SlideShare a Scribd company logo
Android Lollipop
For Enterprise
DroidCon Italy
Torino 2015
Android Lollipop for Enterprise
● Senior Security Researcher - Mobile Security Lab
● Senior Security Analyst - Consulthink S.p.A.
DroidCon IT 2015 - Android Lollipop For Enterprise 2
Who are we
● r.piccirillo@mseclab.com
● @robpicone
● r.gassira@mseclab.com
● @robgas
@droidconit #droidconit
Android Lollipop For Enterprise
Enterprise Mobile Management
3
Enterprise Mobile Management
DroidCon IT 2015 - Android Lollipop For Enterprise 4
Enterprise Mobile Trends
Gartner Market Statistics Forecast:
PCs, Ultramobiles and Mobile Phones Worldwide, 2011-2018, 4Q14 Update
Enterprise Mobile Management
● Secure Environment
○ SELinux
● Device Protection
○ Smart Lock
○ "Kill Switch"
● Device Management
○ Device Administration API
○ Device Owner
● Security Container
○ Managed Profile
○ App Restrictions
● Data Encryption
DroidCon IT 2015 - Android Lollipop For Enterprise 5
Lollipop for Enteprise
Android Lollipop For Enterprise
SELinux
6
● Introduced in Android 4.3 to enforce the existing Discretionary
Access Control (DAC) for application sandboxing (UID,GID)
● Provides Mandatory Access Control (MAC) over all processes at kernel
level
● Allows to define fine-grained security policies
● Main security features:
○ Better system service restriction and protection
○ Improved access control to application data and system logs
○ Reduce effects of malicious software
○ User protection from potential flaws in mobile application
SELinux
DroidCon IT 2015 - Android Lollipop For Enterprise 7
Security-Enhanced Linux in Android
"This new layer provides additional protection against potential security vulnerabilities
by reducing exposure of system functionality to applications"
Google Report Android Security 2014 Year in Review
SELinux
● Three core elements:
○ Subject: Agent that perform actions on objects (processes or groups of processes
referred as domains)
○ Action: The operation to perform
○ Object: OS-level resources managed by the kernel (file, socket)
● Processes, Sockets and Files have a label or security context:
○ username:role:type:mls_level
■ username is always u
■ role is r for domains, object_r for objects
■ type refers to the domain or to the object logic type
■ mls_level is always s0
DroidCon IT 2015 - Android Lollipop For Enterprise 8
Concepts
SELinux
username:role:type:mls_level
○ username is always u
○ role is r for domains, object_r for objects
○ type refers to the domain or to the object logical type
○ mls_level is always s0
DroidCon IT 2015 - Android Lollipop For Enterprise 9
Concepts
SUBJECT
OBJECT
Lollipop Enhancements
SELinux
● SELinux mode:
○ Permissive: permission denials are logged but not enforced
○ Enforcing: permission denials are both logged and enforced
DroidCon IT 2015 - Android Lollipop For Enterprise 10
Android 4.3
Permissive
Android 4.4
Partial
Enforcing
Android 5.x
Full
Enforcing
... limited set of crucial domains
(installd, netd, vold and zygote)...
...to everything (more than
60 domains)...
Android Lollipop For Enterprise
Smart Lock
11
Smart Lock
● Disable device lockscreen in "trusted condition"
● Based on Trust Agent:
○ "A service that notifies the system about whether it
believes the environment of the device to be trusted"
○ Requires signatureOrSystem permission
○ Can be disabled by Device Administrator
[KEYGUARD_DISABLE_TRUST_AGENTS]
DroidCon IT 2015 - Android Lollipop For Enterprise 12
Trust Agent
http://nelenkov.
blogspot.
it/2014/12/dissecting
-lollipops-smart-
lock.html
lollipop/frameworks/base/core/res/AndroidManifest.xml
Smart Lock
● Trust Agent provided by Google Play Services
● Device Unlocked methods:
○ Trusted bluetooth connected devices
○ Trusted places
○ Trusted face
○ On Body Detection
● Temporary unlock is disabled:
○ After 4 hours of inactivity
○ Device Reboot/Shutdown
DroidCon IT 2015 - Android Lollipop For Enterprise 13
Some Details
Android Lollipop for Enterprise
Device Protection
Corso Poste
Sicurezza Android 14
Device Protection
● "You can set up your device to prevent other
people from using it if it's been reset to factory
settings without your permission"
● Introduced in Android 5.1
● Actually works only on Nexus 6 and Nexus 9
● Requires:
○ Screen Lock enabled
○ Default Google account
○ "OEM Unlocking" disabled in Settings ->
Developer Options
● Needs to wait 72 hours after changing
password to reset the device
DroidCon IT 2015 - Android Lollipop For Enterprise 15
"Kill Switch" Factory Reset
Device Protection
● PersistentDataBlockService write on the partition defined by ro.frp.pst:
○ The OEM Unlocking setting (bit)
○ Write Block Checksum (SHA-256)
DroidCon IT 2015 - Android Lollipop For Enterprise 16
OEM Unlocking
PersistentDataBlockService
Android Lollipop For Enterprise
Device Administration API
17
Device Administration API
● Introduced in Android 2.2 Froyo (API 8)
● Allows to enforce security policy on
device
● Enterprise Oriented
● Vendor Customization
○ Samsung KNOX
○ LG Gate
● Used by Device Admin Application
DroidCon IT 2015 - Android Lollipop For Enterprise 18
Intro
Device Administration API
● Must be explicitly enabled in
the device security settings
● Cannot be uninstalled if
active
● Could be controlled by a
remote server (agent)
● Several device admin
applications can be enabled
on a device (strictest policy
among all applications is
active)
DroidCon IT 2015 - Android Lollipop For Enterprise 19
Device Admin Application
Device Administration API
DroidCon IT 2015 - Android Lollipop For Enterprise 20
Main Features
API 8 API 9 API 11 API 14 API 17 API 21 API 22
Enforce Password Policy
Watch User Login
Reset Password
Lock and Wipe Device
Set Max Failed Password For Wipe
Set Max Time To Lock Device
Wipe SDCard
Force Device
Encryption
Disable
Camera
Disable
Keyguard
Managed Profile
Global Settings
NFC Provisioning
Wipe Factory
Protection
Device Administration API
DroidCon IT 2015 - Android Lollipop For Enterprise 21
How It Works...
Device Administration API
● Main Admin Application component
DroidCon IT 2015 - Android Lollipop For Enterprise 22
DeviceAdminReceiver
Required to ensure that only the system can interact with the receiver
Primary ACTION that the receiver must handle
Policy
Declaration
Device Administration API
DroidCon IT 2015 - Android Lollipop For Enterprise 23
Policy Declaration
Device Administration API
● Callback functions triggered on particular ACTION
DroidCon IT 2015 - Android Lollipop For Enterprise 24
DeviceAdminReceiver
Method Action
onEnabled(Context context, Intent intent) ACTION_DEVICE_ADMIN_ENABLED
onDisabled(Context context, Intent intent) ACTION_DEVICE_ADMIN_DISABLED
onDisableRequested(Context context, Intent intent)
ACTION_DEVICE_ADMIN_DISABLE_R
EQUESTED
onPasswordSucceeded(Context context, Intent intent) ACTION_PASSWORD_SUCCEEDED
onPasswordFailed(Context context, Intent intent) ACTION_PASSWORD_FAILED
onPasswordChanged(Context context, Intent intent) ACTION_PASSWORD_CHANGED
Device Administration API
● Public Interface for managing policies on device
● Requires Device Administration rights enabled
● Main methods:
○ isAdminActive(ComponentName who)
○ setPasswordQuality(ComponentName admin, int quality)
○ resetPassword(String password, int flags)
○ lockNow()
○ wipeData(int flags)
○ setCameraDisabled(ComponentName admin, boolean disabled)
○ setStorageEncryption(ComponentName admin, boolean encrypt)
DroidCon IT 2015 - Android Lollipop For Enterprise 25
DevicePolicyManager
Device Administration API
DroidCon IT 2015 - Android Lollipop For Enterprise 26
Device Admin Activation
Implicit Intent for
the system Settings
Device Administration API
● "Specialized type of device administrator" with
the additional ability to:
○ Add/Remove User
○ Modify Global settings
○ Set Application Restrictions
○ Wipe Factory Protection
● Typically used for company device
● Introduced in Android Lollipop (API 21)
● Only one device owner can be active at a time
● Cannot be disabled or removed
● Requires Device Encryption
● Deployed and activated via NFC
DroidCon IT 2015 - Android Lollipop For Enterprise 27
Device Owner
Device Administration API
● Via NFC NDEF Record with MIME Type
MIME_TYPE_PROVISIONING_NFC and with properties:
DroidCon IT 2015 - Android Lollipop For Enterprise 28
Device Owner Deploy
REQUIRED
CHECKSUM
A String extra holding the SHA-1 checksum of the
file at download location specified in
EXTRA_PROVISIONING_DEVICE_ADMIN_PA
CKAGE_DOWNLOAD_LOCATION. If this
doesn't match the file at the download location an
error will be shown to the user and the user will
be asked to factory reset the device.
cat app-debug.apk | openssl dgst -binary -sha1 | openssl base64 | tr '+/' '-_' | tr -d '='
Device Administration API
● Device should not be provisioned
Settings.Global.DEVICE_PROVISIONED = 0
● Encrypted phone required
● "If provisioning fails, the device is factory
reset"
DroidCon IT 2015 - Android Lollipop For Enterprise 29
Device Owner Activation
Android Lollipop For Enterprise
Managed Profile
30
Managed Profile
● New security feature for enterprise “managed profile”
● Available since Android Lollipop (API 21)
● Using managed profile the enterprise could define a controlled domain
on the user's device to run controlled application
● The application inside the new managed profile can be configured with
policy to interact or not with other apps on device
● Samsung KNOX functionality has been integrated into Android
DroidCon IT 2015 - Android Lollipop For Enterprise 31
Introduction
Managed Profile
● A Technology platform for:
○ Business protection, and
○ Personal Privacy
● Google and Samsung has
designed the new Enterprise API
around three major concepts:
○ Device and data security
○ Support for IT policies and
restrictions
○ Mobile application management
● It has been introduced into
Android Lollipop
DroidCon IT 2015 - Android Lollipop For Enterprise 32
KNOX Framework
Managed Profile
● A device administration component
○ A broadcast receiver that extends “DeviceAdminReceiver”
● AndroidManifest with a receiver:
○ The BIND_DEVICE_ADMIN permission
○ Respond, by intent-filetr, to the ACTION_DEVICE_ADMIN_ENABLED intent
○ A declaration of security policies used in metadata
● An intent to start the managed profile provisioning process:
○ ACTION_PROVISION_MANAGED_PROFILE action
○ An extra with the application package
● Override onProfileProvisioningComplete callback method to verify all is
OK
● Enable the new managed profile
DroidCon IT 2015 - Android Lollipop For Enterprise 33
Have to use...
Managed Profile
● BasicDeviceAdminReceiver component
DroidCon IT 2015 - Android Lollipop For Enterprise 34
Broadcast Receiver
BroadcastReceiver of our
provisioner application
Callback method will be
called when the system
send
ACTION_DEVICE_ADMI
N_ENABLED. The new
profile is installed but not
yet enabled
Managed Profile
● AndroidManifest.xml declaration
DroidCon IT 2015 - Android Lollipop For Enterprise 35
AndroidManifest
To avoid abuse by other
applications
Intercepted when the
Managed Profile has
successfully installed
Policy declaration
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 36
Activation
Intent to start the setup
(Defined in the
DevicePolicyManager.java)
● Start the Managed Profile provisioning
The Application package
name as additional
information
Verify there is an activity that
resolves intent
(ManagedProvisonActivity)
Start activity by intent
● The new Managed profile has to be enabled
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 37
Enable the new profile
Enable the managed
profile
Set name for new
profile
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 38
Managed profile activated
● New Accounts associated to the new
managed profile (Settings->Accounts)
● The admin profile (Work) for the new
Managed Profile (Settings->Security-
>Device administrators)
● The applications into new Managed Profile
are badged
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 39
WorkFlow of Provisioning
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 40
Enable Application
● Add new application into Managed Profile
Add the application by
package name via
DevicePolicyManager
Get info
about app
Get reference at
packageManager and
DevicePolicyManager
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 41
Hide Application
● During the life of Managed Profile the application could be hidden
specyfing the app package name
○ Only if the application is already installed
we can hide
application
true to hide and false to un-hide
Managed Profile
● Enable and disable Intent forwarding between private account and
managed profile
DroidCon IT 2015 - Android Lollipop For Enterprise 42
Cross Intent
Enable with and
disable intent
between profiles
Share some
content
Managed Profile
● Define Chrome restrictions
DroidCon IT 2015 - Android Lollipop For Enterprise 43
App Restriction
Define
restriction
Enable
restriction
Managed Profile
DroidCon IT 2015 - Android Lollipop For Enterprise 44
App restrictions
Configure some
bookmarks
Disable anonymous
navigation
Block www.example.
com
Configure search
engine
Managed Profile
● Application has to define a file restriction and declare it into Manifest file
DroidCon IT 2015 - Android Lollipop For Enterprise 45
Define App Restrictions
● Defines the restriction item into app_restriction.xml file
Declare external
resource for
restrictions
restriction
element with key
and type of value
Managed Profile
● Check current application’s restrictions
DroidCon IT 2015 - Android Lollipop For Enterprise 46
Check app restrictions
get current
restrictions
get reference to
RestrictionManager
search restriction
by key to take the
appropriate action
Managed Profile
● Set application restriction via DevicePolicyManager
DroidCon IT 2015 - Android Lollipop For Enterprise 47
Set app restrictions
Builds a bundle
with value for
restriction
Apply application restriction with
method setApplicationRestrictions
Android Lollipop For Enterprise
Data Encryption
48
Data Encryption
● Encryption is the process of encoding user data on an Android device
using an encrypted key
● New feature on Android 5.0:
○ Fast encryption (only used blocks are encrypted on data partition)
○ forceencrypt flag to encrypt on first boot (Mandatory encryption at first boot)
○ Support for encryption without password
○ Hardware-backed storage of encryption key using Trusted Execution Environment
● Android introduced Disk encryption in Android version 3.0 and it has
been available in all subsequent versions
● New key derivation function scrypt
DroidCon IT 2015 - Android Lollipop For Enterprise 49
Some info
Data Encryption
● Android disk encryption is based on dm-crypt (also
used in Linux)
● Use a randomly 128-bit key with AES in CBC mode
○ CBC requires an inizialization vector IV
○ Android uses the encrypted salt-sector initialization vector
(ESSIV) method with the SHA-256 hash algorithm (ESSIV:
SHA256)
○ SHA256 is used to derive a key s from disk encryption key
K called salt
○ Use the salt as encryption key to encrypt sector number
SN of each sector to produce a per-sector IV
○ IV(SN)=AES-s(SN) where s=SHA256(K)
DroidCon IT 2015 - Android Lollipop For Enterprise 50
How works
Data Encryption
● The master key is encrypted with 128-bit AES
● In Android 5.0 release, four encryption states:
○ default,PIN,Password,Pattern
● Upon first boot the device creates a randomly generated
128-bit master key and then hashes it with a default
password and stored salt (default_password)
● The hash is signed through a TEE, that uses hash to
encrypt the master key
● When the user sets the PIN/pass or password on the
device, only the 128-bit key is re-encrypted and stored
DroidCon IT 2015 - Android Lollipop For Enterprise 51
How works
Data Encryption
DroidCon IT 2015 - Android Lollipop For Enterprise 52
Securing disk encryption key
When user set
PIN/PASSWORD/P
ATTERN another
key K1 is choosen to
encrypt disk
encryption key K
Thanks! DroidCon Italy
Torino 2015www.mseclab.com
www.consulthink.it
research@mseclab.com

More Related Content

What's hot

BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CanSecWest
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
Jeronimo Zucco
 
Csw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnologyCsw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnology
CanSecWest
 
Catching fileless attacks
Catching fileless attacksCatching fileless attacks
Catching fileless attacks
Balaji Rajasekaran
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
Frank Avila Zapata
 
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat Security Conference
 
Gang gong, escalate privilege by vulnerabilities in android system services
Gang gong, escalate privilege by vulnerabilities in android system servicesGang gong, escalate privilege by vulnerabilities in android system services
Gang gong, escalate privilege by vulnerabilities in android system services
PacSecJP
 
Operating System : Ch20 security
Operating System : Ch20 securityOperating System : Ch20 security
Operating System : Ch20 security
Syaiful Ahdan
 
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksSANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
Mauricio Velazco
 
2009-08-24 The Linux Audit Subsystem Deep Dive
2009-08-24 The Linux Audit Subsystem Deep Dive2009-08-24 The Linux Audit Subsystem Deep Dive
2009-08-24 The Linux Audit Subsystem Deep Dive
Shawn Wells
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
edavid2685
 
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysqqlan
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CanSecWest
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
CanSecWest
 
Memory forensics cheat sheet
Memory forensics cheat sheetMemory forensics cheat sheet
Memory forensics cheat sheet
Martin Cabrera
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications guest879f38
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware Infections
Ramon
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
Chris Sistrunk
 

What's hot (20)

BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
Csw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnologyCsw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnology
 
Catching fileless attacks
Catching fileless attacksCatching fileless attacks
Catching fileless attacks
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
 
Gang gong, escalate privilege by vulnerabilities in android system services
Gang gong, escalate privilege by vulnerabilities in android system servicesGang gong, escalate privilege by vulnerabilities in android system services
Gang gong, escalate privilege by vulnerabilities in android system services
 
Operating System : Ch20 security
Operating System : Ch20 securityOperating System : Ch20 security
Operating System : Ch20 security
 
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team PlaybooksSANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
 
2009-08-24 The Linux Audit Subsystem Deep Dive
2009-08-24 The Linux Audit Subsystem Deep Dive2009-08-24 The Linux Audit Subsystem Deep Dive
2009-08-24 The Linux Audit Subsystem Deep Dive
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
 
Memory forensics cheat sheet
Memory forensics cheat sheetMemory forensics cheat sheet
Memory forensics cheat sheet
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware Infections
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
 

Viewers also liked

Sketching Out Your Search Intent
Sketching Out Your Search IntentSketching Out Your Search Intent
Sketching Out Your Search Intent
Xian-Sheng Hua
 
Transforming the intent to action
Transforming the intent to actionTransforming the intent to action
Transforming the intent to action
CSO Partners
 
Intent-Aware Temporal Query Modeling for Keyword Suggestion
Intent-Aware Temporal Query Modeling for Keyword SuggestionIntent-Aware Temporal Query Modeling for Keyword Suggestion
Intent-Aware Temporal Query Modeling for Keyword Suggestion
Findwise
 
CAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampCAVE Language Presentation for AI Camp
CAVE Language Presentation for AI Camp
Loren Davie
 
A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...
A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...
A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...
Sven Van Laere
 
Predicting Current User Intent with Contextual Markov Models
Predicting Current User Intent with Contextual Markov ModelsPredicting Current User Intent with Contextual Markov Models
Predicting Current User Intent with Contextual Markov Models
Julia Kiseleva
 
Advanced Keyword Modeling
Advanced Keyword ModelingAdvanced Keyword Modeling
Advanced Keyword Modeling
Bill Hunt
 
Ptc creo fmx sales presentation
Ptc creo fmx sales presentationPtc creo fmx sales presentation
Ptc creo fmx sales presentation
Victor Mitov
 
Dynamic Search Using Semantics & Statistics
Dynamic Search Using Semantics & StatisticsDynamic Search Using Semantics & Statistics
Dynamic Search Using Semantics & Statistics
Paul Hofmann
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Damon Small
 
Network Intent Composition in OpenDaylight
Network Intent Composition in OpenDaylightNetwork Intent Composition in OpenDaylight
Network Intent Composition in OpenDaylight
OpenDaylight
 
Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...
Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...
Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...
OPNFV
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
Marakana Inc.
 
Object-oriented design patterns in UML [Software Modeling] [Computer Science...
Object-oriented design patterns  in UML [Software Modeling] [Computer Science...Object-oriented design patterns  in UML [Software Modeling] [Computer Science...
Object-oriented design patterns in UML [Software Modeling] [Computer Science...
Ivano Malavolta
 
Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...
Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...
Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...
Yun-Nung (Vivian) Chen
 
Ux och design som konverterar del 3
Ux och design som konverterar del 3Ux och design som konverterar del 3
Ux och design som konverterar del 3
Wipcore
 
Linkedin Slideshare Driving Force Btec
Linkedin Slideshare   Driving Force BtecLinkedin Slideshare   Driving Force Btec
Linkedin Slideshare Driving Force Btec
Ian Littlefield
 
Performance-Based Funding – A New Era in Accountability?
Performance-Based Funding – A New Era in Accountability?Performance-Based Funding – A New Era in Accountability?
Performance-Based Funding – A New Era in Accountability?
Ludmila Adamovica
 
Humans & Machines Ethics Canvas
Humans & Machines Ethics CanvasHumans & Machines Ethics Canvas
Humans & Machines Ethics Canvas
Piush Vaish
 

Viewers also liked (20)

PPT_Compiled
PPT_CompiledPPT_Compiled
PPT_Compiled
 
Sketching Out Your Search Intent
Sketching Out Your Search IntentSketching Out Your Search Intent
Sketching Out Your Search Intent
 
Transforming the intent to action
Transforming the intent to actionTransforming the intent to action
Transforming the intent to action
 
Intent-Aware Temporal Query Modeling for Keyword Suggestion
Intent-Aware Temporal Query Modeling for Keyword SuggestionIntent-Aware Temporal Query Modeling for Keyword Suggestion
Intent-Aware Temporal Query Modeling for Keyword Suggestion
 
CAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampCAVE Language Presentation for AI Camp
CAVE Language Presentation for AI Camp
 
A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...
A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...
A Method for Detecting Behavior-Based User Profiles in Collaborative Ontology...
 
Predicting Current User Intent with Contextual Markov Models
Predicting Current User Intent with Contextual Markov ModelsPredicting Current User Intent with Contextual Markov Models
Predicting Current User Intent with Contextual Markov Models
 
Advanced Keyword Modeling
Advanced Keyword ModelingAdvanced Keyword Modeling
Advanced Keyword Modeling
 
Ptc creo fmx sales presentation
Ptc creo fmx sales presentationPtc creo fmx sales presentation
Ptc creo fmx sales presentation
 
Dynamic Search Using Semantics & Statistics
Dynamic Search Using Semantics & StatisticsDynamic Search Using Semantics & Statistics
Dynamic Search Using Semantics & Statistics
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Network Intent Composition in OpenDaylight
Network Intent Composition in OpenDaylightNetwork Intent Composition in OpenDaylight
Network Intent Composition in OpenDaylight
 
Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...
Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...
Summit 16: Applying Machine Learning to Intent-based Networking and Nfv Scali...
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Object-oriented design patterns in UML [Software Modeling] [Computer Science...
Object-oriented design patterns  in UML [Software Modeling] [Computer Science...Object-oriented design patterns  in UML [Software Modeling] [Computer Science...
Object-oriented design patterns in UML [Software Modeling] [Computer Science...
 
Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...
Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...
Unsupervised Learning and Modeling of Knowledge and Intent for Spoken Dialogu...
 
Ux och design som konverterar del 3
Ux och design som konverterar del 3Ux och design som konverterar del 3
Ux och design som konverterar del 3
 
Linkedin Slideshare Driving Force Btec
Linkedin Slideshare   Driving Force BtecLinkedin Slideshare   Driving Force Btec
Linkedin Slideshare Driving Force Btec
 
Performance-Based Funding – A New Era in Accountability?
Performance-Based Funding – A New Era in Accountability?Performance-Based Funding – A New Era in Accountability?
Performance-Based Funding – A New Era in Accountability?
 
Humans & Machines Ethics Canvas
Humans & Machines Ethics CanvasHumans & Machines Ethics Canvas
Humans & Machines Ethics Canvas
 

Similar to Droidcon it 2015: Android Lollipop for Enterprise

CodeMotion tel aviv 2015 - burning marshmallows
CodeMotion tel aviv 2015 - burning marshmallowsCodeMotion tel aviv 2015 - burning marshmallows
CodeMotion tel aviv 2015 - burning marshmallows
Ron Munitz
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
Aditya K Sood
 
Migrating to Android 8.0
Migrating to Android 8.0Migrating to Android 8.0
Migrating to Android 8.0
Daniel Deng
 
Enterprise Ready Android and Manageability- Impetus Webcast
Enterprise Ready Android and Manageability- Impetus WebcastEnterprise Ready Android and Manageability- Impetus Webcast
Enterprise Ready Android and Manageability- Impetus Webcast
Impetus Technologies
 
Android Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar PachauriAndroid Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar Pachauri
अशोक पचौरी
 
Android ch2..pptx
Android ch2..pptxAndroid ch2..pptx
Android ch2..pptx
mohamedMoktarMohamed
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
What's new in android M(6.0)
What's new in android M(6.0)What's new in android M(6.0)
What's new in android M(6.0)
Yonatan Levin
 
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Codemotion
 
Voxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning MarshmallowsVoxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning Marshmallows
Ron Munitz
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
abend_cve_9999_0001
 
Introduction to Android M
Introduction to Android MIntroduction to Android M
Introduction to Android M
amsanjeev
 
Android Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar PachauriAndroid Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar Pachauri
अशोक पचौरी
 
LG Developer Event 2013 in San Francisco
LG Developer Event 2013 in San FranciscoLG Developer Event 2013 in San Francisco
LG Developer Event 2013 in San Francisco
LGDeveloper
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
Ron Munitz
 
MobSecCon 2015 - Burning Marshmallows
MobSecCon 2015 - Burning Marshmallows MobSecCon 2015 - Burning Marshmallows
MobSecCon 2015 - Burning Marshmallows
Ron Munitz
 
Android Enterprise vs Legacy Android (Device Admin APIs)
Android Enterprise vs Legacy Android (Device Admin APIs)Android Enterprise vs Legacy Android (Device Admin APIs)
Android Enterprise vs Legacy Android (Device Admin APIs)
Ashish Sharma
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technology
Gagandeep Nanda
 
Android security in depth - extended
Android security in depth - extendedAndroid security in depth - extended
Android security in depth - extended
Sander Alberink
 

Similar to Droidcon it 2015: Android Lollipop for Enterprise (20)

CodeMotion tel aviv 2015 - burning marshmallows
CodeMotion tel aviv 2015 - burning marshmallowsCodeMotion tel aviv 2015 - burning marshmallows
CodeMotion tel aviv 2015 - burning marshmallows
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
Migrating to Android 8.0
Migrating to Android 8.0Migrating to Android 8.0
Migrating to Android 8.0
 
Enterprise Ready Android and Manageability- Impetus Webcast
Enterprise Ready Android and Manageability- Impetus WebcastEnterprise Ready Android and Manageability- Impetus Webcast
Enterprise Ready Android and Manageability- Impetus Webcast
 
Android Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar PachauriAndroid Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar Pachauri
 
Android ch2..pptx
Android ch2..pptxAndroid ch2..pptx
Android ch2..pptx
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
What's new in android M(6.0)
What's new in android M(6.0)What's new in android M(6.0)
What's new in android M(6.0)
 
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
 
Voxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning MarshmallowsVoxxed Days Villnius 2015 - Burning Marshmallows
Voxxed Days Villnius 2015 - Burning Marshmallows
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
Introduction to Android M
Introduction to Android MIntroduction to Android M
Introduction to Android M
 
Android Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar PachauriAndroid Presentation By Ashok Kumar Pachauri
Android Presentation By Ashok Kumar Pachauri
 
LG Developer Event 2013 in San Francisco
LG Developer Event 2013 in San FranciscoLG Developer Event 2013 in San Francisco
LG Developer Event 2013 in San Francisco
 
AndroidManifest
AndroidManifestAndroidManifest
AndroidManifest
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
 
MobSecCon 2015 - Burning Marshmallows
MobSecCon 2015 - Burning Marshmallows MobSecCon 2015 - Burning Marshmallows
MobSecCon 2015 - Burning Marshmallows
 
Android Enterprise vs Legacy Android (Device Admin APIs)
Android Enterprise vs Legacy Android (Device Admin APIs)Android Enterprise vs Legacy Android (Device Admin APIs)
Android Enterprise vs Legacy Android (Device Admin APIs)
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technology
 
Android security in depth - extended
Android security in depth - extendedAndroid security in depth - extended
Android security in depth - extended
 

More from Consulthinkspa

GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei DatiGDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
Consulthinkspa
 
Big Data Vs. Open Data
Big Data Vs.  Open Data Big Data Vs.  Open Data
Big Data Vs. Open Data
Consulthinkspa
 
Data Science
Data ScienceData Science
Data Science
Consulthinkspa
 
Hot trend 2017
Hot trend 2017Hot trend 2017
Hot trend 2017
Consulthinkspa
 
Pensiero Analogico e Microservizi
Pensiero Analogico  e MicroserviziPensiero Analogico  e Microservizi
Pensiero Analogico e Microservizi
Consulthinkspa
 
DevOps - Come diventare un buon DevOpper
DevOps -  Come diventare un buon DevOpperDevOps -  Come diventare un buon DevOpper
DevOps - Come diventare un buon DevOpper
Consulthinkspa
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Consulthinkspa
 
