Skip to main content

Security Firm Claims It Can Exploit Latest Android OS Vulnerabilities

Security Firm, Nomotion Software LLC, releases findings that the Android Open Source Project is Susceptible to Attacks on the Vendor Side

San Antonio, United States - October 10, 2016 /PressCable/

The Android Open Source Project (AOSP), which is the latest initiative created to guide development of Google’s Android mobile platform, may be susceptible to security threats. According to a document released by Nomotion Software LLC, a security company based in San Antonio that focuses on mobile security research and Internet of Things technologies, the latest Android device for certain vendors may still allow data dumping and partial memory dumps.

Stated in the document released:

” Research Summary

This research seeks to outline a method for physical acquisition of Android devices equipped with the latest Android Open Source Project (AOSP) security patches using proprietary diagnostic protocols. Using the Nexus 5X as a test case, we explore recovery of hardware-backed keys and decryption of user data and demonstrate successful cold-boot attacks on devices which enforce verified boot and which implement TrustZone® technology.

The goal is to derive enough information from the device(s) to completely decrypt the contents of a hardware-backed Android Phone. While most of the initial research leverages the LG Flash tool, we are approaching the analysis on a broader level to support more than one variant of the Android devices.

The research was a spinoff of an Android forensics course the company is working on: A start-to-finish overview of the forensic process for Android devices. Topics include techniques in acquisition of both RAM and nonvolatile storage, cracking and decryption of FDE, use of Volatility to enumerate and analyze memory samples, collection and analysis of Android malware, collection of digital evidence from key-locked/encrypted mobiles, and passive gathering of information from nearby devices. “

According to an interview with the media firm BLCKsite, Nomotion Software CEO, Orlando Padilla, stated that “Our research is still in its preliminary testing stage, but we have identified several vectors for possible attacks. More information will become available as we continue exploring possible threats.”

For more information, please visit http://www.nomotion.net/

Contact Info:
Name: Nomotion Software
Email: Support@nomotion.net
Organization: Nomotion Software
Address: 6243 Cypress Cir.
Phone: (210) 504-8225

Release ID: 137268

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.