TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Cloak and dagger – a new kind of attacks for Android

157 点作者 elsombrero将近 8 年前

6 条评论

izacus将近 8 年前
Note that Android O now clearly shows a warning when an app is rendering an overlay - probably the reason why the issues were marked wontfix.<p>As usual, getting the fix on the older versions is a whole different story.<p>The other Google failing here is the whole permission thing - since 6.0 Android apps need to ask for permissions for drawing over other app. However, for some really baffling reason Google still lets us publish APKs that target API below 6.0, which automatically triggers fallback mode which grants permissions at install time. Why I have no idea.
评论 #14414881 未加载
tptacek将近 8 年前
This seems like a refinement of &quot;tap-jacking&quot;, which is a pretty well-known UI redressing attack for Android apps, and works in a way that is somewhat similar to &quot;clickjacking&quot; on web pages --- an invisible frame is rendered on top of the application that captures inputs (as opposed to an opaque frame that obscures the legitimate application and tricks you into interacting with it).<p>The big limitation on these attacks is that you have to install a malicious application <i>and then</i> trick people into getting to a situation where the application can interact with a specific target; that&#x27;s something that should be straightforward for app stores to screen for.
评论 #14414195 未加载
评论 #14414133 未加载
评论 #14416597 未加载
评论 #14414340 未加载
etjossem将近 8 年前
From the section marked &quot;Responsible Disclosure&quot;:<p>&gt; Current — All the attacks discussed by this work are still practical, even with latest version of Android (Android 7.1.2, with security patches of May 5th installed).<p>Honest question - does HN feel this is actually responsible disclosure? A large number of Android devices seem to be vulnerable to the issue, and the whitepaper includes exploit details. Is the intent to force Google to pay attention to the issue?
评论 #14413956 未加载
评论 #14414007 未加载
评论 #14414136 未加载
评论 #14414179 未加载
评论 #14413964 未加载
评论 #14414527 未加载
评论 #14416169 未加载
snorlaxle将近 8 年前
The impact of this vulnerability would not have been as bad if only android let the user disable background apps easily and reliably.
评论 #14415035 未加载
IshKebab将近 8 年前
Android should totally disable draw-on-top while security-sensitive UI elements are visible like password fields and permission dialogs. Seems like an easy fix.
评论 #14417231 未加载
评论 #14416552 未加载
rubatuga将近 8 年前
As cynical and unoriginal as I may sound, I could only expect such an exploit for android, and not iOS.