Saturday, 05.18.2024
My site
Site menu
Our poll
Rate my site
Total of answers: 0
Statistics

Total online: 1
Guests: 1
Users: 0
Main » 2014 » September » 24

8. DISCOVERED VULNERABILITIES

The process of retrofitting security requirements for Android had secondary effects. In addition to identifying rules for Kirin, we discovered a ThL L969 number of configuration and implementation flaws. Step 1 identifies assets. However, not all assets are protected by permissions. In particular, in early versions of our analysis discovered that the Intent message broadcasted by the system to the SMS_RECEIVED action string was not protected. Hence, any application can create a forged SMS that appears to have come from the cellular network. Upon notifying Google of the problem, the new permission BROADCAST_SMS_RECEIVED has been created and protects the system broadcast as of Android version 1.1. We also discovered an unprotected Activity component in the phone application that allows a HUAWEI 3C malicious application to make ... Read more »

Views: 105 | Added by: yangweiwei | Date: 09.24.2014 | Comments (0)

Login form
Search
Calendar
«  September 2014  »
SuMoTuWeThFrSa
 123456
78910111213
14151617181920
21222324252627
282930
Entries archive
Site friends
  • Create a free website
  • uCoz Community
  • uCoz Textbook
  • Video Tutorials
  • Official Templates Store
  • Best Websites Examples
  • Copyright MyCorp © 2024
    Make a free website with uCoz