Risk
1/17/2012
02:14 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

NSA Releases Secure Android Version

National Security Agency publicly releases SE Android, a secure version of Google's Android platform that delivers app isolation and related security meausres.

The National Security Agency has made its first public release of SE Android, a secure version of Google's Android platform.

SE Android aims to close Android's security gaps by isolating apps from one another, mitigating problems with flawed or malicious apps, instituting permission and other security checks, restricting use of system facilities by apps, and taking related steps.

The project is based on SE Linux, a security-hardened version of Linux which the NSA initially released in 2000. Numerous parts of SE Linux were eventually integrated into the official Linux kernel and other Linux-based platforms. Android, too, is powered by Linux, so the fit is somewhat natural.

First announced at the Linux Security Summit in September, SE Android remains in early stages. There are not yet any pre-compiled builds of SE Android, so installation is anything but simple at this point. Those wishing to use SE Android will, for now, have to follow directions posted on the project's Web page. However, Android developers have already hit developer bulletin boards to discuss plans to release packaged versions.

One big focus of SE Android is application security. Application-level permissions control access to application components and system resources. A big change from SE Linux is that SE Android switches from Discretionary Access Control, which lets users set permissions, to Mandatory Access Control, which does not. This can, for example, prevent malicious apps from running processes that wipe a device of all data.

Sandboxing and process isolation also play large parts. Android SE isolates applications from one another and the system--unlike many apps on Google's Android Market that have broad permissions to access other apps and device elements like Bluetooth and the camera. Sandboxing prevents bypass of the application-level controls as well.

The NSA doesn't consider SE Android to be a panacea, according to a presentation from the Linux Security Summit, which cautions that SE Android is not a cure-all to mitigate all kernel vulnerabilities.

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.