Sunday, August 17, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

Finding security flaws in Android ahead of malicious hackers

August 15, 2024
in Technology and Engineering
Reading Time: 4 mins read
0
Mathias Payer
65
SHARES
594
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
ADVERTISEMENT

EPFL researchers in computer and communication sciences are hacking and fixing Android phones before malicious hackers do. They uncovered 31 security critical in the Android system, explored its risks and developed methods to mitigate some of the key ones through better testing and broader mitigations.

Mathias Payer

Credit: – 2024 EPFL/Murielle Gerber – CC-BY-SA 4.0

EPFL researchers in computer and communication sciences are hacking and fixing Android phones before malicious hackers do. They uncovered 31 security critical in the Android system, explored its risks and developed methods to mitigate some of the key ones through better testing and broader mitigations.

“Vulnerabilities in smart devices are the Achilles heel that can compromise the most critical aspects of a mobile device,” says Mathias Payer who leads EPFL’s HexHive Laboratory which conducts research in cyber security. “The main risk is that hackers can get a foothold in your system and gain lifelong access to your data as long as you have the same phone. Your phone is no longer secure.”

The diverse critical security flaws revealed by the researchers could have been exploited to steal personal information like fingerprints, face data, along with other sensitive data stored on one’s phone like credit card or social security information.

“We studied the Android system because of the open nature of its platform, but similar security flaws are likely present in the iPhone ecosystem as well. We see much less public security research on iPhones due to Apple’s closed approach which forces researchers to first reverse engineer essential information that is publicly available on Android,” explains Payer.

Marcel Busch, a postdoc in the HexHive Laboratory with Payer, spearheaded the efforts into privileged layers of Android together with the PhD students Philipp Mao and Christian Lindenmeier that resulted in three publications presented at this year’s Usenix Security Symposium, one of the world’s four top tier cybersecurity venues. In their work, they show exactly how these security flaws manifest themselves and which layers of the Android system’s architecture are affected.

The nitty gritty of the Android security flaws over three layers

The Android system essentially processes information via three layers of code (iPhone’s iOS follows a similar architecture.)

The first layer is the secure monitor, it’s the code that processes switches to and from the world of encrypted data known as the secure world. The second layer is divided into two parts, the secure world where sensitive data is encrypted, and the normal world built on a Linux kernel. The third layer builds on top of the second layer and contains all the apps. Day-to-day apps, like the photo app or messaging app, in the normal world talk to secure apps called Trusted Applications (TA) such as the key master app which manages cryptographic keys or the biometric information management app that contain sensitive data about the user running in the secure world.

Numerous defects and vulnerabilities discovered

The EPFL team discovered security flaws across all three layers of the Android system. The researchers developed a program (called EL3XIR) that essentially throws unexpected inputs at the target code to reveal software defects and vulnerabilities, a technique called fuzzing. EL3XIR revealed 34 bugs in the most fundamental and most privileged layer of Android security, the secure monitor level, of which 17 were classified as security critical (the most severe risk level).

The researchers also revealed a confusion in how the Android system communicates with trusted applications. The confusion arises when information from trusted applications are mislabeled when processed between layers. In particular, the complex and critical interaction between accessible day-to-day apps and trusted applications that has to go first down through the secure monitor, and then back up through the secure world and into the trusted applications is affected by this issue. Across 15,000 trusted applications that the team analyzed, the researchers discovered 14 new critical security flaws, uncovered 10 silently fixed bugs that vendors patched without notifying users and confirmed 9 known bugs.

They also discovered that, if vendors did not update the Android system properly with secure patches, then hackers could force a downgrade to previous vulnerable versions of trusted applications and retrieve sensitive information, compromising the entire Android ecosystem throughout the three layered architecture. The researchers scanned over 35,000 trusted applications deployed across numerous phone manufacturers.

“Android is a complex ecosystem with many different vendors and devices. Patching security vulnerabilities is complex,” says Mao, PhD candidate with the HexHive. “We followed industry standards by responsibly disclosing all our findings to the affected vendors and gave them 90 days to develop patches for their systems – which they did – before publishing any details. The insights from our findings and our automated tooling will support securing future systems.”

What’s the bottom line for the consumers? To keep their system and apps up-to-date by installing updates whenever they become available, to download apps only through trusted app stores and to buy a device from a manufacturer that guarantees long update cycles. Busch observes that “for some of the manufactures we studied, time-to-market is the key metric which doesn’t leave much room for the diligence required for building secure systems.”



Article Title

EL3XIR: Fuzzing COTS Secure Monitors

Article Publication Date

14-Aug-2024

Share26Tweet16
Previous Post

Surprise Finding in study of environmental bacteria could advance search for better antibiotics

Next Post

ECU medical researchers confirm genetic link between Alzheimer’s and heart disease

Related Posts

blank
Technology and Engineering

Seismic Analysis of Masonry Facades via Imaging

August 16, 2025
blank
Technology and Engineering

Pediatric Pharmacogenomics: Preferences Revealed by Choice Study

August 16, 2025
blank
Technology and Engineering

Real-Time Water Monitoring in Aqueducts via Acoustic Sensing

August 16, 2025
blank
Technology and Engineering

Neonatal Cord Metabolome Links to Teen Heart Health

August 16, 2025
blank
Technology and Engineering

Unraveling Ion Transport in LISICON Structures

August 16, 2025
blank
Technology and Engineering

Enhancing Rheology of Silicon Nitride Resins for 3D Printing

August 16, 2025
Next Post

ECU medical researchers confirm genetic link between Alzheimer’s and heart disease

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27535 shares
    Share 11011 Tweet 6882
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    949 shares
    Share 380 Tweet 237
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    507 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    311 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Validating AI Ethics Scale for Nursing Students
  • How Identity Shapes New Nurses’ Turnover Intentions
  • Psychological Flexibility Shapes Lasting Effects of Childhood Trauma
  • New Metabolic Inflammation Model Explains Teen Reproductive Issues

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,859 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading