SlideShare a Scribd company logo
1 of 30
Mobile Security:
Android
Amir Houmansadr
CS660: Advanced Information Assurance
Spring 2015
Content may be borrowed from other resources.
See the last slide for acknowledgements!
Mobile Devices
• Mobile computers:
– Mainly smartphones, tablets
– Sensors: GPS, camera,
accelerometer, etc.
– Computation: powerful
CPUs (≥ 1 GHz, multi-core)
– Communication: cellular/4G,
Wi-Fi, near field
communication (NFC), etc.
• Many connect to the Internet
using cellular networks
• Billions mobile devices sold
annually
Organization
How is it different from PC security?
• Limited computing resources
– Battery, CPU, memory, storage, bandwidth
– Therefore, we can not use PC solutions right out of the
box
• User education
– Broader range of users compared to PCs
– More prone to social attacks
• Ubiquitous
– Less expensive, outnumber PCs
• More interfaces for connectivity
– Bluetooth, infrared, WiFi, cellular, USB, tethering
CS660 - Advanced Information Assurance -
UMassAmherst
3
How is it different from PC security?
• Portable
– Subject to loss/stealing
– Subject to short range breaches (WiFi, near field
communication (NFC))
– Subject to search and seizure
• Carry sensitive content
– Your location!
– Your identity (MAC, Bluetooth address, IMEI, IMSI)
– Payment apps, financial apps, credit cards
• Wider range of software (apps) than PCs
– “There’s an app for it”
– Untrusted third-party vendors
CS660 - Advanced Information Assurance -
UMassAmherst
4
Market Trends
5
Market Trends
6
Malware Market
• Android gets 97% of malware!
• Why?
CS660 - Advanced Information Assurance -
UMassAmherst
7
Threats by Type
CS660 - Advanced Information Assurance -
UMassAmherst
8
Research Trends in
Mobile Device Security
• User authentication
– Passwords, biometrics, etc
• OS/software attestation
– Access control/permissions
• Location privacy
• Social engineering
• Covert channels
– E.g., audio channels
CS660 - Advanced Information Assurance -
UMassAmherst
9
TaintDroid:An Information-
FlowTracking System for Realtime
Privacy Monitoring on Smartphones
William Enck, Peter Gilbert, Byung-Gon
Chun, Landon P. Cox, Jaeyeon Jung,
Patrick McDaniel, and Anmol N. Sheth
OSDI’10
CS660 - Advanced Information Assurance -
UMassAmherst
10
Problem
• Apps can be installed on a smartphone from
GooglePlay, Amazon App store, Mobo-Market
etc.
• All of the apps which don’t come with the OS are
called third-party apps and hence, are suspicious
towards information leakage
• Monitor when sensitive data is being leaked in
real times from the system through third-party
applications
CS660 - Advanced Information Assurance -
UMassAmherst
11
Mobile Device Information Leakage
• Types of mobile device information sources:
– Internal to device (e.g., GPS location, IMEI, etc.)
– External sources (e.g., CNN, Chase Bank, etc.)
• Third-party mobile apps can leak info
– Send out device ID (IMEI/EID), contacts, location, etc.
– Apps ask permission to access such info; users can ignore!
– Apps can intercept info sent to a source, send to different destination!
• Motives:
– Monitor activity
– Advertisement
– Market research (include user location, behavior, etc.)
– Identity theft
– etc
• How do we protect against such information leakage?
Challenges for Monitoring Privacy Info
• Resource constraints
– E.g. tracking Panorama images would be expensive towards performance
– Battery consumption
• Third-party apps are entrusted with several types of private
information
• Sensitive information can be difficult to identify even when it’s sent
in clear format
– Geo-location data is a pair of floating point numbers
• Apps can share information
– Facebook, twitter, Google search
13
Android background
• Android is a Linux-based OS
• All of the core functionality has been written in Java and
C/C++
• Applications are written in Java and then are converted
into Dalvik Executable (DEX) byte code
• DEX code is executed in Dalvik Virtual Machine (DVM)
• Applications communicate via binder IPC interface
14
Android background
• Binder IPC (Inter-Process Communication)
– Android apps communicate with each other using
IPC binder
– ‘Parcels’ are fundamental components of IPC
framework which serialize data objects before
sending it out of VM
– Binder kernel module passes parcel messages
between processes
15
Android background
• Permissions
• Some apps don’t request for
permissions to perform some
action, they delegate their
job to other apps
16
[applications.androidxiphone.com]
Android background
• Each app on an android phone is run inside new
Dalvik VM sandbox
• Each DVM is assigned a unique user id (uid)
• All the permissions requested by an app to access
phone resources are assigned to uid
• Uid remains same when an app is run/updated but
pid can be different
17
Dynamic Taint Analysis
• DTA is a technique that tracks information
dependencies from an origin
• High-level:
– Taint source
– Taint propagation
– Taint sink
CS660 - Advanced Information Assurance -
UMassAmherst
18
TaintDroid-Framework Design
19
Taint Adaptors
• Taint sources and sinks must be carefully
integrated into existing architectural
framework
• Depends on type of information
– Low-bandwidth sensors: location, accelerometer
– High-bandwidth sensors: microphone, camera
– Information databases: address book, SMS data
– Device identifiers: IMER, IMSI, ICC-ID
– Network taint sink
CS660 - Advanced Information Assurance -
UMassAmherst
20
Experimental Setup
• 30 apps were selected randomly out of 1100 apps, taken 50 most
popular apps from each of 22 categories on Android Market
• Apps were played manually which involved installation,
registration if required and exercising the functionality offered by
the apps
• Logs were recorded which included tainted binder messages,
tainted file output and tainted network messages
• Network traffic using tcpdump was also recorded for verification
of results
21
Findings: Permissions requested
22
• Out of 105 flagged connections, only 37
legitimate
Findings: Information Leakage
23
[gizmocrazed.com]
Performance
• All experiments were run on Android 2.1 OS,
modified for taintDroid
• TaintDroid incurs almost the same performance
and memory overhead what an original Android
OS does
24
[sparkwiz.com]
Performance-MacroBenchmarks
• Load time: The duration between when an app is clicked to launch and an
activity is displayed
• Address Book: An account creation time (3 SQL queries) and read time
(2 SQL queries)
• Phone Call: Duration from pressing ‘dial’ button to ‘in-call’ mode
• Take Picture: Duration from pressing ‘Take Picture’ button to re-enabling
of ‘Preview’ mode
25
Performance-Java Microbenchmarks
• Android port of CaffeineMark 3.0
• Sieve: The classic sieve of eratosthenes finds prime numbers.
• Loop: The loop test uses sorting and sequence generation as to
measure compiler optimization of loops.
• Logic: Tests the speed with which the virtual machine executes decision-
making instructions.
• Method: The Method test executes recursive function calls to see how
well the VM handles method calls.
• Float: Simulates a 3D rotation of objects around a point.
26
[benchmarkhq.ru]
Performance-Java Microbenchmarks
 Android port of CaffeineMark 3.0
– Scores indicate roughly the number of Java instructions executed per
second
27
Performance-IPC Benchmarks
– Client and service applications were developed which perform binder
transactions as fast as possible
– Service manipulates account object (username: String, balance: Integer)
by provided interfaces: getAccount() and setAccount()
– Experiment measures the time for client to invoke interface pair 1000
times
28
Limitations
• It is a firmware modification, not an app
• Only tracks explicit data flows
CS660 - Advanced Information Assurance -
UMassAmherst
29
Acknowledgement
• Some of the slides, content, or pictures are borrowed from
the following resources, and some pictures are obtained
through Google search without being referenced below:
1. TaintDroid presentation by the authors at OSDI’10
2. TaintDroid presentation by Mohsen Junaid
3. Mobile Device Security
30
CS660 - Advanced Information Assurance -
UMassAmherst

