Mobile browser vulnerability lets hackers steal cloud computing time
Network World - A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of Oregon.
MORE MOBILE: The smartphone is 20 years old, believe it or notA
Cloud browsing uses outside computing power to process web pages and deliver them to end users, instead of doing the heavy lifting on the end-user's own device. The researchers say that the technique is particularly useful for mobile browsing, which would otherwise have to rely on a mobile device's less-powerful hardware. Opera Mini and Android Silk are the best-known browsers to use the technique, though there are others available.
However, the clouds used to do the heavy lifting can be tricked into doing a number of other things, according to the researchers, who have written a paper on the subject. They call the technique browser MapReduce or BMR.
The team tested its idea by storing pieces of data on URL shortening sites, effectively tricking both those sites and the cloud browser providers into performing computations for them. NCSU assistant professor William Enck, a co-author of the paper, said in a statement that the team limited the amount of data processed in this way to 100MB.
"It could have been much larger, but we did not want to be an undue burden on any of the free services we were using," he said.
Used maliciously, Enck added, the technique could provide hackers with vast, temporary and completely anonymous computing horsepower, allowing them to crack passwords or perform other nefarious tasks at great speed.
Depending on the scale of the attack, users may not notice anything is going on, he said in an email to Network World.
"[It] depends on how well-provisioned the cloud browser platform is, as well as how large of a job the attacker is executing. Cloud browsers operators who are monitoring resource use will definitely notice a spike in service use. However, reacting to BMR jobs requires the operator to build additional defenses into their framework," Enck said.
Enck and his fellow authors will present the paper - titled "Abusing Cloud-Based Browsers for Fun and Profit" - at the 2012 Annual Computer Security Applications Conference on Dec. 6 in Orlando.
Email Jon Gold at email@example.com and follow him on Twitter at @NWWJonGold.
Read more about wide area network in Network World's Wide Area Network section.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- ESG: The IBM FlashSystem 840: Technical Evolution to Deliver Business Value In this whitepaper, you will learn how this high-speed storage technology has tremendous potential to support I/O-intensive and/or latency-sensitive applications.
- Choosing an MDM Platform: Where to Start the Conversation If you're in the early stages of choosing an MDM solution, or you're considering switching vendors, here are seven critical questions to ask...
- Axeda Platform Technical Overview This paper summarizes the major features of an IoT platform and explains how they simplify and speed the process of developing and deploying...
- Stock Shock: The effect of project and portfolio management on share price In this independent report, you'll see the intrinsic connection between long-term capital investment and short term market performance -- and how this can...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cloud Computing White Papers | Webcasts