn't sensitive, since it doesn't reveal what the user keys into that login screen.

Here's where the attack gets interesting: “based on the inferred UI states, we can further break the GUI integrity by carefully exploiting the designed functionality that allows UI preemption, which is commonly used by alarm or reminder apps on Android”, the paper states.

State changes at the UI level, they explain, can be observed through a shared-memory side channel, which “can be used to detect window events in the target application.

“This side channel exists because shared memory is commonly adopted by window managers to efficiently receive window changes or updates from running applications,” they continue.

As the university statement notes, “The researchers monitor changes in shared memory and are able to correlate changes to what they call an “activity transition event,” which includes such things as a user logging into Gmail”.

Against Gmail and H&R Block apps the researchers claimed a 92 per cent success rate, but interestingly they only hit 48 per cent for Amazon's app because “its app allows one activity to transition to almost any other activity, increasing the difficulty of guessing which activity it is currently in.”

Although they haven't yet repeated the tests on other operating systems, the researchers believe similar architectural flaws could exist in iOS and Windows. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.