Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Future Android attacks could exploit the Binder

Check Point : 20 October, 2014  (Technical Article)
Messaging passing mechanism in Android smartphone devices exposed as a potential vulnerability in next generation attacks
Future Android attacks could exploit the Binder

Check Point has released new research entitled “Man in the Binder: He Who Controls the IPC, Controls the Droid.” The study of Android’s unique operating system (OS) architecture showed the potential capture of data and information being stored and communicated on Android devices through the Binder, the message passing mechanism in Inter-process Communication (IPC).

Researchers in Check Point’s Malware and Vulnerability Research Group uncovered that as the single point of communication, the Binder is a natural target for Android malware. In a typical OS, a process will hold dozens of handles for the system's hardware: hard disk, display adapter, network card, etc. Due to Android's OS architecture, a process can achieve the same tasks, controlling all of an application’s interactions through the Binder. Data communicated over the Binder can be captured, and Check Point’s research demonstrated the ability to intercept sensitive details such as keyboard, in-app and SMS data.

“Through our Man in the Binder research, we noted several architectural concepts in Android’s unique OS architecture. Specifically, we discuss the data communication capabilities the IPC provides in Android devices,” said Nitay Artenstein, security researcher at Check Point Software Technologies. “The Binder can become the new frontier of mobile malware attacks; its greatest value for attackers is the lack of widespread awareness on its role in the Android OS. Our hope is that with this research, the security and development communities will be better equipped to protect and secure the data going through the Binder.”

Key Findings:

* Man in the Binder uncovers the role of the Binder, a message-passing mechanism for Android devices.

* Through in-depth research on the Binder’s central role in Android OS architecture, Check Point demonstrated that information sent and received through applications on a device, including those that are secured through two-factor authentication, encryption lines, and other security measures, can be intercepted.

* Examples of data intercepted via the Binder in this research included device keyboard input, in-application activities such as banking transactions, and SMS messages.

* Check Point is highlighting the potential for new Android malware, and encourages security professionals and Android developers alike take note and collaborate on the issue, as well as research new protection mechanisms.

Check Point is presenting the Man in the Binder research findings at Black Hat Europe on Thursday, October 16, 2014 at 11:45AM CEST in The Amsterdam Rai, Netherlands. “Man in the Binder: He Who Controls IPC, Controls The Droid” will be presented by Check Point’s Nitay Artenstein, Security Researcher and Idan Revivo, Mobile Malware Researcher.

Check Point’s Malware and Vulnerability Research Groups regularly perform assessments of common software to ensure the security of Internet users worldwide.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo