Jerusalem: Scientists have developed an innovative firewall<\/a> programme that can protect smartphones from malicious codes and security threats.<\/p>\n Earlier this year, researchers from the Ben-Gurion University of the Negev (BGU) in Israel discovered a security vulnerability in the internal communications between Android<\/a> cellphone components and a phone's central processing unit (CPU<\/a>).<\/p>\n They alerted Android<\/a> developer Google<\/a> and helped the company address the problem.<\/p>\n \n\t\"Our technology doesn't require device manufacturers to understand or modify any new code,\" said Yossi Oren from BGU.<\/p>\n \n\t\"It's a firewall<\/a> that can be implemented as a tiny chip, or as an independent software module running on the CPU<\/a>,\" said Oren.<\/p>\n \n\tSome 400 million people change their phone's components, such as touchscreens, chargers, and battery or sensor assemblies, which are all susceptible to significant security breaches and attacks.<\/p>\n \n\tThese components, referred to as \"field replaceable units (FRUs),\" communicate with the phone CPU over simple interfaces with no authentication mechanisms or error detection capabilities.<\/p>\n \n\tA malicious vendor could add a compromised FRU to a phone, leaving it vulnerable to password and financial theft, fraud, malicious photo or video distribution, and unauthorized app downloads.<\/p>\n \n\t\"This problem is especially acute in the Android market with many manufacturers that operate independently,\" researchers said.<\/p>\n \n\t\"An attack of this type occurs outside the phone's storage area; it can survive phone factory resets, remote wipes and firmware updates. Existing security solutions cannot prevent this specific security issue,\" they said.<\/p>\n \n\t\"There is no way for the phone itself to discover that it's under this type of an attack. Our solution prevents a malicious or misconfigured FRU from compromising the code running on the CPU by checking all the incoming and outgoing communication,\" said Omer Schwartz from BGU.<\/p>\n \n\tThe research team uses machine learning algorithms to monitor the phones' internal communications for anomalies that may indicate malicious code.<\/p>\nThe software allowed them to identify and prevent hardware-generated data leaks and hacks. The researchers are seeking to further test the patent-pending technology with phone manufacturers. \n\n<\/body>","next_sibling":[{"msid":59384909,"title":"Trai recommends cut in USOF, SUC and 5% GST for telcos","entity_type":"ARTICLE","link":"\/news\/trai-recommends-cut-in-usof-suc-and-5-gst-for-telcos\/59384909","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":59385333,"entity_type":"ARTICLE","title":"New firewall protects smartphones from security threat","synopsis":"Wipes and firmware updates.Existing security solutions cannot.","titleseo":"telecomnews\/new-firewall-protects-smartphones-from-security-threat","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2017-06-30 15:32:21","lastupd":"2017-06-30 15:34:23","breadcrumbTags":["firewall","Google","android","Smartphone","CPU","Devices"],"secinfo":{"seolocation":"telecomnews\/new-firewall-protects-smartphones-from-security-threat"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2017-06-30" data-index="article_1">
耶路撒冷:科学家已经开发出一种创新防火墙计划,可以保护手机免受恶意代码和安全威胁。 今年早些时候,本-古里安大学的研究人员在以色列内盖夫学者所发现的安全漏洞之间的内部沟通安卓手机组件和手机的中央处理单元(CPU)。 “我们的技术不需要设备制造商了解或修改任何新代码,“从BGU Yossi奥伦说。 “这是一个防火墙可以实现为一个微型芯片,或作为一个独立软件模块上运行CPU,”奥伦说。 大约4亿人改变手机的组件,如触摸屏、充电器、电池或传感器组件,都容易受到重大的安全漏洞和攻击。 这些组件,称为“现场可更换单元(FRUs),“与手机CPU在简单的通信接口,没有身份验证机制或错误检测能力。 恶意供应商可以添加一个妥协FRU电话,离开它容易受到密码和金融盗窃、欺诈、恶意照片或视频分布和未经授权的应用程序下载。 “这问题尤其严重与许多制造商在安卓市场,独立运作,”研究人员说。 “这种类型的攻击发生在手机的存储区域;它可以电话工厂重置,远程擦手巾和固件更新。现有安全解决方案无法阻止这个特定的安全问题,”他们说。 “手机本身没有办法发现这种类型的攻击下。我们的解决方案可以防止恶意或错误配置的FRU妥协在CPU上运行的代码检查所有传入和传出的交流,从学者所“俄梅珥施瓦茨说。 研究小组使用机器学习算法来监控手机的内部通信异常,可能表明恶意代码。
Jerusalem: Scientists have developed an innovative firewall<\/a> programme that can protect smartphones from malicious codes and security threats.<\/p>\n Earlier this year, researchers from the Ben-Gurion University of the Negev (BGU) in Israel discovered a security vulnerability in the internal communications between Android<\/a> cellphone components and a phone's central processing unit (CPU<\/a>).<\/p>\n They alerted Android<\/a> developer Google<\/a> and helped the company address the problem.<\/p>\n \n\t\"Our technology doesn't require device manufacturers to understand or modify any new code,\" said Yossi Oren from BGU.<\/p>\n \n\t\"It's a firewall<\/a> that can be implemented as a tiny chip, or as an independent software module running on the CPU<\/a>,\" said Oren.<\/p>\n \n\tSome 400 million people change their phone's components, such as touchscreens, chargers, and battery or sensor assemblies, which are all susceptible to significant security breaches and attacks.<\/p>\n \n\tThese components, referred to as \"field replaceable units (FRUs),\" communicate with the phone CPU over simple interfaces with no authentication mechanisms or error detection capabilities.<\/p>\n \n\tA malicious vendor could add a compromised FRU to a phone, leaving it vulnerable to password and financial theft, fraud, malicious photo or video distribution, and unauthorized app downloads.<\/p>\n \n\t\"This problem is especially acute in the Android market with many manufacturers that operate independently,\" researchers said.<\/p>\n \n\t\"An attack of this type occurs outside the phone's storage area; it can survive phone factory resets, remote wipes and firmware updates. Existing security solutions cannot prevent this specific security issue,\" they said.<\/p>\n \n\t\"There is no way for the phone itself to discover that it's under this type of an attack. Our solution prevents a malicious or misconfigured FRU from compromising the code running on the CPU by checking all the incoming and outgoing communication,\" said Omer Schwartz from BGU.<\/p>\n \n\tThe research team uses machine learning algorithms to monitor the phones' internal communications for anomalies that may indicate malicious code.<\/p>\nThe software allowed them to identify and prevent hardware-generated data leaks and hacks. The researchers are seeking to further test the patent-pending technology with phone manufacturers. \n\n<\/body>","next_sibling":[{"msid":59384909,"title":"Trai recommends cut in USOF, SUC and 5% GST for telcos","entity_type":"ARTICLE","link":"\/news\/trai-recommends-cut-in-usof-suc-and-5-gst-for-telcos\/59384909","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":59385333,"entity_type":"ARTICLE","title":"New firewall protects smartphones from security threat","synopsis":"Wipes and firmware updates.Existing security solutions cannot.","titleseo":"telecomnews\/new-firewall-protects-smartphones-from-security-threat","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2017-06-30 15:32:21","lastupd":"2017-06-30 15:34:23","breadcrumbTags":["firewall","Google","android","Smartphone","CPU","Devices"],"secinfo":{"seolocation":"telecomnews\/new-firewall-protects-smartphones-from-security-threat"}}" data-news_link="//www.iser-br.com/news/new-firewall-protects-smartphones-from-security-threat/59385333">
评论
现在评论 阅读评论(1)所有评论
找到这个评论进攻?
下面选择你的理由并单击submit按钮。这将提醒我们的版主采取行动