Firefox OS likely to face HTML5, Boot-to-Gecko process attacks

Trend Micro predicts where hackers will look for weak points in the mobile OS

The Firefox OS, a new contender in mobile operating systems, will likely see HTML5-related attacks and assaults on a crucial operating system process, according to security vendor Trend Micro.

Some mobile phone operators are already shipping devices with the Firefox OS, which comes from Mozilla, the nonprofit organization behind the Firefox desktop browser.

Mozilla's Firefox OS seeks to challenge the dominance of Android and iOS, Google and Apple's operating systems. Firefox OS is geared toward high-performance, low-cost phones running applications using the HTML5 web programming language.

Firefox OS borrows much from the Firefox mobile browser and Gecko application framework, which is used to render Web pages and display applications. The platform underpinning Firefox OS, called Boot to Gecko (B2G), borrows 95 percent of its code from the mobile browser and Gecko, according to Mozilla.

The mobile OS uses a Linux kernel, which then boots into the Gecko runtime. The top layer of the technology stack, called Gaia, generates the interface seen by users.

Trend Micro pinpointed what the company believes are avenues for hackers to exploit. As more people use smartphones, attackers are increasingly looking for ways to exploit mobile devices.

Firefox OS is built around HTML5, the latest version of the open standard web programming language that is designed to be more interactive and multimedia friendly.

"Though the Firefox OS may not enjoy the market of the Android OS, the use of HTML5 is gradually gaining traction among users (Amazon also accepts HTML5 for its apps)," wrote Peter Pi, a threats analyst for Trend. "Thus, regardless of OS, we can expect that as more apps and sites will use HTML5, we can expect such attacks to increase in the future."

B2G contains a process within the OS that enforces permissions granted to applications and prevents unauthorized requests by those applications, Pi wrote.

Some applications can request more permissions, but those requests must be verified and signed by an application store, Pi wrote. The B2G process has high privileges and vets those requests. Mozilla has acknowledged B2G is a possible attack vector, he wrote.

"If this process is exploited, an attacker can obtain high-level privileges (like root access)," Pi wrote.

A vulnerability found last month, which was actually fixed in the course of repairing a different flaw in June, caused the B2G process to crash. Pi noted it could have allowed an attacker to run arbitrary code on a device with the same high privileges as the B2G process.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags securityMobile OSesExploits / vulnerabilitiesmobilemozilla

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?