Jelly Bean Is Hard To Exploit: Serial Hacker

jelly bean is hard to exploit: serial hacker

Google’s Android new version, Jelly Bean is hard to exploit, a serial hacker exposed this to ArsTechnica.Users using Jelly bean are more protected to hacker attacks which install malware on devices. Security researcher Jon Oberheide said [quote]Android version 4.1, aka Jelly Bean, is the first version of the Google-developed OS to properly implement a protection known as address space layout randomization.[/quote]

Android ASLR, the executable mapping in the process address space was not randomized in Ice Cream Sandwich, making ROP-style attacks possible but in Jelly Bean most binaries are now compiled/linked with the PIE flag to properly randomize executable mapping when executed. here are some improvements in Jelly bean which streghthen its security prior to old version of Android:

  • PIE (Position Independent Executable) support
  • Read-only relocations / immediate binding (-Wl,-z,relro -Wl,-z,now)
  • dmesg_restrict enabled (avoid leaking kernel addresses)
  • kptr_restrict enabled (avoid leaking kernel addresses)
  • Android is getting there, and Jelly Bean is a major step towards that goal.

Android is getting near Apple’s defense against these hacks, and Jelly Bean is a major step towards security defense.

Via: ArsTechnica

Simranpal Singh
Simranpal Singh
With a decade-long journey in the tech industry, I've been actively engaged in tech reporting across various reputable publications. He currently works as a Web Developer at RightNode Media and pursues his hobby of writing on GoAndroid. Enjoy travelling, and always excited about new tech trends. He actively contributes on GizmoChina and GChromecast Hub.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

You Might Like

Thing you should check

How To

Best Of