TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Attacking Android Binder

96 pointsby campuscodi12 months ago

3 comments

tripdout12 months ago
I'd love to have this in-depth level of knowledge of kernel inner workings. Super interesting writeup.
评论 #40579080 未加载
评论 #40584075 未加载
doodlesdev11 months ago
And again an extremely serious, device-compromising vulnerability, arises from a use-after-free. When will we learn?<p>I don&#x27;t think I&#x27;ll ever be able to trust modern devices until we finally abandon memory-unsafe languages. It&#x27;s such low hanging fruit at this point I don&#x27;t understand anymore why OS developers keep investing their time in other parts of the threat model of operating systems if memory usage vulnerabilities keep arising that completely destroy the existence of any security layer in the system.<p>Was Google&#x27;s plan to replace Android with Fuchsia? Is there any plan to get rid of these vulnerabilities (specially use-after-free) at scale on Android like the Chrome project has attempted with the MiraclePtr project?
评论 #40580163 未加载
评论 #40580425 未加载
评论 #40579583 未加载
评论 #40579750 未加载
评论 #40579454 未加载
评论 #40581248 未加载
评论 #40579955 未加载
评论 #40581609 未加载
vitiral11 months ago
&gt; The motivation for this design is that a client can send a transaction and then wait for a response with one ioctl syscall. In contrast, IPC with sockets requires two syscalls, send and recv.<p>What a great motivation. Oh wait, then you write your literal operating system and all services in Java of all languages.<p>I find Android&#x27;s architecture so frustrating, all the wrong design decisions
评论 #40589923 未加载
评论 #40582618 未加载
评论 #40581346 未加载