Research & Development World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • Call for Nominations: The 2025 R&D 100 Awards
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
    • Explore the 2024 R&D 100 award winners and finalists
  • Resources
    • Research Reports
    • Digital Issues
    • R&D Index
    • Subscribe
    • Video
    • Webinars
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE

Researchers find some smartphone models more vulnerable to attack

By R&D Editors | November 30, 2011

New research from North Carolina State University shows that some
smartphones specifically designed to support the Android mobile platform have
incorporated additional features that can be used by hackers to bypass
Android’s security features, making them more vulnerable to attack. Android has
the largest share of the smartphone market in the U.S.

“Some of these pre-loaded applications, or features, are designed to make
the smartphones more user-friendly, such as features that notify you of missed
calls or text messages,” says Xuxian Jiang, PhD, an assistant professor of computer
science at NC State and co-author of a paper describing the research. “The
problem is that these pre-loaded apps are built on top of the existing Android
architecture in such a way as to create potential ‘backdoors’ that can be used
to give third-parties direct access to personal information or other phone
features.”

In essence, these pre-loaded apps can be easily tricked by hackers. For
example, these “backdoors” can be used to record your phone calls, send text
messages to premium numbers that will charge your account, or even completely
wipe out all of your settings.

The researchers have tested eight different smartphone models, including two “reference implementations” that were loaded only with Google’s baseline
Android software. “Google’s reference implementations and the Motorola Droid
were basically clean,” Jiang says. “No real problems there.”

However, five other models did not fare as well. HTC’s Legend, EVO 4G, and
Wildfire S; Motorola’s Droid X; and Samsung’s Epic 4G all had significant
vulnerabilities—with the EVO 4G displaying the most vulnerabilities.

The researchers notified manufacturers of the vulnerabilities as soon as
they were discovered, earlier this year.

“If you have one of these phones, your best bet to protect yourself moving
forward is to make sure you accept security updates from your vendor,” Jiang
says. “And avoid installing any apps that you don’t trust completely.”

Researchers now plan to test these vulnerabilities in other smartphone
models and determine whether third-party firmware has similar vulnerabilities.

The paper, “Systematic Detection of Capability Leaks in Stock Android
Smartphones,” will be presented at the 19th Network and Distributed System
Security Symposium.

SOURCE

Related Articles Read More >

NSF caps indirect costs at 15% for new university grants
NSF chief quits as DOGE drives 55% budget cut and grant freeze
China could outspend the U.S. on R&D by 30%‑plus by 2030—even if the trade war roars on
White House clampdown puts $1 billion more at risk after $2.3 billion Harvard freeze
rd newsletter
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, trends, and strategies in Research & Development.
RD 25 Power Index

R&D World Digital Issues

Fall 2024 issue

Browse the most current issue of R&D World and back issues in an easy to use high quality format. Clip, share and download with the leading R&D magazine today.

Research & Development World
  • Subscribe to R&D World Magazine
  • Enews Sign Up
  • Contact Us
  • About Us
  • Drug Discovery & Development
  • Pharmaceutical Processing
  • Global Funding Forecast

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search R&D World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • Call for Nominations: The 2025 R&D 100 Awards
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
    • Explore the 2024 R&D 100 award winners and finalists
  • Resources
    • Research Reports
    • Digital Issues
    • R&D Index
    • Subscribe
    • Video
    • Webinars
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE