SlideShare a Scribd company logo
1 of 12
CRYPTOGRAPHIC MISUSE 
IN ANDROID APPLICATIONS 
By AASHISH R 
USN : 1PI11CS002
INTRODUCTION 
 To secure data – developers use MAC and block ciphers. 
 Right way – security guarantees , wrong way – HACKING !!!!!!!!! 
 Focus on how to use cypto API’s in a crypto correct fashion. 
 Focus on android platform 
- WHY ? 
SMART PHONES store user passwords, location, and social network data. 
- HOW ? 
Android is closely related to Java, andJava's cryptographic API is stable. 
- WHAT ? 
Android applications allows us to perform our analysis on a large dataset.
Tools available to check flaws in market 
 Microsoft Crypto Verification Kit. 
 Mur. 
 Verification based approach. 
 Main advantage of verification-based approaches is that they provide strong 
guarantees. 
 Heavyweight, require significant expertise, and require manual 
effort 
. Inappropriate for large-scale experiments. 
. Not much use to Developers who are not cryptographers.
CRYPTOLINT 
 Androguard Android program analysis framework. 
 Cryp-to-Lint takes a raw Android binary, disassembles it, and checks for typical cryptographic 
misuses quickly and accurately. 
 Who can use this ? – Appropraite for developers, app store operators, and security conscious users. 
 What the paper is about ? 
- Use CRYPTOLINT to perform study on crypto implementations in 11K applications. 
- Now that’s a dataset and study crypto lovers will enjoy doing.
CRYPTO IN ANDROID 
 Who is the virtual robot handling this ? – JCA 
 CSP registers themselves with Java cryptographic architecture. 
 What is CSP then ? CSP - Package providing implementations of cryptographic 
algorithms. 
 Who has all cipher algorithms ? – Cipher API of android .
DIG DEEP INTO EXTRACTING GRAPHS 
 Control graphs of android 
1. Target Dalvik byte code , analysis on top of Androguard 
2. Androguard disassembles an application into classes ,methods , blocks and 
instructions. 
3. CryoptoLint attacks now 
- Convert lower repr to Intermediate repr. 
- 200 dalvik instructions -> 19 similar commands – Intermediate. 
- extracts the class hierarchy of all classes ,procedural graphs . 
- Converts all methods to SSA(SINGLE Static Assignment ). 
4. Static program slicing
TIPS FOR CRYPTO DEVELOPERS 
Do not use 
1. ECB Mode for encryption 
2. Do not use a non-random IV for CBC encryption. 
3. Do not use constant encryption keys. 
4. Do not use constant salts for PBE. 
5. Do not use fewer than 1,000 iterations for PBE. 
6. Do not use static seeds to seed
Evaluating CRYPTOLINT 
 CryptoLint is indeed useful to violations of the specified rules. 
 Applying CryptoLint on a large number of real-world applications, insight into the prevalence of 
the misuse of cryptographic functionality in Android applications. 
 Analysed each application , its libraries used for cryptography. 
 Mostly used libraries are – 
1. vending - Google License verification library. 
2. google/ads - Google Advertising. 
3. unity3d- Mobile game engine. 
4. apache/james - Internet messaging. 
5. openfeint - Social gaming platform.
RESULT of analysis 
10000 
1000 
10 
1 
100 
Number of distinct violated rules 
from 1 to 6.
Case studies 
 Social gaming platform 
- Application uses a static key with this encryption scheme 
- Social network functionality while at the same time recording all network traces sent 
by the application. 
 Password Managing application – 50,000 downloads 
- open source with a publicly available GIT repository warrants a closer analysis. 
 Best libraries to use by ANDROID crypto developers 
- AdMob 
- Scoreloop 
- Google verification library
LIMITATIONS 
 Applications that invoke cryptographic primitivesm from native code cannot 
be analyzed. 
 CryptoLint cannot reason about applications that implement cryptographic 
primitives ad-hoc. 
 CryptoLint only detects the use and misuses of those exposed through security 
providers, ciphers, and MAC’s.
MITIGATIONS 
 Semantic contracts in API. 
 Poor default configurations in APIs . 
 API documentation.

More Related Content

Similar to Cryptographic misuse

Cryptographic misuse in android applications
Cryptographic misuse in android applicationsCryptographic misuse in android applications
Cryptographic misuse in android applicationsAashish R
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...Mahmoud Hammad
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...Kevin Moran
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityShubhneet Goel
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
михаил дударев
михаил дударевмихаил дударев
михаил дударевapps4allru
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Cracking the mobile application code
Cracking the mobile application codeCracking the mobile application code
Cracking the mobile application codeSreenarayan A
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014viaForensics
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET Journal
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyZoltan Balazs
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Angelo Rüggeberg
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature ReviewAhmed Sabbah
 

Similar to Cryptographic misuse (20)

Cryptographic misuse in android applications
Cryptographic misuse in android applicationsCryptographic misuse in android applications
Cryptographic misuse in android applications
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
михаил дударев
михаил дударевмихаил дударев
михаил дударев
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Cracking the mobile application code
Cracking the mobile application codeCracking the mobile application code
Cracking the mobile application code
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
 
Mohamed_yassin_Resume
Mohamed_yassin_ResumeMohamed_yassin_Resume
Mohamed_yassin_Resume
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
How to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ DisobeyHow to hide your browser 0-day @ Disobey
How to hide your browser 0-day @ Disobey
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature Review
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Cryptographic misuse

  • 1. CRYPTOGRAPHIC MISUSE IN ANDROID APPLICATIONS By AASHISH R USN : 1PI11CS002
  • 2. INTRODUCTION  To secure data – developers use MAC and block ciphers.  Right way – security guarantees , wrong way – HACKING !!!!!!!!!  Focus on how to use cypto API’s in a crypto correct fashion.  Focus on android platform - WHY ? SMART PHONES store user passwords, location, and social network data. - HOW ? Android is closely related to Java, andJava's cryptographic API is stable. - WHAT ? Android applications allows us to perform our analysis on a large dataset.
  • 3. Tools available to check flaws in market  Microsoft Crypto Verification Kit.  Mur.  Verification based approach.  Main advantage of verification-based approaches is that they provide strong guarantees.  Heavyweight, require significant expertise, and require manual effort . Inappropriate for large-scale experiments. . Not much use to Developers who are not cryptographers.
  • 4. CRYPTOLINT  Androguard Android program analysis framework.  Cryp-to-Lint takes a raw Android binary, disassembles it, and checks for typical cryptographic misuses quickly and accurately.  Who can use this ? – Appropraite for developers, app store operators, and security conscious users.  What the paper is about ? - Use CRYPTOLINT to perform study on crypto implementations in 11K applications. - Now that’s a dataset and study crypto lovers will enjoy doing.
  • 5. CRYPTO IN ANDROID  Who is the virtual robot handling this ? – JCA  CSP registers themselves with Java cryptographic architecture.  What is CSP then ? CSP - Package providing implementations of cryptographic algorithms.  Who has all cipher algorithms ? – Cipher API of android .
  • 6. DIG DEEP INTO EXTRACTING GRAPHS  Control graphs of android 1. Target Dalvik byte code , analysis on top of Androguard 2. Androguard disassembles an application into classes ,methods , blocks and instructions. 3. CryoptoLint attacks now - Convert lower repr to Intermediate repr. - 200 dalvik instructions -> 19 similar commands – Intermediate. - extracts the class hierarchy of all classes ,procedural graphs . - Converts all methods to SSA(SINGLE Static Assignment ). 4. Static program slicing
  • 7. TIPS FOR CRYPTO DEVELOPERS Do not use 1. ECB Mode for encryption 2. Do not use a non-random IV for CBC encryption. 3. Do not use constant encryption keys. 4. Do not use constant salts for PBE. 5. Do not use fewer than 1,000 iterations for PBE. 6. Do not use static seeds to seed
  • 8. Evaluating CRYPTOLINT  CryptoLint is indeed useful to violations of the specified rules.  Applying CryptoLint on a large number of real-world applications, insight into the prevalence of the misuse of cryptographic functionality in Android applications.  Analysed each application , its libraries used for cryptography.  Mostly used libraries are – 1. vending - Google License verification library. 2. google/ads - Google Advertising. 3. unity3d- Mobile game engine. 4. apache/james - Internet messaging. 5. openfeint - Social gaming platform.
  • 9. RESULT of analysis 10000 1000 10 1 100 Number of distinct violated rules from 1 to 6.
  • 10. Case studies  Social gaming platform - Application uses a static key with this encryption scheme - Social network functionality while at the same time recording all network traces sent by the application.  Password Managing application – 50,000 downloads - open source with a publicly available GIT repository warrants a closer analysis.  Best libraries to use by ANDROID crypto developers - AdMob - Scoreloop - Google verification library
  • 11. LIMITATIONS  Applications that invoke cryptographic primitivesm from native code cannot be analyzed.  CryptoLint cannot reason about applications that implement cryptographic primitives ad-hoc.  CryptoLint only detects the use and misuses of those exposed through security providers, ciphers, and MAC’s.
  • 12. MITIGATIONS  Semantic contracts in API.  Poor default configurations in APIs .  API documentation.