Security of Mobile Terminal & Cell Phone      McAfee Japan  Yoshihiro Kato   Cell Phone Environment & Virus in Japan
AGENDA <ul><li>Cell Phone in Japan Now </li></ul><ul><li>Transition of Internet Population in Japan </li></ul><ul><li>Viru...
Cell Phone in Japan Now Cell Phone Subscriptions in Japan (as of 30/Sep/04) Total 83,834  (unit: 1,000) Data Source: Telec...
Cell Phone in Japan Now 71% Total Number 83,467,800   (as of 31/Aug/04) 19% 3% 7% Data Source: Telecommunications Carriers...
Cell Phone in Japan Now Total   83,467,800      ( as of 31/Aug/04 ) 19% 4% 22% 56% Contractors by Carrier Data Source: Tel...
Transition of Internet Population in Japan Data Source: Telecommunications Carriers Association (TCA)
<ul><li>Web Access Service </li></ul><ul><li>Using Compact HTML </li></ul><ul><li>Mail Service </li></ul><ul><li>Mailing i...
Transition of Internet Population in Japan  (2) --- Example: NTTDoCoMo Services --- <ul><li>Cell Phone as Purse (FeliCa) <...
Approach to Cell Phone Security <ul><li>February 2001 </li></ul><ul><li>Start Studying the Possibility based on the Origin...
Virus Possibility in Cell Phone <ul><li>Java Implement  </li></ul><ul><li>API false movement  </li></ul><ul><li>Expand App...
Engineering Issues <ul><li>Operating System </li></ul><ul><li>Developing Compact Engine </li></ul><ul><li>Most makers adop...
Other Issues <ul><li>Cooperation between Cell Phone Maker & Carrier </li></ul><ul><li>Secure Engineers </li></ul><ul><li>M...
Required Functions <ul><li>Interrupt of All I/O </li></ul><ul><li>Renewal Function of Defined Information </li></ul><ul><l...
Cell Phone Structure & Service Overview Operating System  Micro I TRON Flash ROM  Driver  (Sound Flash-Mem)   API  Java VM...
Cell Phone Structure & Service Overview Inter-net Unjust Mail,Java etc. Unjust   Access   ASP System Carrier Phone Network...
Cell Phone Security in Future <ul><li>Offer Various Services  </li></ul><ul><li>Ticket Reservation, GPS  </li></ul><ul><li...
Cell Phone Security in Future <ul><li>Contents Access Control </li></ul><ul><li>Block Harmful Sites  </li></ul><ul><li>Ide...
Mobile Virus – Concept Virus <ul><li>WinCE/Duts (Jul/04) </li></ul><ul><li>Symbian/Cabir (Jun/04) </li></ul><ul><li>First ...
Thank you!
Upcoming SlideShare
Loading in …5
×

5/24/10 Confidential Security of Mobile Terminal

333 views
297 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
333
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Purpose This slide is to paint a picture of Network Associates IT, so that customers can compare their own infrastructure against our own. It sets the scene for later discussion of our installed base. Key Message(s) NAI is a Microsoft and IBM shop Large number of firewalls speaks to our zoned architecture and business environment Quantities (if asked) 4 P670’s and 3 P630’s 22 480R’s Exchange 56 Total Exchange Servers 33 Mailbox Servers 5306 Mailboxes
  • 5/24/10 Confidential Security of Mobile Terminal

