{"id":9058,"date":"2017-09-01T08:45:22","date_gmt":"2017-09-01T16:45:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/01\/news-2831\/"},"modified":"2017-09-01T08:45:22","modified_gmt":"2017-09-01T16:45:22","slug":"news-2831","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/01\/news-2831\/","title":{"rendered":"Android Oreo&#8217;s Security Improvements Will Have a Lasting Impact"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59a8508dfb5fbc7d7601e4df\/master\/pass\/android_oreo-01-FA.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 01 Sep 2017 16:40:12 +0000<\/strong><\/p>\n<p data-reactid=\"247\"><!-- react-text: 248 -->Android&#x27;s recently released <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2017\/03\/android-o\/\" data-reactid=\"249\"><!-- react-text: 250 -->Oreo update<!-- \/react-text --><\/a><!-- react-text: 251 --> packs in plenty of features, including a battery life boost and a notifications rethink. But Oreo&#x27;s most important improvements will happen behind the scenes, with a host of security updates designed to evolve with ever-expanding digital threats. From halting ransomware to blocking malicious apps and easing Android&#x27;s longstanding fragmentation woes, Oreo tackles some big problems. For the security developers who work behind the scenes, though, it&#x27;s just one more step on a journey that never really ends.<!-- \/react-text --><\/p>\n<p data-reactid=\"252\"><!-- react-text: 253 -->With over two billion monthly active devices, the majority of them not on the latest\u2014or even recent\u2014version, Android presents a popular target for hackers. Stopping them takes more than a yearly release. It takes the kind of longview, holistic effort that Google has employed for years.<!-- \/react-text --><\/p>\n<p data-reactid=\"254\"><!-- react-text: 255 -->&quot;It\u2019s funny how much the world focuses on the launch of a specific product. In the security world that approach doesn\u2019t really work,&quot; says Adrian Ludwig, the director of Android Security. &quot;Sometimes a change we made three years ago becomes relevant this year, or a change we\u2019re making now becomes relevant four years from now. It\u2019s iterative, we make changes with every release. Visibility and quick response go hand in hand with the ability to make longer-term changes and bake them into the platform.&quot;<!-- \/react-text --><\/p>\n<p data-reactid=\"256\"><!-- react-text: 257 -->Android Security&#x27;s long view may be an asset, but the group doesn&#x27;t waste the chance to capitalize on the more tangible benefits of Android&#x27;s marketshare and Google&#x27;s reach. Virtually all the new defense features in Android Oreo stem from or were informed by analysis to spot trends in threat data, Google Play activity, and user behavior.<!-- \/react-text --><\/p>\n<p data-reactid=\"258\"><!-- react-text: 259 -->\u201cThere hasn\u2019t been a huge widespread bug that affects every single version of Android recently, but there are still a lot of critical vulnerabilities that are affecting the core Android framework and platform,\u201d says Andrew Blaich, a security researcher who specializes in Android at the mobile security firm Lookout. \u201cBut with the Oreo security updates they\u2019re at least minimizing the impact because there is an update mechanism in place. And Google is able to react quicker to a lot of [security incidents] now, which is a good thing.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"262\"><!-- react-text: 263 -->Just how much more secure will Oreo make your phone? That depends in part on if and when you&#x27;ll get the update. But assuming you do, it&#x27;s quite a haul.<!-- \/react-text --><\/p>\n<p data-reactid=\"266\"><!-- react-text: 267 -->Take Google Play Protect, part of Android Security\u2019s detection and reaction infrastructure, which scans devices for suspicious app activity. With 50 billion apps scanned per day, precision counts.<!-- \/react-text --><\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"281\">Android Oreo: You\u2019ll Want It, Even If You Can\u2019t Get It<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"291\">Good News: Android\u2019s Huge Security Problem Is Getting Less Huge<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"301\">Say Goodbye to the Blob. Google&#39;s New Emoji Have Arrived<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"311\">Android O, Google\u2019s Next OS, Is Coming to Save Your Phone\u2019s Battery<\/p>\n<p data-reactid=\"312\"><!-- react-text: 313 -->The app scanning that goes into Play Protect has existed behind the scenes under other names for years, but Android Security surfaced the mechanism for customers this year and, and has used it to do a new type of visibility research. Android data scientist Megan Ruthven and others have developed techniques for detecting distribution of extremely targeted malware, the type that might be narrowly distributed to high-value marks. So far, Ruthven&#x27;s research has turned up 3,000 unique samples of malware, each with an average of just 130 users affected. This ability to detect such a faint signal helps protect each individual user, while also allowing Android Security to spot nascent threats early. &quot;Google Play Protect has such a high penetration rate over all Android devices that we are able to find these specific, targeted spywares,&quot; Ruthven says.<!-- \/react-text --><\/p>\n<p data-reactid=\"314\"><!-- react-text: 315 -->Android\u2019s scanners don\u2019t catch everything, though, and researchers still regularly find malicious software that has made it past Google\u2019s protections to land in the Play Store. In August alone, third-party analysts discovered hundreds of <!-- \/react-text --><a href=\"http:\/\/asic.gov.au\/about-asic\/media-centre\/find-a-media-release\/2017-releases\/17-257mr-asic-targets-unlicensed-binary-option-mobile-apps\/\" target=\"_blank\" data-reactid=\"316\"><!-- react-text: 317 -->compromised financial apps<!-- \/react-text --><\/a><!-- react-text: 318 -->, <!-- \/react-text --><a href=\"https:\/\/blog.lookout.com\/igexin-malicious-sdk\" target=\"_blank\" data-reactid=\"319\"><!-- react-text: 320 -->spyware<!-- \/react-text --><\/a><!-- react-text: 321 -->, and even apps that spread malware to <!-- \/react-text --><a href=\"https:\/\/blogs.akamai.com\/2017\/08\/the-wirex-botnet-an-example-of-cross-organizational-cooperation.html\" target=\"_blank\" data-reactid=\"322\"><!-- react-text: 323 -->build Android botnets<!-- \/react-text --><\/a><!-- react-text: 324 --> and power DDoS attacks.<!-- \/react-text --><\/p>\n<p data-reactid=\"325\"><!-- react-text: 326 -->Despite those recent fumbles, the <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\" data-reactid=\"327\"><!-- react-text: 328 -->dangers of downloading apps from third-party app stores<!-- \/react-text --><\/a><!-- react-text: 329 --> far exceed those posed by mainstream apps in Google Play. So Android Security implemented small but significant changes in Oreo, aimed at regularly reminding users about what types of apps they\u2019re downloading. For example, in previous versions of Android a user could enable downloads from outside of Google Play through a setting called \u201cUnknown Sources.&quot; Beginning with Oreo, users now receive a prompt to confirm that they want to download any \u201cUnknown Source\u201d app before doing so, as a more salient reminder to proceed with caution.<!-- \/react-text --><\/p>\n<p data-reactid=\"330\"><!-- react-text: 331 -->\u201cIt\u2019s a unique challenge to really balance this desire to provide openness and powerful capabilities to users while at the same time protecting users,\u201d says Xiaowen Xin, a product manager for Android platform security. \u201cIt\u2019s something we struggle with every day and something we work hard on every day.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"336\"><!-- react-text: 337 -->Android Security also takes a broad view. When tracking emerging attacks, the team doesn&#x27;t just rely on Android-specific data, but also surveys the general web to trace malware families and monitor malicious infrastructure. &quot;There is a common misconception that we in Android Security look only at apps that are submitted into Google Play,&quot; says Android malware analyst Elena Kovakina. &quot;But in reality we have a pretty robust way of getting apps from diverse sources.&quot; Google Play Protect and other detection services gather industry data, and the team even develops relationships with third-parties, like banks, that experience a diverse array of attempted cyberattacks.<!-- \/react-text --><\/p>\n<p data-reactid=\"338\"><!-- react-text: 339 -->In the case of mobile ransomware, a small but growing type of attack, Android already had some defense advantages because it silos every app into a &quot;sandbox,&quot; rather than letting them all run together in an open environment. As a result, Android can contain malicious activity more effectively than a more open platform like Windows.<!-- \/react-text --><\/p>\n<p data-reactid=\"342\"><!-- react-text: 343 -->While tracking 30 families of Android ransomware, the team discovered versions that exploited flaws to block users from accessing their phone at the lockscreen, through visual overlays, and by encrypting some data. Oreo adds reinforcements to Android&#x27;s sandboxing to plug many of these holes. The team also says that to this point it has still never seen ransomware that can render an Android device completely unusable.<!-- \/react-text --><\/p>\n<p data-reactid=\"344\"><!-- react-text: 345 -->&quot;On Android we said from the very beginning that something where one application can destroy the entire environment around itself is just not acceptable,&quot; Ludwig says. &quot;And then what\u2019s happened iteratively with each of the major releases is we\u2019ve found out about little areas where applications could be disruptive and we\u2019ve become better at detecting them.&quot;<!-- \/react-text --><\/p>\n<p data-reactid=\"350\"><!-- react-text: 351 -->The ongoing challenge to Android security, regardless of what new features Google introduces, remains its fragmented market. Because Android is open, equipment manufacturers and carriers often tailor it to their devices. Those deviations from stock Android can slow the update process considerably. Today, 86 percent of Android device owners use versions that are at least two years old. In contrast, because of Apple\u2019s more controlled ecosystem and update pipeline, 87 percent of iOS devices had adopted the latest release, iOS 10, by the end of July.<!-- \/react-text --><\/p>\n<p data-reactid=\"352\"><!