More Related Content

Similar to Mobile Security: Android Security Research

CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemSam Bowne
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Shane Turner
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
Soft eng slides_1
Soft eng slides_1Soft eng slides_1
Soft eng slides_1Vijay Rajan
 

Similar to Mobile Security: Android Security Research (20)

Securing Android
Securing AndroidSecuring Android
Securing Android
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystem
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
128-ch4.pptx
128-ch4.pptx128-ch4.pptx
128-ch4.pptx
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
Soft eng slides_1
Soft eng slides_1Soft eng slides_1
Soft eng slides_1
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Mobile Security: Android Security Research

  • 1. Mobile Security: Android Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last slide for acknowledgements!
  • 2. Mobile Devices • Mobile computers: – Mainly smartphones, tablets – Sensors: GPS, camera, accelerometer, etc. – Computation: powerful CPUs (≥ 1 GHz, multi-core) – Communication: cellular/4G, Wi-Fi, near field communication (NFC), etc. • Many connect to the Internet using cellular networks • Billions mobile devices sold annually Organization
  • 3. How is it different from PC security? • Limited computing resources – Battery, CPU, memory, storage, bandwidth – Therefore, we can not use PC solutions right out of the box • User education – Broader range of users compared to PCs – More prone to social attacks • Ubiquitous – Less expensive, outnumber PCs • More interfaces for connectivity – Bluetooth, infrared, WiFi, cellular, USB, tethering CS660 - Advanced Information Assurance - UMassAmherst 3
  • 4. How is it different from PC security? • Portable – Subject to loss/stealing – Subject to short range breaches (WiFi, near field communication (NFC)) – Subject to search and seizure • Carry sensitive content – Your location! – Your identity (MAC, Bluetooth address, IMEI, IMSI) – Payment apps, financial apps, credit cards • Wider range of software (apps) than PCs – “There’s an app for it” – Untrusted third-party vendors CS660 - Advanced Information Assurance - UMassAmherst 4
  • 7. Malware Market • Android gets 97% of malware! • Why? CS660 - Advanced Information Assurance - UMassAmherst 7
  • 8. Threats by Type CS660 - Advanced Information Assurance - UMassAmherst 8
  • 9. Research Trends in Mobile Device Security • User authentication – Passwords, biometrics, etc • OS/software attestation – Access control/permissions • Location privacy • Social engineering • Covert channels – E.g., audio channels CS660 - Advanced Information Assurance - UMassAmherst 9
  • 10. TaintDroid:An Information- FlowTracking System for Realtime Privacy Monitoring on Smartphones William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth OSDI’10 CS660 - Advanced Information Assurance - UMassAmherst 10
  • 11. Problem • Apps can be installed on a smartphone from GooglePlay, Amazon App store, Mobo-Market etc. • All of the apps which don’t come with the OS are called third-party apps and hence, are suspicious towards information leakage • Monitor when sensitive data is being leaked in real times from the system through third-party applications CS660 - Advanced Information Assurance - UMassAmherst 11
  • 12. Mobile Device Information Leakage • Types of mobile device information sources: – Internal to device (e.g., GPS location, IMEI, etc.) – External sources (e.g., CNN, Chase Bank, etc.) • Third-party mobile apps can leak info – Send out device ID (IMEI/EID), contacts, location, etc. – Apps ask permission to access such info; users can ignore! – Apps can intercept info sent to a source, send to different destination! • Motives: – Monitor activity – Advertisement – Market research (include user location, behavior, etc.) – Identity theft – etc • How do we protect against such information leakage?
  • 13. Challenges for Monitoring Privacy Info • Resource constraints – E.g. tracking Panorama images would be expensive towards performance – Battery consumption • Third-party apps are entrusted with several types of private information • Sensitive information can be difficult to identify even when it’s sent in clear format – Geo-location data is a pair of floating point numbers • Apps can share information – Facebook, twitter, Google search 13
  • 14. Android background • Android is a Linux-based OS • All of the core functionality has been written in Java and C/C++ • Applications are written in Java and then are converted into Dalvik Executable (DEX) byte code • DEX code is executed in Dalvik Virtual Machine (DVM) • Applications communicate via binder IPC interface 14
  • 15. Android background • Binder IPC (Inter-Process Communication) – Android apps communicate with each other using IPC binder – ‘Parcels’ are fundamental components of IPC framework which serialize data objects before sending it out of VM – Binder kernel module passes parcel messages between processes 15
  • 16. Android background • Permissions • Some apps don’t request for permissions to perform some action, they delegate their job to other apps 16 [applications.androidxiphone.com]
