{"id":13895,"date":"2014-08-22T17:06:41","date_gmt":"2014-08-22T22:06:41","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=13895"},"modified":"2014-08-22T17:23:38","modified_gmt":"2014-08-22T22:23:38","slug":"hacking-gmail-with-92-percent-success","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=13895","title":{"rendered":"Hacking Gmail with 92 Percent Success"},"content":{"rendered":"<blockquote><p>The researchers monitor changes in shared memory and are able to correlate changes to what they call an \u201cactivity transition event,\u201d which includes such things as a user logging into Gmail or H&amp;R Block or a user taking a picture of a check so it can be deposited online, without going to a physical CHASE Bank. Augmented with a few other side channels, the authors show that it is possible to fairly accurately track in real time which activity a victim app is in.<\/p>\n<p>There are two keys to the attack. One, the attack needs to take place at the exact moment the user is logging into the app or taking the picture. Two, the attack needs to be done in an inconspicuous way. The researchers did this by carefully calculating the attack timing.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/ucrtoday.ucr.edu\/24266\">UCR Today: Hacking Gmail with 92 Percent Success<\/a>.<\/p>\n<blockquote><p>The researchers created three short videos that show how the attacks work. They can be viewed here: <a href=\"http:\/\/bit.ly\/1ByiCd3\">http:\/\/bit.ly\/1ByiCd3<\/a>.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The researchers monitor changes in shared memory and are able to correlate changes to what they call an \u201cactivity transition event,\u201d which includes such things as a user logging into Gmail or H&amp;R Block or a user taking a picture &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=13895\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[285],"tags":[102,880,698,436],"class_list":["post-13895","post","type-post","status-publish","format-standard","hentry","category-cpe","tag-hacking","tag-mobile-data","tag-security-research","tag-smartphones"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13895"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13895\/revisions"}],"predecessor-version":[{"id":13897,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13895\/revisions\/13897"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13895"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}