-- react-text: 353 -->\u201cAttackers are still able to get a lot of mileage out of all those old vulnerabilities that are still there in so many devices,\u201d Lookout&#x27;s Blaich says. \u201cEspecially depending on where they\u2019re attacking across the world they can get a lot of usability out of known vulnerabilities.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"356\"><!-- react-text: 357 -->&#x27;It\u2019s a unique challenge to really balance this desire to provide openness and powerful capabilities to users, while at the same time protecting users.&#x27; \u2014Xiaowen Xin, Android Security<!-- \/react-text --><\/p>\n<p data-reactid=\"358\"><!-- react-text: 359 -->Android Security has already worked to bring a number of big device makers on to a monthly update schedule, which has helped improve fragmentation a bit. The effort has a number of limitations, though; only a <!-- \/react-text --><a href=\"https:\/\/www.androidcentral.com\/just-42-android-models-have-been-updated-security-patch-from-last-2-months\" target=\"_blank\" data-reactid=\"360\"><!-- react-text: 361 -->few dozen models<!-- \/react-text --><\/a><!-- react-text: 362 --> end up getting regular updates. So Oreo is working to address the tension head-on with a new feature called Project Treble. The goal? Make Android easier to update regardless of device and carrier, by segmenting Android\u2019s code into portions that interact with vendor-specific attributes and portions that deal with the more general, platform-agnostic operating system. Ideally, that makes it possible to push software updates to the core Android component of every device without dealing with vendor-specific incompatibilities. Manufacturers could also ship updates for their tailored portions of the code.<!-- \/react-text --><\/p>\n<p data-reactid=\"363\"><!-- react-text: 364 -->Separating general Android functionality from manufacturer-specific code has tangible security benefits a well. \u201cUpdatability is a big part of it, but Treble is also really good for helping us sandbox different parts of the operating system,\u201d Xin says. \u201cThere\u2019s now this contrast between the [pure Android] pieces and the device-dependent pieces. If you have an exploit in one side, it is now much harder for that to then exploit the other.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"365\"><!-- react-text: 366 -->Project Treble won\u2019t solve Android\u2019s adoption rate issues instantly, or even within the next year. But as it comes to more devices, it could bring about a monumental security shift without dismantling Android\u2019s central identity as an open-source platform.<!-- \/react-text --><\/p>\n<p data-reactid=\"369\"><!-- react-text: 370 -->Though many security features are conceptually broad to protect against a variety of both present and future unknown threats, Android Security developers note that they have some additional foresight into where attackers will focus simply because they know where they have already bolstered their defenses and made attacks impractical.<!-- \/react-text --><\/p>\n<p data-reactid=\"373\"><!-- react-text: 374 -->\u201cWhere we choose to invest pushes the attackers around,\u201d Ludwig says. \u201cIt\u2019s not strictly cyclical, but what we\u2019ve seen on Android is we invested a lot in the remote attack surface that\u2019s the most exposed, like the Chrome Browser, and that has gotten to be quite strong. And then we invested at the area that was most exposed to applications, and that got to the point where it\u2019s quite strong. So now you actually have to have a fairly privileged application on the device to be able to take advantage of any kernel-level issues.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"375\"><!-- react-text: 376 -->In practice, here&#x27;s how that plays out: In 2014 only about four percent of Android bugs targeted the kernel (the central coordinator of an operating system). By 2016 the number was up to 44 percent, because security enhancements had cut off easier routes for attackers. \u201cNow it\u2019s actually really hard to compromise Android, and people started to look for the next thing to target and that turned out to be the kernel,\u201d Xin says. \u201cIf you\u2019re able to compromise the kernel you get access to everything\u2014you can exploit the rest of the system. So we did a lot of work to harden the various aspects of the kernel.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"377\"><!-- react-text: 378 -->The Android Security team can\u2019t be sure of what attacks will spike in the future, and Oreo will give them a leg up regardless. But whatever is up next, the team won&#x27;t be waiting until the big 2018 Android release to combat it.<!-- \/react-text --><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/android-oreo-security-improvements\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59a8508dfb5fbc7d7601e4df\/master\/pass\/android_oreo-01-FA.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 01 Sep 2017 16:40:12 +0000<\/strong><\/p>\n<p>The security improvements in Android Oreo will have impacts beyond this one release.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-9058","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9058"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9058\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9058"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}