Home > SmartMobile Phones & Tablets > Researchers Find That Not All Androids Are Equally Secure

Researchers Find That Not All Androids Are Equally Secure


Researchers at North Carolina State University (NCSU) have published a paper which details differences in Android security across eight models.

According to the results, only three phones “properly” enforced Android’s permission-based security model.

The declaration is that Google’s Nexus One and Nexus S phones with baseline Android configurations as well as the Motorola Droid “were basically clean“. Yet the pre-installed applications added by the manufacturers and carriers includes a considerable hazard of successful malicious attack to phones, says Xuxian Jiang, an assistant professor of computer science at NCSUand co-author of a paper describing the research.

HTC’s Legend, EVO 4G and Wildfire S, Motorola’s Droid X and Samsung’s Epic 4G showed “significant vulnerabilities”.  The EVO 4G was the most vulnerable phone with eight leaked permissions in the test. The Legend and the Wildfire had six leaks each, followed by the Wildfire and Droid X with four leaks each.

Jiang also reported,

Some of these pre-loaded applications, or features, are designed to make the smartphones more user-friendly, such as features that notify you of missed calls or text messages.  The problem is that these pre-loaded apps are built on top of the existing Android architecture in such a way as to create potential ‘backdoors’ that can be used to give third-parties direct access to personal information or other phone features.

The researchers said that they notified the software vendors of the discovered vulnerabilities prior to the release of the report and recommend that users should keep up with security updates from software vendors to protect themselves from attacks.


Source: tomsguide

  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: