• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Google Increases Android Security With Memory-Safe Programming Languages

You are here: Home / General Cyber Security News / Google Increases Android Security With Memory-Safe Programming Languages
December 2, 2022

The annual variety of memory basic safety vulnerabilities in Android dropped from 223 in 2019 to 85 in 2022 as Google slowly transitioned in the direction of memory-safe and sound languages.

The tech big built the announcement in a blog site write-up on Thursday, in which it wrote that for in excess of a 10 years, 65% of all vulnerabilities throughout solutions and the sector were memory safety flaws.

“On Android, we’re now looking at a little something unique – a significant fall in memory safety vulnerabilities and an involved fall in the severity of our vulnerabilities,” Google wrote.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This fall coincides with a change in programming language use away from memory unsafe languages. Android 13 is the very first Android launch the place a vast majority of new code extra to the release is in a memory-safe language.”

Far more especially, the organization claimed that from 2019 to 2022, the amount has dropped from 76% down to 35% of Android’s whole vulnerabilities.

“2022 is the very first yr where memory basic safety vulnerabilities do not symbolize a the greater part of Android’s vulnerabilities,” Google wrote.

“While correlation doesn’t essentially indicate causation, it is appealing to take note that the percent of vulnerabilities caused by memory basic safety issues seems to correlate alternatively closely with the advancement language which is made use of for new code.”

In point, aid for the Rust programming language was initially introduced in Android 12 as a memory-safe alternate to C/C++.

“As we famous in the first announcement, our purpose is not to transform current C/C++ to Rust, but rather to shift development of new code to memory-protected languages in excess of time.”

In accordance to the Search agency, around 21% of all new indigenous code in Android 13 is in Rust, across distinct elements of the OS, together with Keystore2, the new Ultra-wideband (UWB) stack, DNS-more than-HTTP3 and Android’s Virtualization Framework (AVF), among others.

“To date, there have been zero memory protection vulnerabilities learned in Android’s Rust code,” Google explained.

“We really do not count on that variety to keep zero without end, but specified the quantity of new Rust code throughout two Android releases, and the security-sensitive factors wherever it is becoming utilized, it is a important result.”

Although Rust can be utilised to reduce memory safety vulnerabilities in Android, the programming language is also staying leveraged by threat actors to raise the complexity of malware applications.


Some parts of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News ‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity
Next Post: Google Rolls Out New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability google rolls out new chrome browser update to patch yet»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors
  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.