Newsletter
Newsletter Support JNS

Tel Aviv university researchers find hacking loophole in Samsung phone

The vulnerability, discovered by researchers at Tel Aviv University, would have allowed the theft of sensitive information.

Samsung Galaxy Z Flip3 5G and Samsung Galaxy Z Fold3 5G. Credit: Wikimedia Commons.
Samsung Galaxy Z Flip3 5G and Samsung Galaxy Z Fold3 5G. Credit: Wikimedia Commons.

Tel Aviv University researchers and Samsung are advising users to make sure they have updated their Galaxy series phones after a loophole was found that could expose user data.

TAU researchers identified the loophole last year and contacted Samsung in May 2021, which released a software update to fix the problem in October. The researchers’ work in identifying the loophole, which would have given hackers the ability to steal sensitive information, will be presented in August at the USENIX conference. It has already been published as a preprint on the International Association for Cryptologic Research (IACR) website—released in coordination with Samsung to ensure that hackers could not take advantage of their research.

“In protecting smartphones using the Android system, there is a special component called TrustZone,” said professor Avishai Wool of TAU’s School of Electrical Engineering, who led the study. “This component is a combination of hardware and software, and its job is to protect our most sensitive information—the encryption and identification keys. We found an error in the implementation of Samsung’s TrustZone code, which allowed hackers to extract encryption keys and access secure information.”

Phone companies like Samsung go to enormous lengths to secure their phones, according to Eyal Ronen, who also worked on the study. He said TrueZone is meant to be like an “internal safe” so that even the most sophisticated hacking technology cannot access a person’s most sensitive information.

“If I approve a bank transfer using a fingerprint, the fingerprint enters the phone’s TrustZone, and hackers will have no way to use the fingerprint to carry out transactions in my bank account,” said Ronen. “In our article, we showed that failures in Samsung’s code also allowed access to these sensitive cryptographic keys.”

Alon Shakevsky, a master’s degree student, worked for months on extracting the code from the device so that the team could investigate it. But a few weeks ago, hackers broke into Samsung’s database and leaked its code, said Wool.

“The information that was previously confidential is today available to everyone, including researchers like us,” he said. “Therefore, the lesson for phone companies should be to publish the code in advance. Let the experts and researchers check the architecture, and not rely too much on the code’s secrecy. A secret code never guarantees longevity, because it will eventually leak. In the end, we helped Samsung.”

Vail, Colo., asked the public to help it locate the stolen banner.
“This effort is about specifically using academic resources in ways that others haven’t,” Alan Kadish, the university president, told JNS.
The Israeli military said that Golani troops also uncovered an arms cache during a targeted ground operation in southern Lebanon.
Antoine Kassis, 59, faces a mandatory minimum of 20 years and up to life in prison.
“Antisemitism has no place in our society,” stated Andrew Boutros, U.S. attorney for the Northern District of Illinois.
“Markwayne truly gets along well with people,” U.S. President Donald Trump has said.