Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hacking Gmail with 92 Percent Success
by Staff Writers
Riverside CA (SPX) Aug 28, 2014


There are two keys to the attack. One, the attack needs to take place at the exact moment the user is logging into the app or taking the picture. Two, the attack needs to be done in an inconspicuous way. The researchers did this by carefully calculating the attack timing.

A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.

The researchers tested the method and found it was successful between 82 percent and 92 percent of the time on six of the seven popular apps they tested. Among the apps they easily hacked were Gmail, CHASE Bank and H&R Block. Amazon, with a 48 percent success rate, was the only app they tested that was difficult to penetrate.

The paper, "Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks ," will be presented at the 23rd USENIX Security Symposium in San Diego.

Authors of the paper are Zhiyun Qian, of the Computer Science and Engineering Department at UC Riverside; Z. Morley Mao, an associate professor at the University of Michigan; and Qi Alfred Chen, a Ph.D. student working with Mao.

The researchers believe their method will work on other operating systems because they share a key feature researchers exploited in the Android system. However, they haven't tested the program using the other systems.

The researchers started working on the method because they believed there was a security risk with so many apps being created by some many developers. Once a user downloads a bunch of apps to his or her smart phone they are all running on the same shared infrastructure, or operating system.

"The assumption has always been that these apps can't interfere with each other easily," Qian said. "We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user."

The attack works by getting a user to download a seemingly benign, but actually malicious, app, such as one for background wallpaper on a phone. Once that app is installed, the researchers are able to exploit a newly discovered public side channel - the shared memory statistics of a process, which can be accessed without any privileges. (Shared memory is a common operating system feature to efficiently allow processes share data.)

The researchers monitor changes in shared memory and are able to correlate changes to what they call an "activity transition event," which includes such things as a user logging into Gmail or H&R Block or a user taking a picture of a check so it can be deposited online, without going to a physical CHASE Bank. Augmented with a few other side channels, the authors show that it is possible to fairly accurately track in real time which activity a victim app is in.

There are two keys to the attack. One, the attack needs to take place at the exact moment the user is logging into the app or taking the picture. Two, the attack needs to be done in an inconspicuous way. The researchers did this by carefully calculating the attack timing.

"By design, Android allows apps to be preempted or hijacked," Qian said. "But the thing is you have to do it at the right time so the user doesn't notice. We do that and that's what makes our attack unique."

The researchers created three short videos that show how the attacks work. They can be viewed here: http://bit.ly/1ByiCd3.

Here is a list of the seven apps the researchers attempted to attack and their success rates: Gmail (92 percent), H&R Block (92 percent), Newegg (86 percent), WebMD (85 percent), CHASE Bank (83 percent), Hotels.com (83 percent) and Amazon (48 percent).

Amazon was more difficult to attack because its app allows one activity to transition to almost any other activity, increasing the difficulty of guessing which activity it is currently in.

Asked what a smart phone user can do about this situation, Qian said, "Don't install untrusted apps." On the operating system design, a more careful tradeoff between security and functionality needs to be made in the future, he said. For example, side channels need to be eliminated or more explicitly regulated.

.


Related Links
University of California, Riverside
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
High fingerprint matching rate for NEC technology
Irving, Texas (UPI) Aug 22, 2014
Fingerprint identification technology from NEC Corporation of America achieved top place in testing by the U.S. National Institute of Standards and Technology. The company said its system achieved a 99.47 percent success rate in matching prints in the Proprietary Fingerprint Template Test, which evaluated 120,000-subject datasets. That score was more than 20 percent higher than t ... read more


CYBER WARS
Electric Sparks May Alter Evolution of Lunar Soil

China to test recoverable moon orbiter

China to send orbiter to moon and back

August supermoon will be brightest this year

CYBER WARS
Opportunity Mars Rover Suffers a Series of Resets

Mars Rover Team Chooses Not to Drill 'Bonanza King'

Indian orbiter to reach Mars in 33 days

Mars thigh bone is really just a rock spotted by Curiosity

CYBER WARS
US to Stop Using Soyuz Spacecraft, Invest in Domestic Private Space Industry

25 Years After Neptune: Reflections on Voyager

Long-term spaceflights challenged as harm to astronauts' health revealed

Voyager Map Details Neptune's Strange Moon Triton

CYBER WARS
Same-beam VLBI Tech monitors Chang'E-3 movement on moon

China Sends Remote-Sensing Satellite into Orbit

More Tasks for China's Moon Mission

China's Circumlunar Spacecraft Unmasked

CYBER WARS
NASA Awaits Boeing's Completion of Soyuz Replacement

Belka and Strelka, the canine cosmonauts

Russian Cosmonauts Conclude EVA Ahead of Schedule

Orbital cargo ship makes planned re-entry to Earth

CYBER WARS
Sea Launch Takes Proactive Steps to Address Manifest Gap

SpaceX rocket explodes during test flight

Russian Cosmonauts Carry Out Science-Oriented Spacewalk Outside ISS

Optus 10 delivered to French Guiana for Ariane 5 Sept launch

CYBER WARS
Rotation of Planets Influences Habitability

Planet-like object may have spent its youth as hot as a star

Young binary star system may form planets with weird and wild orbits

Hubble Finds Three Surprisingly Dry Exoplanets

CYBER WARS
US Space Debris Tracking Site To Be Build In Western Australia

Experiments explain why some liquids are 'fragile' and others are 'strong'

The fluorescent fingerprint of plastics

Atoms to Product: Aiming to Make Nanoscale Benefits Life-sized




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.