Jon Oberheide

Analyzing ASLR in Android Ice Cream Sandwich 4.0

When I first saw the release notes for the new Android Ice Cream Sandwich (ICS) platform, I was excited to see that Google mentioned that “Android 4.0 now provides address space layout randomization”. For the uninitiated, ASLR randomizes where various areas of memory (eg. stack, heap, libs, etc) are mapped in the address space of a process. Combined with complementary mitigation techniques such as non-executable memory protection (NX, XN, DEP, W^X, whatever you want to call it), ASLR makes the exploitation of traditional memory corruption vulnerabilities probabilistically difficult.

When Angry Birds Attack: Android Edition

It’s been about six months since I reported a vulnerability in the
Android mobile platform that allowed the unprompted installation of
arbitrary applications with arbitrary permissions on a victim’s device.
While the vulnerability has long been fixed on Android handsets around
the world, I’ve yet to write up any technical details about it, and it’s
unlikely you’ve heard of it unless you were present at our ShmooCon presentation earlier this year. So without further ado, let’s dive into “When Angry Birds attack: Android edition.”