Domain
Home | Free browsing | Technology | Gist | Entertainment | Free Beat | Mixtape | Music | Education | Video | Others
TRENDING POSTS 🔥
Home
Posts filed under Phones
Showing posts with label Phones. Show all posts
Showing posts with label Phones. Show all posts
Friday, 21 April 2017
Thursday, 6 April 2017
Android apps can conspire to mine information from your smartphone

Associate Professor of Computer Science Daphne Yao (left), Fang Liu, doctoral candidate (center), and Assistant Professor of Computer Science Gang Wang (right), are co-authors on a first-of-its-kind large scale and systematic study that evaluated collusion between Android smartphone apps.
Credit: Virginia Tech
Mobile phones have increasingly become the repository for the details that drive our everyday lives. But Virginia Tech researchers have recently discovered that the same apps we regularly use on our phones to organize lunch dates, make convenient online purchases, and communicate the most intimate details of our existence have secretly been colluding to mine our information.
Associate Professor Daphne Yao and Assistant Professor Gang Wang, both in the Department of Computer Science in Virginia Tech¹s College of Engineering, are part of a research team to conduct the first ever large-scale and systematic study of exactly how the trusty apps on Android phones are able to talk to one another and trade information.
Yao will present the team¹s findings in Dubai at the Association for Computing Machinery Asia Computer and Communications Security Conference on April 3.
"Researchers were aware that apps may talk to one another in some way, shape, or form," said Wang. "What this study shows undeniably with real-world evidence over and over again is that app behavior, whether it is intentional or not, can pose a security breach depending on the kinds of apps you have on your phone."
The types of threats fall into two major categories, either a malware app that is specifically designed to launch a cyberattack or apps that simply allow for collusion and privilege escalation. In the latter category, it is not possible to quantify the intention of the developer, so collusion, while still a security breach, can in many cases be unintentional.
In order to run the programs to test pairs of apps, the team developed a tool called DIALDroid to perform their massive inter-app security analysis. The study, funded by the Defense Advanced Research Projects Agency as part of its Automated Program Analysis for Cybersecurity initiative, took 6,340 hours using the newly developed DIALDroid software, a task that would have been considerably longer without it.
First author of the paper Amiangshu Bosu, an assistant professor at Southern Illinois University, spearheaded the software development effort and the push to release the code to the wider research community. Fang Liu, a fifth year Ph.D. candidate studying under Yao, also contributed to the malware detection research.
"Our team was able to exploit the strengths of relational databases to complete the analysis, in combination with efficient static program analysis, workflow engineering and optimization, and the utilization of high performance computing. Of the apps we studied, we found thousands of pairs of apps that could potentially leak sensitive phone or personal information and allow unauthorized apps to gain access to privileged data," said Yao, who is both an Elizabeth and James E. Turner Jr. '56 and L-3 Faculty Fellow.
The team studied a whopping 110,150 apps over three years including 100,206 of Google Play¹s most popular apps and 9,994 malware apps from Virus Share, a private collection of malware app samples. The set up for cybersecurity leaks works when a seemingly innocuous sender app like that handy and ubiquitous flashlight app works in tandem with a receiver app to divulge a user¹s information such as contacts, geolocation, or provide access to the web.
The team found that the biggest security risks were some of the least utilitarian. Apps that pertained to personalization of ringtones, widgets, and emojis.
"App security is a little like the Wild West right now with few regulations," said Wang. "We hope this paper will be a source for the industry to consider re-examining their software development practices and incorporate safeguards on the front end. While we can¹t quantify what the intention is for app developers in the non-malware cases we can at least raise awareness of this security problem with mobile apps for consumers who previosuly may not have thought much about what they were downloading onto their phones."
First Galaxy S9 rumor hits the web as Samsung preps for Galaxy S8 release

The Galaxy S8 is not even available in stores yet, and Samsung has already started developing its successor. While that may not sound surprising, it’s still a lot earlier than expected. And it’s great news for fans of Samsung’s flagship smartphones.
For starters, we know that Samsung is now simply too big to keep secrets. The company wasn’t able to prevent any Galaxy S8 leaks in the months preceding the phone’s launch. The earlier it starts developing the Galaxy S9, the more we’ll know about the phone.
But that’s not the real reason why it’s great to hear the Galaxy S9 development is underway. The fact that Samsung is working on the next-gen Galaxy S flagship some six months ahead of schedule suggests that Samsung is indeed paying extra attention to product quality, and that’s great news for buyers.
Furthermore, an early start may lead to an earlier launch. This year, Samsung had to postpone the Galaxy S8’s announcement and release to deal with the fallout of the Galaxy Note 7 recall, and to make sure its next flagship won’t see a similar fate.
A report from The Bell says the Galaxy S9 development started precisely because of the Galaxy Note 7 debacle last year.
“Since late last month, a display team for the S9 has started the development work with aims to supply samples from mid-April,” a source said. “About a month after the display, other key parts such as modules are expected to be developed in phases.”
The Galaxy S9 is expected to come in two sizes similar to the Galaxy S8, but other specific details aren’t known at this time.
The report also mentions the Galaxy Note 8, known internally as “Project Great,” which is also in development. The phone will supposedly have a 6.32-inch Infinity display and should feature a fingerprint sensor incorporated into the screen like Apple’s upcoming iPhone 8. Samsung is said to have tried to build the Galaxy S8’s fingerprint scanner into the display, but it couldn’t get the tech ready for mass production.
The Bell also says Samsung’s DJ Koh told reporters that Samsung is working on a foldable phone, but the timing of the launch hasn’t yet been decided. A report earlier this week said Samsung’s Galaxy X phone is at least two years away, dispelling rumors that the first foldable Galaxy handset would launch later this year.
Subscribe to:
Comments (Atom)
Information
MOST READ ARTICLES
Popular Posts
-
Techno Mobile Secret Codes # #232339#*#* Wireless LAN Test ##7764726 Hidden Service Menu For Motorola Droid #*#232337#*# To display Bluetoot...
-
S hort Code And USSD Codes For Call Barring Call Forwarding Call Waiting And Conference Calls It is easier to access call barring and call f...
-
Hello guys and welcome to today’s post on how to double your MTN data. Have you ever think that what if you. Could enjoy 100% of your dat...
-
Hey guys, do you know you can hack your 3G Netowrk and download up to 4gb file in few hours.Its bad when you have A 3G network that couldnt ...
-
Mtn 2go free chating 2014 Migrate to mtn FUNLINK by dialing on *440# s40 users to create a prov file with the IP and PORT below IP==>41.1...
-
Hi, Today Let me discuss about some secret codes that we developer and android users are not knowing mostly but it can be helpful to us in s...
-
Warning! We are not responsible to accident with your mobile phone. You trying these Nokia Secret Codes only at your own risk! We are not ad...