    1. 1. Security of Mobile Terminal & Cell Phone      McAfee Japan Yoshihiro Kato   Cell Phone Environment & Virus in Japan
    2. 2. AGENDA <ul><li>Cell Phone in Japan Now </li></ul><ul><li>Transition of Internet Population in Japan </li></ul><ul><li>Virus Possibility in Cell Phone </li></ul><ul><li>Cell Phone Function & Service in Japan </li></ul><ul><li>Approach to Cell Phone Security </li></ul><ul><li>Engineering Issues </li></ul><ul><li>Required Functions </li></ul><ul><li>Cell Phone Structure & Service Overview </li></ul><ul><li>Cell Phone Security in Future </li></ul>
    3. 3. Cell Phone in Japan Now Cell Phone Subscriptions in Japan (as of 30/Sep/04) Total 83,834 (unit: 1,000) Data Source: Telecommunications Carriers Association (TCA) WW Cell Phone Shipment FCST (2004) Total 479,400 (unit: 1,000) Data Source: Japan Electronics and Information Technology Industries Association (JEITA) ・ Gartner FCST: 620M (Sep.2004) 3G Terminal: 24938
    4. 4. Cell Phone in Japan Now 71% Total Number 83,467,800   (as of 31/Aug/04) 19% 3% 7% Data Source: Telecommunications Carriers Association (TCA) Categorized by Messaging Method
    5. 5. Cell Phone in Japan Now Total   83,467,800      ( as of 31/Aug/04 ) 19% 4% 22% 56% Contractors by Carrier Data Source: Telecommunications Carriers Association (TCA)
    6. 6. Transition of Internet Population in Japan Data Source: Telecommunications Carriers Association (TCA)
    7. 7. <ul><li>Web Access Service </li></ul><ul><li>Using Compact HTML </li></ul><ul><li>Mail Service </li></ul><ul><li>Mailing inside the carrier (e.g. Sk y mail) </li></ul><ul><li>Internet Mail </li></ul><ul><li>Contents Service </li></ul><ul><li>Various Contents Service: Game, MusicDownload </li></ul><ul><li>Communication Service </li></ul><ul><li>TV Telephone </li></ul><ul><li>Media Access Service </li></ul><ul><li>TV, Radio </li></ul>Transition of Internet Population in Japan
    8. 8. Transition of Internet Population in Japan (2) --- Example: NTTDoCoMo Services --- <ul><li>Cell Phone as Purse (FeliCa) </li></ul><ul><li>Bar-code Reading </li></ul><ul><li>Shopping, Air-ticket, Cinema, Concert </li></ul><ul><li>URL, Telephone No. </li></ul>
    9. 9. Approach to Cell Phone Security <ul><li>February 2001 </li></ul><ul><li>Start Studying the Possibility based on the Original Idea </li></ul><ul><li>   Collaborate with Fujitsu BROAD SOLUTION & CONSULTING Inc </li></ul><ul><li>Information Exchange with UK Engineering Team </li></ul><ul><li>  Difference from Smart Phone </li></ul><ul><li>April 2001 </li></ul><ul><li>Start Approaching to the Carriers </li></ul><ul><li>Since May 2001 </li></ul><ul><li>Joint Announcement with NTTDoCoMo </li></ul><ul><li>October 2003 </li></ul>
    10. 10. Virus Possibility in Cell Phone <ul><li>Java Implement </li></ul><ul><li>API false movement </li></ul><ul><li>Expand App space and Data space </li></ul><ul><li>Additional communication device </li></ul><ul><li>SPAM mail </li></ul><ul><li>Application Download function </li></ul><ul><li>Memory-stick, miniSD </li></ul><ul><li>Other Communication method </li></ul><ul><li>Bluetooth </li></ul><ul><li>Image Data , Sound data </li></ul>
    11. 11. Engineering Issues <ul><li>Operating System </li></ul><ul><li>Developing Compact Engine </li></ul><ul><li>Most makers adopts their original OS and they are closed. </li></ul><ul><li>Symbian (NOKIA, MOTOROLA, Sony Ericsson: Europe & North America </li></ul><ul><li>Supposing the Functions to Implement </li></ul><ul><li>Supposing the Necessary System for Operation </li></ul><ul><li>Linux (NEC …) </li></ul>
    12. 12. Other Issues <ul><li>Cooperation between Cell Phone Maker & Carrier </li></ul><ul><li>Secure Engineers </li></ul><ul><li>Micro i TRON Engineer </li></ul>
    13. 13. Required Functions <ul><li>Interrupt of All I/O </li></ul><ul><li>Renewal Function of Defined Information </li></ul><ul><li>On-demand Operation </li></ul><ul><li>Necessity of operation environment at lower layer </li></ul>
    14. 14. Cell Phone Structure & Service Overview Operating System Micro I TRON Flash ROM Driver (Sound Flash-Mem) API Java VM App Data Area App App Code Area Internet Communication Storage
    15. 15. Cell Phone Structure & Service Overview Inter-net Unjust Mail,Java etc. Unjust   Access   ASP System Carrier Phone Network Data center McAfee AVERT phone Maker Carrier Customer D/B Technical Information DAT
    16. 16. Cell Phone Security in Future <ul><li>Offer Various Services </li></ul><ul><li>Ticket Reservation, GPS </li></ul><ul><li>Multi Functional Mobile Terminal (PC?) </li></ul><ul><li>Expand to Other Devices such as Automobile </li></ul><ul><li>Connect to IP v6 Network </li></ul><ul><li>(P2P Data Communication) </li></ul><ul><li>Multi-CPU, Large-Memory </li></ul>
    17. 17. Cell Phone Security in Future <ul><li>Contents Access Control </li></ul><ul><li>Block Harmful Sites </li></ul><ul><li>Identify Every Individual (User) </li></ul><ul><li>Identify by Fingerprint or Code </li></ul><ul><li>Prevent Unjust code invasion / operation </li></ul>
    18. 18. Mobile Virus – Concept Virus <ul><li>WinCE/Duts (Jul/04) </li></ul><ul><li>Symbian/Cabir (Jun/04) </li></ul><ul><li>First Mobile Virus in the world </li></ul><ul><li>Attach the body to the message </li></ul><ul><li>via Bluetooth </li></ul><ul><li>Infected by opening the attached file </li></ul><ul><li>Infect to the specific series of NOKIA only </li></ul><ul><li>First WinCE virus in the world </li></ul><ul><li>Copy itself to the opened file </li></ul><ul><li>Infected by opening the infected file </li></ul><ul><li>Infect to the recent CE PDA </li></ul>
    19. 19. Thank you!

    ×