Consulthink Overview
Consulthink OverviewConsulthink Overview
Consulthink Overview
Consulthinkspa
 
Scenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in AziendaScenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in Azienda
Consulthinkspa
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
Consulthinkspa
 
IPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtàIPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtà
Consulthinkspa
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
Consulthinkspa
 
Big data - stack tecnologico
Big data -  stack tecnologicoBig data -  stack tecnologico
Big data - stack tecnologico
Consulthinkspa
 
Quality Software Development LifeCycle
Quality Software Development LifeCycleQuality Software Development LifeCycle
Quality Software Development LifeCycle
Consulthinkspa
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013 Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013
Consulthinkspa
 
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliPrevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Consulthinkspa
 

More from Consulthinkspa (17)

GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei DatiGDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
 
Big Data Vs. Open Data
Big Data Vs.  Open Data Big Data Vs.  Open Data
Big Data Vs. Open Data
 
Data Science
Data ScienceData Science
Data Science
 
Hot trend 2017
Hot trend 2017Hot trend 2017
Hot trend 2017
 
Pensiero Analogico e Microservizi
Pensiero Analogico  e MicroserviziPensiero Analogico  e Microservizi
Pensiero Analogico e Microservizi
 
DevOps - Come diventare un buon DevOpper
DevOps -  Come diventare un buon DevOpperDevOps -  Come diventare un buon DevOpper
DevOps - Come diventare un buon DevOpper
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
 
Consulthink Overview
Consulthink OverviewConsulthink Overview
Consulthink Overview
 
Scenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in AziendaScenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in Azienda
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
 
IPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtàIPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtà
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
 
Big data - stack tecnologico
Big data -  stack tecnologicoBig data -  stack tecnologico
Big data - stack tecnologico
 
Quality Software Development LifeCycle
Quality Software Development LifeCycleQuality Software Development LifeCycle
Quality Software Development LifeCycle
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013 Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013
 
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliPrevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Droidcon it 2015: Android Lollipop for Enterprise

