Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2013-07-03 21:46:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
An interesting Android package verification vulnerability
Bluebox Security claims
to have found a way to modify code contained within an Android application
package without breaking the associated cryptographic signature.
"All Android applications contain cryptographic signatures, which
Android uses to determine if the app is legitimate and to verify that the
app hasn’t been tampered with or modified. This vulnerability makes it
possible to change an application’s code without affecting the
cryptographic signature of the application – essentially allowing a
malicious author to trick Android into believing the app is unchanged even
if it has been.
" The problem was evidently disclosed to Google in
February; details are promised at the Black Hat USA
conference
starting July 27.


(Читать комментарии) (Добавить комментарий)