Check Point has identified the possibility of attacks on the new generation of Android

Check Point has identified the possibility of attacks on the new generation of Android

    298

    Company Check Point Software Technologies has published a new research ” Man in the Binder: Who controls the IPC, he controls the Droid “. Studying architecture Android operating system has revealed the possibility of theft of information that is stored or is in the process of transmission through the mechanism of message processing Binder. This mechanism is built into the communications system OS Android Inter-process Communication (IPC).

    Researchers from the study group of malware and vulnerabilities Check Point found that a single system of communication Binder is the primary goal for any malicious software being developed for the system Android. In conventional operating systems, processes are working with dozens of elements of the system equipment: hard drive, display adapter, network card, etc.

    However, due to the specific architecture of the operating system Android, the process can perform the same tasks, controlling all applications to interact via the Binder. Thus, through the Binder can be picked such important data as the result of a keyboard input information from the applications and the contents of SMS.

    comments powered by Disqus