  • 2. Android Lollipop for Enterprise ● Senior Security Researcher - Mobile Security Lab ● Senior Security Analyst - Consulthink S.p.A. DroidCon IT 2015 - Android Lollipop For Enterprise 2 Who are we ● r.piccirillo@mseclab.com ● @robpicone ● r.gassira@mseclab.com ● @robgas @droidconit #droidconit
  • 3. Android Lollipop For Enterprise Enterprise Mobile Management 3
  • 4. Enterprise Mobile Management DroidCon IT 2015 - Android Lollipop For Enterprise 4 Enterprise Mobile Trends Gartner Market Statistics Forecast: PCs, Ultramobiles and Mobile Phones Worldwide, 2011-2018, 4Q14 Update
  • 5. Enterprise Mobile Management ● Secure Environment ○ SELinux ● Device Protection ○ Smart Lock ○ "Kill Switch" ● Device Management ○ Device Administration API ○ Device Owner ● Security Container ○ Managed Profile ○ App Restrictions ● Data Encryption DroidCon IT 2015 - Android Lollipop For Enterprise 5 Lollipop for Enteprise
  • 6. Android Lollipop For Enterprise SELinux 6
  • 7. ● Introduced in Android 4.3 to enforce the existing Discretionary Access Control (DAC) for application sandboxing (UID,GID) ● Provides Mandatory Access Control (MAC) over all processes at kernel level ● Allows to define fine-grained security policies ● Main security features: ○ Better system service restriction and protection ○ Improved access control to application data and system logs ○ Reduce effects of malicious software ○ User protection from potential flaws in mobile application SELinux DroidCon IT 2015 - Android Lollipop For Enterprise 7 Security-Enhanced Linux in Android "This new layer provides additional protection against potential security vulnerabilities by reducing exposure of system functionality to applications" Google Report Android Security 2014 Year in Review
  • 8. SELinux ● Three core elements: ○ Subject: Agent that perform actions on objects (processes or groups of processes referred as domains) ○ Action: The operation to perform ○ Object: OS-level resources managed by the kernel (file, socket) ● Processes, Sockets and Files have a label or security context: ○ username:role:type:mls_level ■ username is always u ■ role is r for domains, object_r for objects ■ type refers to the domain or to the object logic type ■ mls_level is always s0 DroidCon IT 2015 - Android Lollipop For Enterprise 8 Concepts
  • 9. SELinux username:role:type:mls_level ○ username is always u ○ role is r for domains, object_r for objects ○ type refers to the domain or to the object logical type ○ mls_level is always s0 DroidCon IT 2015 - Android Lollipop For Enterprise 9 Concepts SUBJECT OBJECT
  • 10. Lollipop Enhancements SELinux ● SELinux mode: ○ Permissive: permission denials are logged but not enforced ○ Enforcing: permission denials are both logged and enforced DroidCon IT 2015 - Android Lollipop For Enterprise 10 Android 4.3 Permissive Android 4.4 Partial Enforcing Android 5.x Full Enforcing ... limited set of crucial domains (installd, netd, vold and zygote)... ...to everything (more than 60 domains)...
  • 11. Android Lollipop For Enterprise Smart Lock 11
  • 12. Smart Lock ● Disable device lockscreen in "trusted condition" ● Based on Trust Agent: ○ "A service that notifies the system about whether it believes the environment of the device to be trusted" ○ Requires signatureOrSystem permission ○ Can be disabled by Device Administrator [KEYGUARD_DISABLE_TRUST_AGENTS] DroidCon IT 2015 - Android Lollipop For Enterprise 12 Trust Agent http://nelenkov. blogspot. it/2014/12/dissecting -lollipops-smart- lock.html lollipop/frameworks/base/core/res/AndroidManifest.xml
  • 13. Smart Lock ● Trust Agent provided by Google Play Services ● Device Unlocked methods: ○ Trusted bluetooth connected devices ○ Trusted places ○ Trusted face ○ On Body Detection ● Temporary unlock is disabled: ○ After 4 hours of inactivity ○ Device Reboot/Shutdown DroidCon IT 2015 - Android Lollipop For Enterprise 13 Some Details
  • 14. Android Lollipop for Enterprise Device Protection Corso Poste Sicurezza Android 14
  • 15. Device Protection ● "You can set up your device to prevent other people from using it if it's been reset to factory settings without your permission" ● Introduced in Android 5.1 ● Actually works only on Nexus 6 and Nexus 9 ● Requires: ○ Screen Lock enabled ○ Default Google account ○ "OEM Unlocking" disabled in Settings -> Developer Options ● Needs to wait 72 hours after changing password to reset the device DroidCon IT 2015 - Android Lollipop For Enterprise 15 "Kill Switch" Factory Reset
  • 16. Device Protection ● PersistentDataBlockService write on the partition defined by ro.frp.pst: ○ The OEM Unlocking setting (bit) ○ Write Block Checksum (SHA-256) DroidCon IT 2015 - Android Lollipop For Enterprise 16 OEM Unlocking PersistentDataBlockService
  • 17. Android Lollipop For Enterprise Device Administration API 17
  • 18. Device Administration API ● Introduced in Android 2.2 Froyo (API 8) ● Allows to enforce security policy on device ● Enterprise Oriented ● Vendor Customization ○ Samsung KNOX ○ LG Gate ● Used by Device Admin Application DroidCon IT 2015 - Android Lollipop For Enterprise 18 Intro
  • 19. Device Administration API ● Must be explicitly enabled in the device security settings ● Cannot be uninstalled if active ● Could be controlled by a remote server (agent) ● Several device admin applications can be enabled on a device (strictest policy among all applications is active) DroidCon IT 2015 - Android Lollipop For Enterprise 19 Device Admin Application
  • 20. Device Administration API DroidCon IT 2015 - Android Lollipop For Enterprise 20 Main Features API 8 API 9 API 11 API 14 API 17 API 21 API 22 Enforce Password Policy Watch User Login Reset Password Lock and Wipe Device Set Max Failed Password For Wipe Set Max Time To Lock Device Wipe SDCard Force Device Encryption Disable Camera Disable Keyguard Managed Profile Global Settings NFC Provisioning Wipe Factory Protection
  • 21. Device Administration API DroidCon IT 2015 - Android Lollipop For Enterprise 21 How It Works...
  • 22. Device Administration API ● Main Admin Application component DroidCon IT 2015 - Android Lollipop For Enterprise 22 DeviceAdminReceiver Required to ensure that only the system can interact with the receiver Primary ACTION that the receiver must handle Policy Declaration
  • 23. Device Administration API DroidCon IT 2015 - Android Lollipop For Enterprise 23 Policy Declaration
  • 24. Device Administration API ● Callback functions triggered on particular ACTION DroidCon IT 2015 - Android Lollipop For Enterprise 24 DeviceAdminReceiver Method Action onEnabled(Context context, Intent intent) ACTION_DEVICE_ADMIN_ENABLED onDisabled(Context context, Intent intent) ACTION_DEVICE_ADMIN_DISABLED onDisableRequested(Context context, Intent intent) ACTION_DEVICE_ADMIN_DISABLE_R EQUESTED onPasswordSucceeded(Context context, Intent intent) ACTION_PASSWORD_SUCCEEDED onPasswordFailed(Context context, Intent intent) ACTION_PASSWORD_FAILED onPasswordChanged(Context context, Intent intent) ACTION_PASSWORD_CHANGED
  • 25. Device Administration API ● Public Interface for managing policies on device ● Requires Device Administration rights enabled ● Main methods: ○ isAdminActive(ComponentName who) ○ setPasswordQuality(ComponentName admin, int quality) ○ resetPassword(String password, int flags) ○ lockNow() ○ wipeData(int flags) ○ setCameraDisabled(ComponentName admin, boolean disabled) ○ setStorageEncryption(ComponentName admin, boolean encrypt) DroidCon IT 2015 - Android Lollipop For Enterprise 25 DevicePolicyManager
  • 26. Device Administration API DroidCon IT 2015 - Android Lollipop For Enterprise 26 Device Admin Activation Implicit Intent for the system Settings
  • 27. Device Administration API ● "Specialized type of device administrator" with the additional ability to: ○ Add/Remove User ○ Modify Global settings ○ Set Application Restrictions ○ Wipe Factory Protection ● Typically used for company device ● Introduced in Android Lollipop (API 21) ● Only one device owner can be active at a time ● Cannot be disabled or removed ● Requires Device Encryption ● Deployed and activated via NFC DroidCon IT 2015 - Android Lollipop For Enterprise 27 Device Owner
