Navigation path

Themes
Agriculture & food
Energy
Environment
ERA-NET
Health & life sciences
Human resources & mobility
Industrial research
Information society
  E-Commerce
  Information technology
  Internet
  Microelectronics and nanotechnology
  Multimedia
  Telecommunications
  Other
Innovation
International cooperation
Nanotechnology
Pure sciences
Research infrastructures
Research policy
Science & business
Science in society
Security
SMEs
Social sciences and humanities
Space
Special Collections
Transport

Countries
Countries
  Argentina
  Australia
  Austria
  Belarus
  Belgium
  Brazil
  Bulgaria
  Cameroon
  Canada
  Chile
  China
  Colombia
  Croatia
  Cyprus
  Czech Republic
  Denmark
  Egypt
  Estonia
  Ethiopia
  Finland
  France
  Georgia
  Germany
  Ghana
  Greece
  Hungary
  Iceland
  India
  Ireland
  Israel
  Italy
  Jamaica
  Japan
  Kazakhstan
  Kenya
  Korea
  Latvia
  Lithuania
  Luxembourg
  Malta
  Mexico
  Morocco
  Netherlands
  Nigeria
  Norway
  Peru
  Poland
  Portugal
  Romania
  Russia
  Senegal
  Serbia
  Slovakia
  Slovenia
  South Africa
  Spain
  Sri Lanka
  Swaziland
  Sweden
  Switzerland
  Taiwan
  Tunisia
  Turkey
  Uganda
  Ukraine
  United Kingdom
  United States


   Headlines

Last Update: 23-05-2012  
Related category(ies):
Information society  |  Research policy

 

Add to PDF "basket"

Android vulnerability neutralised

Smart phones and tablet computers — once the latest must-have devices for technology geeks — are becoming increasingly more popular with the mainstream. The Android platform is now one of the most popular platforms with over 300 million Android devices in use since February and 700 000 devices being activated with each passing day. One of its main attractions is the open source software that allows a huge community of program developers to write applications. But with so many people contributing to this innovation, the operating system is open to bugs and security holes. In a new study, however, researchers in Italy may have neutralised any potential problems. Their study was funded in part by the SPACIOS (‘Secure provision and consumption in the Internet of services’) project, which is backed with EUR 3.35 million under the 'Information and communication technologies' (ICT) Theme of the EU's Seventh Framework Programme (FP7).

EU researchers have discovered and neutralised a major threat to Android software © Shutterstock
EU researchers have discovered and neutralised a major threat to Android software
©  Shutterstock

Researchers from the Bruno Kessler Foundation, the University of Genoa, Telematic University E-Campus and the University of Padua in Italy embarked on their project with one idea in mind: to revolutionise the way ICT systems and applications are designed, implemented, deployed and consumed. They foresee an Internet of Services (IoS) whereby business functionalities are designed and implemented by producers, deployed by providers, aggregated by intermediaries and used by consumers. This, they say represents a major mind shift in the way programs and applications are traditionally developed; these would be built by composing services that are distributed over the network and aggregated and consumed at run-time in a demand-driven, flexible way.

In applying and developing their new methodology the researchers discovered a major susceptibility present in all versions of Android, a popular operating system developed by Google — famous for its search engine, specifically for smart phones and tablet computers. This, they say, could very well have been exploited by malicious software applications. Some malicious software (malware) have the ability the ability to “brick” devices, what experts describe as a device that can no longer be used and is about as useful as a brick.

Once the weakness in the platform was found the researchers immediately reported it to Google and to the Android security team as well as providing them with a detailed analysis of related risks. Once they made their report they then went one step further and designed a solution to the risk which was then verified by the security team of Android. The researchers hope that once its effectiveness is proven it will then be adopted in a future operating system update.

If the team had not acted as they did, the weakness could have allowed malicious application software to saturate the physical resources of the device, leading to complete blockage of both Android-based smart phones and tablet computers. The problem with malware is its insidiousness because these applications do not require any authorisation during installation and would appear harmless to the user until it is too late.

The result compiled by the Italian research team will be published during the proceedings of the 27th IFIP International Information Security and Privacy Conference - SEC 2012, which will be held in Heraklion, Crete, Greece, on June 4-6, 2012.


Convert article(s) to PDF

No article selected


loading


Search articles

Notes:
To restrict search results to articles in the Information Centre, i.e. this site, use this search box rather than the one at the top of the page.

After searching, you can expand the results to include the whole Research and Innovation web site, or another section of it, or all Europa, afterwards without searching again.

Please note that new content may take a few days to be indexed by the search engine and therefore to appear in the results.

Print Version
Share this article
See also

Bruno Kessler Foundation
SPACIOS
IFIP International Information Security and Privacy Conference





  Top   Research Information Center