  • 17. Android background • Each app on an android phone is run inside new Dalvik VM sandbox • Each DVM is assigned a unique user id (uid) • All the permissions requested by an app to access phone resources are assigned to uid • Uid remains same when an app is run/updated but pid can be different 17
  • 18. Dynamic Taint Analysis • DTA is a technique that tracks information dependencies from an origin • High-level: – Taint source – Taint propagation – Taint sink CS660 - Advanced Information Assurance - UMassAmherst 18
  • 20. Taint Adaptors • Taint sources and sinks must be carefully integrated into existing architectural framework • Depends on type of information – Low-bandwidth sensors: location, accelerometer – High-bandwidth sensors: microphone, camera – Information databases: address book, SMS data – Device identifiers: IMER, IMSI, ICC-ID – Network taint sink CS660 - Advanced Information Assurance - UMassAmherst 20
  • 21. Experimental Setup • 30 apps were selected randomly out of 1100 apps, taken 50 most popular apps from each of 22 categories on Android Market • Apps were played manually which involved installation, registration if required and exercising the functionality offered by the apps • Logs were recorded which included tainted binder messages, tainted file output and tainted network messages • Network traffic using tcpdump was also recorded for verification of results 21
  • 22. Findings: Permissions requested 22 • Out of 105 flagged connections, only 37 legitimate
  • 24. Performance • All experiments were run on Android 2.1 OS, modified for taintDroid • TaintDroid incurs almost the same performance and memory overhead what an original Android OS does 24 [sparkwiz.com]
  • 25. Performance-MacroBenchmarks • Load time: The duration between when an app is clicked to launch and an activity is displayed • Address Book: An account creation time (3 SQL queries) and read time (2 SQL queries) • Phone Call: Duration from pressing ‘dial’ button to ‘in-call’ mode • Take Picture: Duration from pressing ‘Take Picture’ button to re-enabling of ‘Preview’ mode 25
  • 26. Performance-Java Microbenchmarks • Android port of CaffeineMark 3.0 • Sieve: The classic sieve of eratosthenes finds prime numbers. • Loop: The loop test uses sorting and sequence generation as to measure compiler optimization of loops. • Logic: Tests the speed with which the virtual machine executes decision- making instructions. • Method: The Method test executes recursive function calls to see how well the VM handles method calls. • Float: Simulates a 3D rotation of objects around a point. 26 [benchmarkhq.ru]
  • 27. Performance-Java Microbenchmarks  Android port of CaffeineMark 3.0 – Scores indicate roughly the number of Java instructions executed per second 27
  • 28. Performance-IPC Benchmarks – Client and service applications were developed which perform binder transactions as fast as possible – Service manipulates account object (username: String, balance: Integer) by provided interfaces: getAccount() and setAccount() – Experiment measures the time for client to invoke interface pair 1000 times 28
  • 29. Limitations • It is a firmware modification, not an app • Only tracks explicit data flows CS660 - Advanced Information Assurance - UMassAmherst 29
  • 30. Acknowledgement • Some of the slides, content, or pictures are borrowed from the following resources, and some pictures are obtained through Google search without being referenced below: 1. TaintDroid presentation by the authors at OSDI’10 2. TaintDroid presentation by Mohsen Junaid 3. Mobile Device Security 30 CS660 - Advanced Information Assurance - UMassAmherst

Editor's Notes

  1. http://www.idc.com/prodserv/smartphone-os-market-share.jsp
  2. http://www.idc.com/prodserv/smartphone-os-market-share.jsp
  3. http://www.f-secure.com/static/doc/labs_global/Research/Mobile%20Threat%20Report%20Q4%202012.pdf
  4. applications.androidxiphone.com
  5. This is also true for one application but here its shown for two apps. An application is not instrumented but observed here. Whenever an information is tainted (1), it calls a taint library interface in DVM interpreter. Since DVM is instrumented, so it can receive this call. DVM stores this taint information in a virtual taint map. It also propagates taint to other variables as given by data flow rules and store them in virtual taint map. So whenever there is an IPC call to send any of tainted information to other APK, modified binder library ensures that taint tag is attached to this parcel message. On the other end, Binder receives this parcel and adds taint tags to all the variables in the parcel. DVM interpreter stores and propagates the tainted variables. So whenever there is a call to sink API (http get), and this API is using any of these tainted variables, information leakage is reported.
  6. www.gizmocrazed.com
  7. sparkwiz.com
  8. http://www.benchmarkhq.ru/cm30/info.html
  9. The more likely cause of the overhead is the continual copying of taint tags as values are marshalled into and out of the parcel byte buffer.