[ | E-mail | Share ]
Contact: Gordon Bolduan
gbolduan@mmci.uni-saarland.de
49-681-302-70741
Saarland University
"Malicious Android apps are becoming a mass plague" is the headline of a study published by a German software company for anti-virus programs in recent days. That this is not just a sales pitch is confirmed by the analysis of the governmental supported "Stiftung Warentest" consumer survey. In May last year, it categorized 37 popular apps as "critical" for the user's privacy.
"I am not surprised. My smartphone knows everything about me, starting with my name, my phone number, my e-mail address, my interests, up to my current location," explains computer science professor Michael Backes, who manages the Center for IT-Security, Privacy and Accountability at Saarland University.
To prevent smartphones and tablets turning into digital spies the researchers have developed a new method which works for the Android operating system. "Similar to a screening line, the method scans every selected app installed on the smartphone and indicates its real behavior: Accessing your private contacts, establishing a connection to the internet and checking your position", Backes explains. The user can now revoke or grant privileges to the respective app at any time. A company founded by Backes used the published method to develop an app named "SRT Appguard". It runs problem-free on Android 2.0 and higher. It is also now guaranteed that the guarded apps receive updates from the Google Play Store.
Technical background
For their approach, the Saarbrcken researchers use the fact that the Android apps, written in the programming language Java, run in a so-called virtual machine. Compared to other smartphone operating systems, a running app can access the storage of Android's virtual machine. That's when SRT Appguard comes into play. Before the suspicious app starts, Appguard scans the storage of the virtual machine to detect security-critical functions identified by the IT-security experts from Saarbrcken. It does not manipulate the bytecode anymore. Instead, it directs the function call within the virtual machine to the security monitor, which observes the suspicious method calls and can even block them.
###
The Center for IT-Security, Privacy and Accountability
CISPA is one of the three Competence Centers for IT security financed by the Federal Ministry of Education and Research. It develops methods and expertise which provide reliable, secure computer systems and promote their robustness against novel attacks. Moreover, it works out concepts to secure private data, protecting privacy as well as guaranteeing a free, responsible interaction between user and system. To develop solutions for the main problems of IT Security within the digital community, CISPA implements a holistic approach. It cooperates with international well-respected research institutes, which are only a few yards way in Saarbrcken: the Max Planck Institute for Informatics, the Max Planck Institute for Software Systems, the Cluster of Excellence "Mulitmodal Computing and Interaction" and the German Research Center for Artificial Intelligence (DFKI).
See also:
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei and Philipp von Styp-Rekowsky: The Android Monitor Real-time policy enforcement for third-party applications
http://www.infsec.cs.uni-saarland.de/projects/android-monitor/android-monitor.pdf
Download of SRT Appguard from the software register Heise.de
http://www.heise.de/download/srt-appguard-1187469.html
Center for IT-Security, Privacy and Accountability (CISPA)
www.cispa-security.de
For further information please contact:
Professor Dr. Michael Backes
Chair, CISPA
Phone: +49 681 302-3259
E-Mail: backes@cispa.uni-saarland.de
Sebastian Gerling
Administrative manager, CISPA
Phone: +49 681 302-57373
E-Mail: sgerling@cispa.uni-saarland.de
Editing:
Gordon Bolduan
Science Communication
Cluster of Excellence "Multimodal Computing and Interaction"
Phone: +49 681 302-70741
During Cebit: +49 0511/ 89497024
E-Mail: gbolduan@mmci.uni-saarland.de
[ | E-mail | Share ]
?
AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.
[ | E-mail | Share ]
Contact: Gordon Bolduan
gbolduan@mmci.uni-saarland.de
49-681-302-70741
Saarland University
"Malicious Android apps are becoming a mass plague" is the headline of a study published by a German software company for anti-virus programs in recent days. That this is not just a sales pitch is confirmed by the analysis of the governmental supported "Stiftung Warentest" consumer survey. In May last year, it categorized 37 popular apps as "critical" for the user's privacy.
"I am not surprised. My smartphone knows everything about me, starting with my name, my phone number, my e-mail address, my interests, up to my current location," explains computer science professor Michael Backes, who manages the Center for IT-Security, Privacy and Accountability at Saarland University.
To prevent smartphones and tablets turning into digital spies the researchers have developed a new method which works for the Android operating system. "Similar to a screening line, the method scans every selected app installed on the smartphone and indicates its real behavior: Accessing your private contacts, establishing a connection to the internet and checking your position", Backes explains. The user can now revoke or grant privileges to the respective app at any time. A company founded by Backes used the published method to develop an app named "SRT Appguard". It runs problem-free on Android 2.0 and higher. It is also now guaranteed that the guarded apps receive updates from the Google Play Store.
Technical background
For their approach, the Saarbrcken researchers use the fact that the Android apps, written in the programming language Java, run in a so-called virtual machine. Compared to other smartphone operating systems, a running app can access the storage of Android's virtual machine. That's when SRT Appguard comes into play. Before the suspicious app starts, Appguard scans the storage of the virtual machine to detect security-critical functions identified by the IT-security experts from Saarbrcken. It does not manipulate the bytecode anymore. Instead, it directs the function call within the virtual machine to the security monitor, which observes the suspicious method calls and can even block them.
###
The Center for IT-Security, Privacy and Accountability
CISPA is one of the three Competence Centers for IT security financed by the Federal Ministry of Education and Research. It develops methods and expertise which provide reliable, secure computer systems and promote their robustness against novel attacks. Moreover, it works out concepts to secure private data, protecting privacy as well as guaranteeing a free, responsible interaction between user and system. To develop solutions for the main problems of IT Security within the digital community, CISPA implements a holistic approach. It cooperates with international well-respected research institutes, which are only a few yards way in Saarbrcken: the Max Planck Institute for Informatics, the Max Planck Institute for Software Systems, the Cluster of Excellence "Mulitmodal Computing and Interaction" and the German Research Center for Artificial Intelligence (DFKI).
See also:
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei and Philipp von Styp-Rekowsky: The Android Monitor Real-time policy enforcement for third-party applications
http://www.infsec.cs.uni-saarland.de/projects/android-monitor/android-monitor.pdf
Download of SRT Appguard from the software register Heise.de
http://www.heise.de/download/srt-appguard-1187469.html
Center for IT-Security, Privacy and Accountability (CISPA)
www.cispa-security.de
For further information please contact:
Professor Dr. Michael Backes
Chair, CISPA
Phone: +49 681 302-3259
E-Mail: backes@cispa.uni-saarland.de
Sebastian Gerling
Administrative manager, CISPA
Phone: +49 681 302-57373
E-Mail: sgerling@cispa.uni-saarland.de
Editing:
Gordon Bolduan
Science Communication
Cluster of Excellence "Multimodal Computing and Interaction"
Phone: +49 681 302-70741
During Cebit: +49 0511/ 89497024
E-Mail: gbolduan@mmci.uni-saarland.de
[ | E-mail | Share ]
?
AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.
Source: http://www.eurekalert.org/pub_releases/2013-02/su-csf022713.php
andrew shaw hologram pulitzer prize winners nfl 2012 schedule gmail down tim lincecum ryan oneal
No comments:
Post a Comment