PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Georgia Tech research identifies Android security weaknesses caused by performance design

Work uncovers a future direction for binary software exploitation

2014-06-19
(Press-News.org) Georgia Tech researchers have identified a weakness in one of Android's security features and will present their work at Black Hat USA 2014, which will be held August 6-7 in Las Vegas.

The research, titled Abusing Performance Optimization Weaknesses to Bypass ASLR, identifies an Android performance feature that weakens a software protection called Address Space Layout Randomization (ASLR), leaving software components vulnerable to attacks that bypass the protection. The work is aimed at helping security practitioners identify and understand the future direction of such attacks.

The work was conducted at the Georgia Tech Information Security Center (GTISC) by Ph.D. students Byoungyoung Lee and Yeongjin Jang and research scientist Tielei Wang, and reveals that the introduction of performance optimization features can inadvertently harm the security guarantees of an otherwise vetted system. In addition to describing how vulnerabilities originate from such designs, they demonstrate real attacks that exploit them.

"To optimize object tracking for some programming languages, interpreters for the languages may leak address information," said Lee, lead researcher for the effort. "As a concrete example, we'll demonstrate how address information can be leaked in the Safari web browser by simply running some JavaScript."

Bypassing ASLR using hash table leaks was previously believed to be obsolete due to its complexity. By exhaustively investigating various language implementations and presenting concrete attacks, the research aims to show that the concern is still valid.

"As part of our talk, we'll present an analysis of the Android Zygote process creation model," Lee said. "The results show that Zygote weakens ASLR as all applications are created with largely identical memory layouts. To highlight the issue, we'll show two different ASLR bypass attacks using real applications – Google Chrome and VLC Media Player."

INFORMATION: The Black Hat Briefings were created approximately 16 years ago to provide computer security professionals a place to learn the very latest in information security risks, research and trends. Presented by the brightest in the industry, the briefings cover everything from critical information infrastructure to widely used enterprise computer systems to the latest InfoSec research and development. These briefings are vendor-neutral, allowing the presenters to speak candidly about the real problems and potential solutions across both the public and private sectors.


ELSE PRESS RELEASES FROM THIS DATE:

NASA and NAU researchers welcome unexpected asteroid findings

NASA and NAU researchers welcome unexpected asteroid findings
2014-06-19
What seemed to be rock-solid assumptions about the nature of small asteroids may end in collections of rubble or even a cloud of dust, but in such findings lies the lure of the unexpected. Northern Arizona University researchers David Trilling and Michael Mommert, while playing a well-defined role in the NASA Asteroid Initiative, are beginning to wonder if they have found a separate path of investigation. The two researchers presented their findings about asteroid 2011 MD on Thursday during a NASA event updating progress on the path to capturing a small asteroid and ...

A new tool to confront lung cancer

A new tool to confront lung cancer
2014-06-19
Only 15% of patients with squamous cell lung cancer – the second most common lung cancer – survive five years past diagnosis. Little is understood about how the deadly disease arises, preventing development of targeted therapies that could serve as a second line of defense once standard chemotherapy regimens fail. Published online in Cell Reports on June 19, Huntsman Cancer Institute investigators report that misregulation of two genes, sox2 and lkb1, drives squamous cell lung cancer in mice. The discovery uncovers new treatment strategies, and provides a clinically relevant ...

A better imager for identifying tumors

A better imager for identifying tumors
2014-06-19
WASHINGTON, June 19, 2014—Before they excise a tumor, surgeons need to determine exactly where the cancerous cells lie. Now, research published today in The Optical Society's (OSA) journal Optics Letters details a new technique that could give surgeons cheaper and more lightweight tools, such as goggles or hand-held devices, to identify tumors in real time in the operating room. The new technology, developed by a team at the University of Arizona and Washington University in St. Louis, is a dual-mode imager that combines two systems—near-infrared fluorescent imaging to ...

Swiftly moving gas streamer eclipses supermassive black hole

Swiftly moving gas streamer eclipses supermassive black hole
2014-06-19
Astronomers have discovered strange and unexpected behaviour around the supermassive black hole at the heart of the galaxy NGC 5548. The international team of researchers detected a clumpy gas stream flowing quickly outwards and blocking 90 percent of the X-rays emitted by the black hole. This activity could provide insights into how supermassive black holes interact with their host galaxies. The discovery of the unusual behaviour in NGC 5548 is the result of an intensive observing campaign using major ESA and NASA space observatories, including the NASA/ESA Hubble Space ...

LLNL, MIT researchers develop new ultralight, ultrastiff 3D printed materials

2014-06-19
LIVERMORE, Calif. – Imagine a material with the same weight and density as aerogel -- a material so light it's called 'frozen smoke' -- but with 10,000 times more stiffness. This material could have a profound impact on the aerospace and automotive industries as well as other applications where lightweight, high-stiffness and high-strength materials are needed. Lawrence Livermore and Massachusetts Institute of Technology (MIT) researchers have developed a material with these properties using additive micro-manufacturing processes. The research team's findings are published ...

