SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Apple Tankwatch
AAPL 255.53-1.0%Jan 16 9:30 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: sylvester8010/25/2011 8:37:46 AM
  Read Replies (1) of 32692
 
Android 4.0 ICS to be resistant to hack attacks
ASLR added to 'Ice Cream Sandwich'
By Dan Goodin in San Francisco
Posted in Security, 25th October 2011 06:00 GMT
theregister.co.uk

The newest version of Google's Android mobile operating system has been upgraded to make it harder for hackers to hijack handsets by exploiting code errors in the underlying code.

Android 4.0, aka Ice Cream Sandwich, has added a mitigation known as ASLR, or address space layout randomization. It works by routinely changing the memory locations where software components are loaded. As a result, it's much harder for attackers to execute malicious code even when they've identified an otherwise serious vulnerability because they don't know where Android will load their exploit's payload.

Microsoft Windows, Mac OS X and Apple's iOS rely on ASLR to minimize the risk of someone successfully attacking a system when targeting flaws that are inevitable in every complex piece of code.

“Android 4.0 now provides address space layout randomization (ASLR) to help protect system and third party applications from exploitation due to memory-management issues,” a note posted to the Android Developers blog said.

Ice Cream Sandwich has also been upgraded to more securely manage private keys used to encrypt data and authenticate websites.

“Any application can use the keychain API to install and store user certificates and CAs securely,” the blog post said. ®
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext