SlideShare a Scribd company logo
Ch 1: The Mobile Risk
Ecosystem
CNIT 128:
Hacking Mobile
Devices
Updated 1-12-16
The Mobile Ecosystem
Popularity of Mobile Devices
Insecurity of Mobile Devices
The Mobile Risk Model
Mobile Network Architecture
1. Native Code
• Some languages like Java operate in a
virtual machine
– Run in a sandbox
– Limited access to resources
• Other languages like Objective-C run
directly on the OS
– More access to resources
– Less safe
2. OS Access
• Software running in a browser has limited
access to the OS
– Libraries
– File system access
– Interprocess communications
– System calls
3. Internet Access
• Mobile devices commonly use the mobile
carrier's network and public WiFi networks
to connect to the Internet
• Increased opportunity for Man-in-the-
Middle (MiTM) attacks
• Most mobile threats are variations on MiTM
– MiTB (Man in the Browser)
– MiTOS (Man in the OS)
Risk Model
• Identify stakeholders
• Enumerate assets
• Find relevant risks
Stakeholders
Assets
• OS manufacturer values phone as a source
of revenue
– Threats include
• Apps that may crash the OS
• Users who may jailbreak the phone
• Users value their privacy
– Threats include
• The OS which may send data back to the carrier
for "statistical purposes"
• Apps preloaded by the MNO which might send data
out
Attack Surfaces
Attack Surface
• Physical theft
– Access to the user interface, physical storage,
IO Bus, and radios
• App publication
– Trojan horse or other malware
– Access to OS resources
– Interprocess communication
– Phone may be jailbroken/rooted
– App permissions may be weak
– User may allow excessive permissions
Security in Development Lifecycle
vNext = next version
Special Risks
• Mobile devices are connected to many
networks
– Often insecure or unknown ones
• Mobile devices are used for personal,
private purposes
– Banking, selfies, SMS messages, phone calls
Anthony Weiner
• Member of US
House of Reps.
• Destroyed his
political career
with sexting
scandals
– Link Ch 1a
Areas of Risk
1. Physical Access
• Attacker with physical access to the
device can overcome almost any security
barrier
• Rooting/Jailbreaking continues to be
popular
• Neither Apple nor Google can stop it
• No information stored indefinitely on a
mobile device can be regarded as secure
The 10 Laws of Security
• Link Ch 1b
5. USB Port
• USB connection gives direct access to the
phone's storage, in "debug" mode
• Commonly used by law enforcement to
collect all data from a phone
4. Baseband Attack
• If an attacker can get close to your phone,
she can:
– Trick your phone into connecting to a rogue
cellular base station
– Own your device almost completely, unless it's
in Airplane Mode
• Baseband stack of radio chip hardware and
firmware drives
– WiFi, Bluetooth, GPS, Near Field
Communication (NFC), etc.
2. Web, Email, Contacts, SMS
• 8. Most code is on the server side of apps
– Most bugs and security errors are there too
• 9. Tech support will often give attackers
access to your account or device with a
phone call
– Social engineering
Mat Honan
• Hackers social-engineered
Amazon and Apple for
password resets
• Google account deleted
• AppleID broken into
– Wiped iPhone, iPad, and
MacBook
– Link Ch 1c
Axway API Gateway
• Linux-based server
• Performs protocol translation
• Can block attacks
• Recommended by author
– Links Ch 1d, 1e
App Risks
App Risks
• Apps are the primary attack surface for
mobile devices
• Major security issues
– Fragmentation
– Sensitive information leakage
– "Secure" on-device storage
– Weak authentication
– Failure to properly implement specs
– BYOD
Open v. Closed Platforms
Open v. Closed Platforms
• Apple is closed and more secure
– Code must be signed by Apple to run
– Has Address Space Layout Randomization (ASLR)
– Better code sandbox
– No shell
• Android is open and less secure
– Custom OS versions for each device
manufacturer
– Updates often blocked by MNOs
Fragmentation
• Updates are essential for security
• Very big problem for Android
– Data from links Ch 1v, 1w
App Store Security
• Before appearing in the App Store, apps
are
– Manually reviewed by Apple for flaws and
malware
– Screened with a static analyzer
• Apps run in a sandbox
• Memory is segmented
Google Marketplace "Security"
• More than 42,000 apps in Google Play contain
information-stealing trojans as of 2013
– Link Ch 1h
Installing Apps from Untrusted
Sources (Side-Loading)
• Android devices can install apps posted
directly to the Web by developers
• Not screened by Google at all
Xcode 7 allows anyone to download,
build and ‘sideload’ iOS apps for free
• Apple has changed its policy regarding
permissions required to build and run apps on
devices. Until now, Apple required users to pay
$99/year to become a member of Apple’s
Developer Program in order to run code on
physical iPhone and iPads. As part of the new
Developer Program, this is no longer required.
Apps can be tested on devices, no purchase
necessary.
• June 10, 2015 (Link Ch 1s)
Sideloading
• iOS 7 and later
allow "side-
loading" apps
directly from a
computer
• Without using
the App store
• Rarely used by
non-developers
• Links Ch 1s, 1t
Android Antivirus
• Many options
• Pick one and use it
– Link Ch 1i
Custom Software from Device
Manufacturers
• Samsung added a TouchWiz overlay to
some Android devices
• Introduced a serious vulnerability
– Link Ch 1j
Sensitive Information Leakage
• Real issues found in mobile devices
dmesg
• Samsung devices stored sensitive user-
input data into device driver logs (the
"dmesg" buffer)
• Those logs could be read by non-root
users and other apps
• Software that sends information about device
usage back to the carrier for "quality of service
monitoring"
– Apparently including keylogging
• Concerns emerged that this data was excessive
and not handled properly
– Link Ch 1l
Input Validation
• Many attacks rely on input to one app that
does unexpected things when passed on to
another app
– JavaScript injection to run code, including
"eval"
– URL query strings that execute application
functions
"Secure" On-Device Storage
• All data on a mobile device is at risk
• Balance value of data with the risk
• Poor software has stored
– Hard-coded passwords
– AES encryption keys
Advice for Storing Sensitive Data
• Don't do it (if possible)
• Use existing storage facilities
– Like iOS KeyChain
– Much safer than custom code
• Use specially designed hardware to store
secrets
– SE (Secure Element) chip can be embedded in
device, or on a SIM or SD card
– Good security, if implemented correctly
• Link Ch 1m
Weak Authentication
• Falsely assume that tokens on the mobile
device are secret
– Mobile Device Number (MDN)
– Allowed password resets without a security
question
• Popular authentication standards
– OAuth
– SAML
• Security will be analyzed in chapter 6
Exposed ICC-ID Numbers
• Ch 1n
Weev
• Sentenced to 41
months in prison
for the AT&T "hack"
• Released early
because the venue
(New Jersey) was
improper
– Link Ch 1o
Failure to Properly Implement Specs
• Using cleartext username and password in
a "WS-Security" header (link Ch 1p)
• Leaving debug mode on in production
systems
– SSL certificate validation disabled
• Fast development leads to insecure code
– Speed to market is valued more highly than
security
Android Tablet Vulnerabilities
• Link Ch 1q
BYOD
• Bring Your Own Device to work
• Recommendation
– Keep sensitive data on servers
– Only put non-sensitive data on mobile devices
Mobile Device Management (MDM)
• Enterprise
solutions to
centrally
administer
mobile devices
• Important but
immature
field
– Link Ch 1r
Key Countermeasures for App
Developers
• Architecture and design
– Align architecture with value of assets in play
• Input/Output validation
• Caching and logging
– Disable or mitigate logging of confidential
data
• Error handling
– Don't just fail-open; enforce security checks
Key Countermeasures for App
Developers
• Device loss or capture
– Prepare for phone theft
– Enable remote wipe of your data
• Server-side strength
– Implement strong controls
– Application-level protections
– Strengthen self-help password reset system

More Related Content

What's hot

Acceptance testing
Acceptance testingAcceptance testing
Acceptance testing
COEPD HR
 
Requirements prioritization
Requirements prioritizationRequirements prioritization
Requirements prioritization
Syed Zaid Irshad
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality Factors
Usman Khan
 
Prototype model
Prototype modelPrototype model
Prototype model
Sanjida Sultana
 
McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance
sundas Shabbir
 
White box ppt
White box pptWhite box ppt
White box ppt
Chintakunta Hariteja
 
Presentation on Agile Testing
Presentation on Agile TestingPresentation on Agile Testing
Presentation on Agile Testing
1Solutions Pvt. Ltd.
 
What is waterfall
What is waterfallWhat is waterfall
What is waterfall
Abdullah Al Rumy
 
Process Models IN software Engineering
Process Models IN software EngineeringProcess Models IN software Engineering
Process Models IN software Engineering
Arid Agriculture university rawalpindi
 
Test Execution
Test ExecutionTest Execution
Test Execution
Rajathi-QA
 
Adaptive software development
Adaptive software developmentAdaptive software development
Adaptive software development
Jenita lamichhane
 
verification and validation
verification and validationverification and validation
verification and validation
Dinesh Pasi
 
SDLC Models
SDLC ModelsSDLC Models
SDLC Models
akash250690
 
Waterfall, Spiral and iterative model
Waterfall, Spiral and iterative modelWaterfall, Spiral and iterative model
Waterfall, Spiral and iterative model
Sandesh Jonchhe
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
Saqib Raza
 
functional testing
functional testing functional testing
functional testing
bharathanche
 
Slides chapter 2
Slides chapter 2Slides chapter 2
Slides chapter 2
Priyanka Shetty
 
Software Design Concepts
Software Design ConceptsSoftware Design Concepts
Software Design Concepts
Mohammed Fazuluddin
 
Agile development, software engineering
Agile development, software engineeringAgile development, software engineering
Agile development, software engineering
Rupesh Vaishnav
 
Software quality
Software qualitySoftware quality
Software quality
Sara Mehmood
 

What's hot (20)

Acceptance testing
Acceptance testingAcceptance testing
Acceptance testing
 
Requirements prioritization
Requirements prioritizationRequirements prioritization
Requirements prioritization
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality Factors
 
Prototype model
Prototype modelPrototype model
Prototype model
 
McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance
 
White box ppt
White box pptWhite box ppt
White box ppt
 
Presentation on Agile Testing
Presentation on Agile TestingPresentation on Agile Testing
Presentation on Agile Testing
 
What is waterfall
What is waterfallWhat is waterfall
What is waterfall
 
Process Models IN software Engineering
Process Models IN software EngineeringProcess Models IN software Engineering
Process Models IN software Engineering
 
Test Execution
Test ExecutionTest Execution
Test Execution
 
Adaptive software development
Adaptive software developmentAdaptive software development
Adaptive software development
 
verification and validation
verification and validationverification and validation
verification and validation
 
SDLC Models
SDLC ModelsSDLC Models
SDLC Models
 
Waterfall, Spiral and iterative model
Waterfall, Spiral and iterative modelWaterfall, Spiral and iterative model
Waterfall, Spiral and iterative model
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
functional testing
functional testing functional testing
functional testing
 
Slides chapter 2
Slides chapter 2Slides chapter 2
Slides chapter 2
 
Software Design Concepts
Software Design ConceptsSoftware Design Concepts
Software Design Concepts
 
Agile development, software engineering
Agile development, software engineeringAgile development, software engineering
Agile development, software engineering
 
Software quality
Software qualitySoftware quality
Software quality
 

Viewers also liked

CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
Sam Bowne
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?
Sam Bowne
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
Sam Bowne
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
Sam Bowne
 
Ericsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of thingsEricsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of things
Ericsson
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
 
Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016
Andrey Apuhtin
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle
David Sweigert
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
Innotech Network™
 
7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost
Chris Out
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
CentraComm
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
Suresh Mandava
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management
3Sixty Insights
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
Sophos Benelux
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
Sam Bowne
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
Sam Bowne
 
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
Sam Bowne
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
Sam Bowne
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...
Simon Fraser University
 
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & MitigationiOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Lacoon Mobile Security
 

Viewers also liked (20)

CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Ericsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of thingsEricsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of things
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
 
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...
 
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & MitigationiOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
 

Similar to CNIT 128 Ch 1: The mobile risk ecosystem

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
CNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securityCNIT 128 8: Mobile development security
CNIT 128 8: Mobile development security
Sam Bowne
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
jraja01
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
Symantec
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
National Cheng Kung University
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
Denim Group
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
yogeshraut090
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
PRANAVKUMAR699137
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
Ravishankar Kumar
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
Bitbar
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
eightbit
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applications
Satish b
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
Endeavour Software Technologies
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
Denim Group
 

Similar to CNIT 128 Ch 1: The mobile risk ecosystem (20)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
CNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securityCNIT 128 8: Mobile development security
CNIT 128 8: Mobile development security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applications
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 

More from Sam Bowne

Cyberwar
CyberwarCyberwar
Cyberwar
Sam Bowne
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne
 
10 RSA
10 RSA10 RSA
10 RSA
Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 

CNIT 128 Ch 1: The mobile risk ecosystem

  • 1. Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16
  • 7. 1. Native Code • Some languages like Java operate in a virtual machine – Run in a sandbox – Limited access to resources • Other languages like Objective-C run directly on the OS – More access to resources – Less safe
  • 8. 2. OS Access • Software running in a browser has limited access to the OS – Libraries – File system access – Interprocess communications – System calls
  • 9. 3. Internet Access • Mobile devices commonly use the mobile carrier's network and public WiFi networks to connect to the Internet • Increased opportunity for Man-in-the- Middle (MiTM) attacks • Most mobile threats are variations on MiTM – MiTB (Man in the Browser) – MiTOS (Man in the OS)
  • 10. Risk Model • Identify stakeholders • Enumerate assets • Find relevant risks
  • 12. Assets • OS manufacturer values phone as a source of revenue – Threats include • Apps that may crash the OS • Users who may jailbreak the phone • Users value their privacy – Threats include • The OS which may send data back to the carrier for "statistical purposes" • Apps preloaded by the MNO which might send data out
  • 14. Attack Surface • Physical theft – Access to the user interface, physical storage, IO Bus, and radios • App publication – Trojan horse or other malware – Access to OS resources – Interprocess communication – Phone may be jailbroken/rooted – App permissions may be weak – User may allow excessive permissions
  • 15. Security in Development Lifecycle vNext = next version
  • 16. Special Risks • Mobile devices are connected to many networks – Often insecure or unknown ones • Mobile devices are used for personal, private purposes – Banking, selfies, SMS messages, phone calls
  • 17. Anthony Weiner • Member of US House of Reps. • Destroyed his political career with sexting scandals – Link Ch 1a
  • 19. 1. Physical Access • Attacker with physical access to the device can overcome almost any security barrier • Rooting/Jailbreaking continues to be popular • Neither Apple nor Google can stop it • No information stored indefinitely on a mobile device can be regarded as secure
  • 20. The 10 Laws of Security • Link Ch 1b
  • 21. 5. USB Port • USB connection gives direct access to the phone's storage, in "debug" mode • Commonly used by law enforcement to collect all data from a phone
  • 22. 4. Baseband Attack • If an attacker can get close to your phone, she can: – Trick your phone into connecting to a rogue cellular base station – Own your device almost completely, unless it's in Airplane Mode • Baseband stack of radio chip hardware and firmware drives – WiFi, Bluetooth, GPS, Near Field Communication (NFC), etc.
  • 23. 2. Web, Email, Contacts, SMS • 8. Most code is on the server side of apps – Most bugs and security errors are there too • 9. Tech support will often give attackers access to your account or device with a phone call – Social engineering
  • 24. Mat Honan • Hackers social-engineered Amazon and Apple for password resets • Google account deleted • AppleID broken into – Wiped iPhone, iPad, and MacBook – Link Ch 1c
  • 25. Axway API Gateway • Linux-based server • Performs protocol translation • Can block attacks • Recommended by author – Links Ch 1d, 1e
  • 27. App Risks • Apps are the primary attack surface for mobile devices • Major security issues – Fragmentation – Sensitive information leakage – "Secure" on-device storage – Weak authentication – Failure to properly implement specs – BYOD
  • 28. Open v. Closed Platforms
  • 29. Open v. Closed Platforms • Apple is closed and more secure – Code must be signed by Apple to run – Has Address Space Layout Randomization (ASLR) – Better code sandbox – No shell • Android is open and less secure – Custom OS versions for each device manufacturer – Updates often blocked by MNOs
  • 30. Fragmentation • Updates are essential for security • Very big problem for Android – Data from links Ch 1v, 1w
  • 31. App Store Security • Before appearing in the App Store, apps are – Manually reviewed by Apple for flaws and malware – Screened with a static analyzer • Apps run in a sandbox • Memory is segmented
  • 32. Google Marketplace "Security" • More than 42,000 apps in Google Play contain information-stealing trojans as of 2013 – Link Ch 1h
  • 33. Installing Apps from Untrusted Sources (Side-Loading) • Android devices can install apps posted directly to the Web by developers • Not screened by Google at all
  • 34. Xcode 7 allows anyone to download, build and ‘sideload’ iOS apps for free • Apple has changed its policy regarding permissions required to build and run apps on devices. Until now, Apple required users to pay $99/year to become a member of Apple’s Developer Program in order to run code on physical iPhone and iPads. As part of the new Developer Program, this is no longer required. Apps can be tested on devices, no purchase necessary. • June 10, 2015 (Link Ch 1s)
  • 35. Sideloading • iOS 7 and later allow "side- loading" apps directly from a computer • Without using the App store • Rarely used by non-developers • Links Ch 1s, 1t
  • 36. Android Antivirus • Many options • Pick one and use it – Link Ch 1i
  • 37. Custom Software from Device Manufacturers • Samsung added a TouchWiz overlay to some Android devices • Introduced a serious vulnerability – Link Ch 1j
  • 38. Sensitive Information Leakage • Real issues found in mobile devices
  • 39. dmesg • Samsung devices stored sensitive user- input data into device driver logs (the "dmesg" buffer) • Those logs could be read by non-root users and other apps
  • 40. • Software that sends information about device usage back to the carrier for "quality of service monitoring" – Apparently including keylogging • Concerns emerged that this data was excessive and not handled properly – Link Ch 1l
  • 41. Input Validation • Many attacks rely on input to one app that does unexpected things when passed on to another app – JavaScript injection to run code, including "eval" – URL query strings that execute application functions
  • 42. "Secure" On-Device Storage • All data on a mobile device is at risk • Balance value of data with the risk • Poor software has stored – Hard-coded passwords – AES encryption keys
  • 43. Advice for Storing Sensitive Data • Don't do it (if possible) • Use existing storage facilities – Like iOS KeyChain – Much safer than custom code • Use specially designed hardware to store secrets – SE (Secure Element) chip can be embedded in device, or on a SIM or SD card – Good security, if implemented correctly • Link Ch 1m
  • 44. Weak Authentication • Falsely assume that tokens on the mobile device are secret – Mobile Device Number (MDN) – Allowed password resets without a security question • Popular authentication standards – OAuth – SAML • Security will be analyzed in chapter 6
  • 46. Weev • Sentenced to 41 months in prison for the AT&T "hack" • Released early because the venue (New Jersey) was improper – Link Ch 1o
  • 47. Failure to Properly Implement Specs • Using cleartext username and password in a "WS-Security" header (link Ch 1p) • Leaving debug mode on in production systems – SSL certificate validation disabled • Fast development leads to insecure code – Speed to market is valued more highly than security
  • 49. BYOD • Bring Your Own Device to work • Recommendation – Keep sensitive data on servers – Only put non-sensitive data on mobile devices
  • 50. Mobile Device Management (MDM) • Enterprise solutions to centrally administer mobile devices • Important but immature field – Link Ch 1r
  • 51. Key Countermeasures for App Developers • Architecture and design – Align architecture with value of assets in play • Input/Output validation • Caching and logging – Disable or mitigate logging of confidential data • Error handling – Don't just fail-open; enforce security checks
  • 52. Key Countermeasures for App Developers • Device loss or capture – Prepare for phone theft – Enable remote wipe of your data • Server-side strength – Implement strong controls – Application-level protections – Strengthen self-help password reset system