Kids with strong bonds to parents make better friends, can adapt in relationships

2014-06-19
URBANA, Ill. – What social skills does a three-year-old bring to interactions with a new peer partner? If he has strong bonds to his parents, the child is likely to be a positive, responsive playmate, and he'll be able to adapt to a difficult peer by asserting his needs, according to a new University of Illinois study published in Developmental Psychology. "Securely attached children are more responsive to suggestions or requests made by a new peer partner. A child who has experienced a secure attachment relationship with caregivers is likely to come into a new peer relationship ...

Mechanism discovered for attaching an 'on' switch that helps cells accessorize proteins

2014-06-19
(MEMPHIS, Tenn. – June 19, 2014) St. Jude Children's Research Hospital scientists have discovered how an important "on" switch is attached to the machinery that cells rely on to adapt thousands of proteins to meet changing conditions. The research appears in the current issue of the journal Cell. The switch is a small protein called NEDD8. Problems with NEDD8 have been associated with several cancers, developmental disorders and infectivity of the human immunodeficiency virus (HIV), which causes AIDS. Drugs that target NEDD8 are in anti-cancer clinical trials. The ability ...

Drug shows promise for the first time against metastatic melanoma of the eye

Drug shows promise for the first time against metastatic melanoma of the eye
2014-06-19
NEW YORK, NY (June 19, 2014) — For the first time, a therapy has been found that can delay progression of metastatic uveal melanoma, a rare and deadly form of melanoma of the eye. Results from a multicenter clinical trial show that a new drug called selumetinib increases progression-free survival, the length of time during and after treatment that a patient with metastases lives with the disease without it progressing. The findings were published today in the online edition of JAMA, the Journal of the American Medical Association. "Although the effects of the drug were ...

RNA aptamers targeted to plasminogen activator inhibitor

RNA aptamers targeted to plasminogen activator inhibitor
2014-06-19
New Rochelle, NY, June 19, 2014—Plasminogen activators are proteins involved in the breakdown of blood clots, and an elevated level of plasminogen activator inhibitor-1 (PAI-1) is associated with an increased risk for clotting and cardiovascular disease. No PAI-1 inhibitors are currently available for clinical use, but a novel therapeutic approach using a targeted RNA aptamer drug that has been shown to block PAI-1 activity and prevent PAI-1-associated vascular events is described in Nucleic Acid Therapeutics, a peer-reviewed journal from Nucleic Acid Therapeutics. The ...

Humans & monkeys of one mind when it comes to changing it

2014-06-19
Covert changes of mind can be discovered by tracking neural activity when subjects make decisions, researchers from New York University and Stanford University have found. Their results, which appear in the journal Current Biology, offer new insights into how we make decisions and point to innovative ways to study this process in the future. "The methods used in this study allowed us to see the idiosyncratic nature of decision making that was inaccessible before," explains Roozbeh Kiani, an assistant professor in NYU's Center for Neural Science and the study's lead author. ...

LAST 30 PRESS RELEASES:

Singles differ in personality traits and life satisfaction compared to partnered people

President Biden signs bipartisan HEARTS Act into law

Advanced DNA storage: Cheng Zhang and Long Qian’s team introduce epi-bit method in Nature

New hope for male infertility: PKU researchers discover key mechanism in Klinefelter syndrome

Room-temperature non-volatile optical manipulation of polar order in a charge density wave

Coupled decline in ocean pH and carbonate saturation during the Palaeocene–Eocene Thermal Maximum

Unlocking the Future of Superconductors in non-van-der Waals 2D Polymers

Starlight to sight: Breakthrough in short-wave infrared detection

Land use changes and China’s carbon sequestration potential

PKU scientists reveals phenological divergence between plants and animals under climate change

Aerobic exercise and weight loss in adults

Persistent short sleep duration from pregnancy to 2 to 7 years after delivery and metabolic health

Kidney function decline after COVID-19 infection

Investigation uncovers poor quality of dental coverage under Medicare Advantage

Cooking sulfur-containing vegetables can promote the formation of trans-fatty acids

How do monkeys recognize snakes so fast?

Revolutionizing stent surgery for cardiovascular diseases with laser patterning technology

Fish-friendly dentistry: New method makes oral research non-lethal

Call for papers: 14th Asia-Pacific Conference on Transportation and the Environment (APTE 2025)

A novel disturbance rejection optimal guidance method for enhancing precision landing performance of reusable rockets

New scan method unveils lung function secrets

Searching for hidden medieval stories from the island of the Sagas

Breakthrough study reveals bumetanide treatment restores early social communication in fragile X syndrome mouse model

Neuroscience leader reveals oxytocin's crucial role beyond the 'love hormone' label

Twelve questions to ask your doctor for better brain health in the new year

Microelectronics Science Research Centers to lead charge on next-generation designs and prototypes

Study identifies genetic cause for yellow nail syndrome

New drug to prevent migraine may start working right away

Good news for people with MS: COVID-19 infection not tied to worsening symptoms

Department of Energy announces $179 million for Microelectronics Science Research Centers

[Press-News.org] Georgia Tech research identifies Android security weaknesses caused by performance design
Work uncovers a future direction for binary software exploitation