  • 28. Device Administration API ● Via NFC NDEF Record with MIME Type MIME_TYPE_PROVISIONING_NFC and with properties: DroidCon IT 2015 - Android Lollipop For Enterprise 28 Device Owner Deploy REQUIRED CHECKSUM A String extra holding the SHA-1 checksum of the file at download location specified in EXTRA_PROVISIONING_DEVICE_ADMIN_PA CKAGE_DOWNLOAD_LOCATION. If this doesn't match the file at the download location an error will be shown to the user and the user will be asked to factory reset the device. cat app-debug.apk | openssl dgst -binary -sha1 | openssl base64 | tr '+/' '-_' | tr -d '='
  • 29. Device Administration API ● Device should not be provisioned Settings.Global.DEVICE_PROVISIONED = 0 ● Encrypted phone required ● "If provisioning fails, the device is factory reset" DroidCon IT 2015 - Android Lollipop For Enterprise 29 Device Owner Activation
  • 30. Android Lollipop For Enterprise Managed Profile 30
  • 31. Managed Profile ● New security feature for enterprise “managed profile” ● Available since Android Lollipop (API 21) ● Using managed profile the enterprise could define a controlled domain on the user's device to run controlled application ● The application inside the new managed profile can be configured with policy to interact or not with other apps on device ● Samsung KNOX functionality has been integrated into Android DroidCon IT 2015 - Android Lollipop For Enterprise 31 Introduction
  • 32. Managed Profile ● A Technology platform for: ○ Business protection, and ○ Personal Privacy ● Google and Samsung has designed the new Enterprise API around three major concepts: ○ Device and data security ○ Support for IT policies and restrictions ○ Mobile application management ● It has been introduced into Android Lollipop DroidCon IT 2015 - Android Lollipop For Enterprise 32 KNOX Framework
  • 33. Managed Profile ● A device administration component ○ A broadcast receiver that extends “DeviceAdminReceiver” ● AndroidManifest with a receiver: ○ The BIND_DEVICE_ADMIN permission ○ Respond, by intent-filetr, to the ACTION_DEVICE_ADMIN_ENABLED intent ○ A declaration of security policies used in metadata ● An intent to start the managed profile provisioning process: ○ ACTION_PROVISION_MANAGED_PROFILE action ○ An extra with the application package ● Override onProfileProvisioningComplete callback method to verify all is OK ● Enable the new managed profile DroidCon IT 2015 - Android Lollipop For Enterprise 33 Have to use...
  • 34. Managed Profile ● BasicDeviceAdminReceiver component DroidCon IT 2015 - Android Lollipop For Enterprise 34 Broadcast Receiver BroadcastReceiver of our provisioner application Callback method will be called when the system send ACTION_DEVICE_ADMI N_ENABLED. The new profile is installed but not yet enabled
  • 35. Managed Profile ● AndroidManifest.xml declaration DroidCon IT 2015 - Android Lollipop For Enterprise 35 AndroidManifest To avoid abuse by other applications Intercepted when the Managed Profile has successfully installed Policy declaration
  • 36. Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 36 Activation Intent to start the setup (Defined in the DevicePolicyManager.java) ● Start the Managed Profile provisioning The Application package name as additional information Verify there is an activity that resolves intent (ManagedProvisonActivity) Start activity by intent
  • 37. ● The new Managed profile has to be enabled Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 37 Enable the new profile Enable the managed profile Set name for new profile
  • 38. Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 38 Managed profile activated ● New Accounts associated to the new managed profile (Settings->Accounts) ● The admin profile (Work) for the new Managed Profile (Settings->Security- >Device administrators) ● The applications into new Managed Profile are badged
  • 39. Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 39 WorkFlow of Provisioning
  • 40. Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 40 Enable Application ● Add new application into Managed Profile Add the application by package name via DevicePolicyManager Get info about app Get reference at packageManager and DevicePolicyManager
  • 41. Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 41 Hide Application ● During the life of Managed Profile the application could be hidden specyfing the app package name ○ Only if the application is already installed we can hide application true to hide and false to un-hide
  • 42. Managed Profile ● Enable and disable Intent forwarding between private account and managed profile DroidCon IT 2015 - Android Lollipop For Enterprise 42 Cross Intent Enable with and disable intent between profiles Share some content
  • 43. Managed Profile ● Define Chrome restrictions DroidCon IT 2015 - Android Lollipop For Enterprise 43 App Restriction Define restriction Enable restriction
  • 44. Managed Profile DroidCon IT 2015 - Android Lollipop For Enterprise 44 App restrictions Configure some bookmarks Disable anonymous navigation Block www.example. com Configure search engine
  • 45. Managed Profile ● Application has to define a file restriction and declare it into Manifest file DroidCon IT 2015 - Android Lollipop For Enterprise 45 Define App Restrictions ● Defines the restriction item into app_restriction.xml file Declare external resource for restrictions restriction element with key and type of value
  • 46. Managed Profile ● Check current application’s restrictions DroidCon IT 2015 - Android Lollipop For Enterprise 46 Check app restrictions get current restrictions get reference to RestrictionManager search restriction by key to take the appropriate action
  • 47. Managed Profile ● Set application restriction via DevicePolicyManager DroidCon IT 2015 - Android Lollipop For Enterprise 47 Set app restrictions Builds a bundle with value for restriction Apply application restriction with method setApplicationRestrictions
  • 48. Android Lollipop For Enterprise Data Encryption 48
  • 49. Data Encryption ● Encryption is the process of encoding user data on an Android device using an encrypted key ● New feature on Android 5.0: ○ Fast encryption (only used blocks are encrypted on data partition) ○ forceencrypt flag to encrypt on first boot (Mandatory encryption at first boot) ○ Support for encryption without password ○ Hardware-backed storage of encryption key using Trusted Execution Environment ● Android introduced Disk encryption in Android version 3.0 and it has been available in all subsequent versions ● New key derivation function scrypt DroidCon IT 2015 - Android Lollipop For Enterprise 49 Some info
  • 50. Data Encryption ● Android disk encryption is based on dm-crypt (also used in Linux) ● Use a randomly 128-bit key with AES in CBC mode ○ CBC requires an inizialization vector IV ○ Android uses the encrypted salt-sector initialization vector (ESSIV) method with the SHA-256 hash algorithm (ESSIV: SHA256) ○ SHA256 is used to derive a key s from disk encryption key K called salt ○ Use the salt as encryption key to encrypt sector number SN of each sector to produce a per-sector IV ○ IV(SN)=AES-s(SN) where s=SHA256(K) DroidCon IT 2015 - Android Lollipop For Enterprise 50 How works
  • 51. Data Encryption ● The master key is encrypted with 128-bit AES ● In Android 5.0 release, four encryption states: ○ default,PIN,Password,Pattern ● Upon first boot the device creates a randomly generated 128-bit master key and then hashes it with a default password and stored salt (default_password) ● The hash is signed through a TEE, that uses hash to encrypt the master key ● When the user sets the PIN/pass or password on the device, only the 128-bit key is re-encrypted and stored DroidCon IT 2015 - Android Lollipop For Enterprise 51 How works
  • 52. Data Encryption DroidCon IT 2015 - Android Lollipop For Enterprise 52 Securing disk encryption key When user set PIN/PASSWORD/P ATTERN another key K1 is choosen to encrypt disk encryption key K
  • 53. Thanks! DroidCon Italy Torino 2015www.mseclab.com www.consulthink.it research@mseclab.com