{"id":4232,"date":"2013-11-06T13:45:44","date_gmt":"2013-11-06T13:45:44","guid":{"rendered":"http:\/\/aiglesias.com\/?p=4232"},"modified":"2013-11-06T13:45:44","modified_gmt":"2013-11-06T13:45:44","slug":"investigadores-de-la-north-carolina-state-university-revelan-problemas-de-seguridad-en-android","status":"publish","type":"post","link":"https:\/\/aiglesias.com\/?p=4232","title":{"rendered":"Investigadores de la North Carolina State University revelan problemas de seguridad en Android"},"content":{"rendered":"<div id=\"attachment_1925\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1925\" class=\"size-full wp-image-1925\" alt=\"xperia-go-black-android-smartphone\" src=\"http:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone.png\" width=\"300\" height=\"348\" srcset=\"https:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone.png 300w, https:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone-258x300.png 258w, https:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone-127x148.png 127w, https:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone-26x31.png 26w, https:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone-32x38.png 32w, https:\/\/aiglesias.com\/wp-content\/uploads\/2013\/01\/xperia-go-black-android-smartphone-185x215.png 185w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-1925\" class=\"wp-caption-text\">xperia-go-black-android-smartphone<\/p><\/div>\n<p>Un grupo de investigadores de la <strong>North Carolina State University<\/strong> han revelado que las <strong>personalizaciones de Android<\/strong> que muchos fabricantes ofrecen en sus dispositivos son las responsables del 60% de los fallos de seguridad que se descubren en estos terminales.<!--more--><\/p>\n<p>Se espera que los responsables del estudio presenten un detallado informe en una <strong>conferencia sobre seguridad<\/strong> que la organizaci\u00f3n ACM est\u00e1 celebrando en Berl\u00edn estos d\u00edas.<\/p>\n<p>En su estudio los investigadores <strong>tuvieron en cuenta 10 smartphones de Android<\/strong>. Todos ellos hac\u00edan uso de distintas versiones de Android y adem\u00e1s de los modelos con personalizaciones y \u201cskins\u201d propietarios, otros como el Nexus 4 ofrec\u00edan un punto de referencia.<\/p>\n<p>Se dividieron las aplicaciones integradas en cada dispositivo en tres grupos: las pertenecientes al Android Open Source Project (AOSP), las que proven\u00edan de la personalizaci\u00f3n del fabricante, y las que proced\u00edan de terceras partes. Y en todas ellas <strong>estudiaron los permisos que necesitaban esas aplicaciones<\/strong> para poder ser ejecutadas en dichos terminales.<\/p>\n<p>EL<strong> 86%<\/strong> de las aplicaciones preinstaladas en esos smartphones ped\u00edan m\u00e1s permisos de los necesarios, y la mayor parte de esas aplicaciones tan \u201c<strong>glotonas de privilegios<\/strong>\u201c formaban parte de la selecci\u00f3n de los fabricantes.<\/p>\n<p>En sus conclusiones los investigadores indican que <strong>entre el 65% y el 85% de las 177 vulnerabilidades<\/strong> encontradas en los smartphones de <strong>Samsung, HTC<\/strong> o <strong>LG<\/strong> el origen estaba en las <strong>personalizaciones de los fabricantes<\/strong>. El<strong> 38%<\/strong> de las 16 vulnerabilidades de <strong>Sony<\/strong> proven\u00edan de esa misma fuente, lo que indica que el fabricante japon\u00e9s\u00a0<strong>Sony<\/strong> parece m\u00e1s cuidadoso en este terreno.<\/p>\n<p>V\u00eda : <a href=\"http:\/\/www.technologyreview.com\/news\/520846\/phone-makers-android-tweaks-cause-security-problems\/\" target=\"_blank\" rel=\"noopener\">MIT Technology Review<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un grupo de investigadores de la North Carolina State University han revelado que las personalizaciones de Android que muchos fabricantes ofrecen en sus dispositivos son las responsables del 60% de los fallos de seguridad que se descubren en estos terminales.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[313,4,13,1259,292],"tags":[1786,1788,1789,1790,3302,1787,1785,899,3286,1791],"class_list":["post-4232","post","type-post","status-publish","format-standard","hentry","category-android","category-general","category-noticias","category-seguridad","category-telefonia","tag-acm","tag-android-open-source-project","tag-aosp","tag-htc","tag-lg","tag-nexus-4","tag-north-carolina-state-university","tag-samsung-2","tag-seguridad","tag-sony"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1W0Q6-16g","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/aiglesias.com\/index.php?rest_route=\/wp\/v2\/posts\/4232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aiglesias.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aiglesias.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aiglesias.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aiglesias.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4232"}],"version-history":[{"count":3,"href":"https:\/\/aiglesias.com\/index.php?rest_route=\/wp\/v2\/posts\/4232\/revisions"}],"predecessor-version":[{"id":4235,"href":"https:\/\/aiglesias.com\/index.php?rest_route=\/wp\/v2\/posts\/4232\/revisions\/4235"}],"wp:attachment":[{"href":"https:\/\/aiglesias.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aiglesias.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aiglesias.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}