[Q] Statistical analysis of Android shared memory leads to critical security issues.

3 posts
Thanks Meter: 0
By kung fu grep, Junior Member on 23rd August 2014, 04:39 AM
Post Reply Subscribe to Thread Email Thread
This was released today but there does not appear to be much info on whether this is already in the wild. It would be almost undetectable.

Apparently it is possible to use statistical analysis of the size of the surfaceflinger off-screen buffer to predict with 90% accuracy what another app is doing. All an attacker needs is an application that runs in the background, and does not require any special permissions. Once it determines that a user is entering his password, for example, it can bring to the foreground an identical looking password dialog and capture the login data. Since the user expects this behavior, they may never notice.

So far all I could find is the actual paper:

And some videos of a proof of concept have been posted:

The question is: has this been seen in the wild? Seems like a very serious threat without an obvious fix...
Post Reply Subscribe to Thread

Guest Quick Reply (no urls or BBcode)
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes