SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2,April 2015
DOI:10.5121/ijcsa.2015.5208 87
Impact of HeartBleed Bug in Android and Counter
Measures
Santosh Naidu P and Kasamsettty KedarNath
Department of CSE,M.V.G.R College of Engineering,Vizianagaram, India
Abstract
Now a days smart phones revolving around the globe. The no of Android users are also increasing day by
day, the main problem arises here. The Android operating system based devices are more advance and also
prone to bugs when compared to other OS devices. Mainly Android comes with lot of Apps so in order to
provide the services to the user. So the App developers was in a hurry to release the Apps as per market
strategy which causes vulnerabilities. Some of them intentionally creates the Apps in order to hack the
device. When compared to other operating system Android is a open source so everybody trys to perform
the reverse-engineering of Apks and perform some modifications, release the Apks into the market. We
believe that our study will awaken the developers and researches.
Keywords— OpenSSL; TLS; DTLS; gadgets
1.INTRODUCTION
Android and ios, and the provisions (applications) that run on these platforms have picked up
market share vastly . The vicinity of application development systems and rich libraries, and also
simple dispersion by means of online application stores, for example, Google Play furthermore
Apple App Store have significantly brought down the boundary to passage in application
improvement and organization. Not withstanding, the low boundary to enter the business sector
implies applications (or application upgrades) are liable to constrained investigation before
scattering, permitting slip inclined applications through and thusly influencing client experience.
A first step towards redressing this circumstance is to comprehend the way of bugs and the bug-
fixing methodology connected with cell phone stages and applications. In any case, exact bug
studies have so far centered generally on desktop and also server applications. The main cause
for the vulnerabilities occurring in the Android is open-source so that any App Developer can
peek into Apks by following the procedure of Reverse- Engineering with the help of apk-tool and
we can acquire all the source code used by the App Developer, and the modified can be released
into the store. We are having three stages of balancing the study of Bugs.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015
88
At first we need to focus on the quality of bug reports , fix process, fix time, priority, categories
and engagement of the community during the fix process. The main problem occurs at stage of
reporting time and fixing of bugs will vary. There will be lot of gap between these two stages.
Secondly we need to maintain the life-cycle process of bug with the hlep of google code. Mainly
every App developer will maintain their bug repository therefore everybody can access the bug
reports and try to fix them.
Finally at third stage Android Apps which in turn access the information related to user which can
be harmful. Day-to-day these bugs increasing widely.
2.HEARTBLEED BUG
Heartbleed is a security bug in the OpenSSL cryptography library. OpenSSL is a broadly utilized
usage of the Transport Layer Security(tls) convention. Heartbleed may be misused whether the
gathering utilizing a helpless OpenSSL case for TLS is a server or a customer.
Heartbleed results from dishonorable info acceptance (because of a missing limits check) in the
execution of the TLS pulse augmentation, the heartbeat being the premise for the bug's name. The
powerlessness is delegated a cradle over-perused, a circumstance where programming permits
more information to be perused than ought to be permitted. An altered rendition of OpenSSL was
discharged on April 7, 2014, on that day Heartbleed was openly revealed. Around then,
practically 17 percent (around a large portion of a million) of the Internet's safe web servers
ensured by trusted powers were accepted to be powerless against the strike, permitting burglary
of the servers' private keys and clients' session treats and passwords. The Electronic Frontier
Foundation, Ars Technica, and Bruce Schneier all regarded the Heartbleed bug "disastrous".
Forbes cyber security writer Joseph Steinberg composed, "Some may contend that [heartbleed] is
the most exceedingly bad helplessness found (in any event as far as its potential effect) since
business movement started to stream on the Internet."
As of May 20, 2014, 1.5% of the 800,000 most prevalent TLS-empowered sites were still
defenseless against Heartbleed. Heartbleed is enlisted in the Common Vulnerabilities and
Exposures framework as CVE-2014-0160. The elected Canadian Cyber Incident Response Center
issued a security release exhorting framework chairmen about the bug. Different TLS usage, for
example, Gnutls and Mozilla's Network Security Services, are not influenced, as the deformity
lies in OpenSSL's execution instead of in the Internet convention itself. Thus, none of Microsoft's
items or administrations are influenced by Heartbleed.
A.Appearance
The Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer
Security (DTLS) conventions was proposed as a standard in February 2012 by RFC 6520. It gives
an approach to test and keep alive secure correspondence joins without the need to renegotiate the
association each one time. The helpless code was received into across the board use with the
arrival of OpenSSL adaptation 1.0.1 on March 14, 2012. Pulse backing was empowered of
course, creating influenced renditions to be defenseless naturally.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015
89
B.Discovery
As per Mark J. Cox of OpenSSL, Neel Mehta of Google's security group reported Heartbleed on
April 1, 2014. The bug was named by a designer at Codenomicon, a Finnish cybersecurity
organization, which additionally made the draining heart logo, and dispatched the space
Heartbleed.comto clarify the bug to the general population. As per Codenomicon, Neel Mehta
initially reported the bug to OpenSSL, however both Google and Codenomicon ran across it
autonomously. Codenomicon reports April 3, 2014 as their date of disclosure of the bug and as
their date of warning of NCSC-FI (previously known as CERT-FI) for helplessness coordination.
C.Code patch
Bodo Moeller and Adam Langley of Google arranged the fix for Heartbleed. The ensuing patch,
which was added to Red Hat's issue tracker, is dated March 21, 2014. The following ordered date
accessible from general society confirmation is the case by Cloudflare that they altered the defect
on their frameworks on March 31, 2014. Stephen N. Henson connected the fix to OpenSSL's
variant control framework on 7 April. The initially settled adaptation, 1.0.1g, was discharged on
that day.
3.BEHAVOIUR OF HEARTBLEED BUG
The RFC 6520 Heartbeat Extension tests TLS/DTLS secure correspondence interfaces by
permitting a workstation toward one side of an association with send a "Pulse Request" message,
comprising of a payload, normally a content string, alongside the payload's length as a 16-
bitinteger. The getting workstation then must send literally the same payload again to the sender.
The influenced adaptations of OpenSSL allot a memory support for the message to be returned
focused around the length field in the asking for message, without respect to the genuine size of
that message's payload. Due to this disappointment to do fitting limits checking, the message
returned comprises of the payload, potentially emulated by whatever else happened to be in the
distributed memory cushion.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015
90
Fig 1. A Depiction of Heartbleed
Heartbleed is accordingly misused by sending a distorted pulse demand with a little payload and
substantial length field to the powerless gathering (typically a server) so as to inspire the
exploited person's reaction, allowing agressors to peruse up to 64 kilobytes of the exploited
person's memory that was liable to have been utilized long ago by OpenSSL. Where a Heartbeat
Request may ask a gathering to "send back the four-letter word 'winged creature'", bringing about
a reaction of "fledgling", a "Heartbleed Request" (a noxious pulse solicitation) of "send back the
500-letter word 'fowl'" would result in the victimized person to return "feathered creature" took
after by whatever 496 characters the victimized person happened to have in dynamic memory.
Agressors along these lines could get delicate information, trading off the classifiedness of the
exploited person's interchanges. Despite the fact that an assaulter has some control over the
revealed memory piece's size, it has no influence over its area, and thusly can't pick what
substance is uncovered. OpenSSL normally reacts with the lumps of memory it has most as of
late tossed.
A.Affected OpenSSL installations
The affected versions of OpenSSL are OpenSSL 1.0.1 through 1.0.1f (inclusive). Later versions
(1.0.1g and ulterior) and previous versions (1.0.0 branch and older) are notvulnerable.
Installations of the affected versions are vulnerable unless OpenSSL was compiled with -
DOPENSSL_NO_HEARTBEATS.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015
91
B.Vulnerable program and function
Define abbreviations and acronyms the first time they are used in the text, even after they have
been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not
have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. The
vulnerable program source files are t1_lib.c and d1_both.c and the vulnerable functions are
tls1_process_heartbeat() and dtls1_process_heartbeat().
4.IMPACT OF HEARTBLEED BUG
Any android gadgets running the 4.1.1 form of jam bean are vulnerable after the content alter has
been finished, the paper is prepared for the format. t's still vague what number of gadgets are
defenseless, yet the harm is prone to be substantially more held than Heartbleed. The most
helpless targets are EAP-based switches that require both an individual login and a secret key —
an answer regularly found in remote Lans. In those cases, an assaulter could utilize Heartbleed to
draw a private key from the switch or confirmation server, successfully bypassing any efforts to
establish safety. All the more significantly, the strike could just target gadgets inside Wi-Fi range,
genuinely restricting the potential targets. This specific variant of the strike may be slower to
close, But it ought not be about as across the board as the first bug, since the universe of
defenseless gadgets is easier. An alternate concern is Android gadgets even now running the 4.1.1
rendition of Jelly Bean, which are known to be powerless against the bug. In a switch based
ambush, the ambusher would offer an open Wi-Fi sign and after that perform the Heartbleed
assault to draw information from any associated gadgets. It's another line of assault, leaving
numerous Android gadgets recently defenseless. As now, a large number of gadgets were all the
while running 4.1.1, including a few varieties of the HTC One. Numerous were redesigned in the
wake of the strike, yet others may even now be defenseless.
All the more extensively, its an update that the security world is even now working through the
different impacts of Heartbleed. Significantly after the focal servers have been fixed, scientists
can find more darken strike that follow less evident targets. Helpless administrations like
OpenSSL and TLS were generally utilized, leaving an expansive reach of potential targets. "The
web and email are the greatest clients of [tls], however in no way, shape or form the main ones"
says Columbia teacher Steve Bellovin, "Any unpatched executions are at danger from
Heartbleed." Most current frameworks will have moved up to a Heartbleed-verification
adaptation of OpenSSL at this point, yet there's dependably the worry that a few access focuses
will stay unpatched. With respect to the more extensive effect of Heartbleed, Errata Security
originator Robert David Graham assesses just a large portion of the harm is cleaned up, proposing
Cupid may be the minimum of the groups inconveniences. "We'll be seeing vital Heartbleed
hacks for a considerable length of time,".
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015
92
Fig 2. A proof-of-concept exploitation of Android 4.1.1 mobile browser using the Heartbleed exploit
5.COUNTERMEASURES FOR HEARTBLEED BUG
At present there are about 17 antivirus applications on Google Play marked as "Heartbleed
finders". Six of them output the OpenSSL library having a place with the Android stage for
vulnerabilities. Lamentably, this technique isn't sufficient for identifying the Heartbleed weakness
on Android. But in restricted Android adaptations (principally 4.1.0-4.1.1), the lion's share of
Android stages are not powerless, as most forms utilization OpenSSL libraries that are not
helpless or essentially have the OpenSSL pulse usefulness debilitated. In any case, Android
applications much of the time use local libraries, which either specifically or by implication
power defenseless OpenSSL libraries. Hence, despite the fact that the Android stage itself is not
powerless, ambushers can even now ambush those helpless applications. They can commandeer
the system movement, redirect the application to a vindictive server and after that send made
heartbeats messages to the application to take delicate memory substance.
Applications with powerless OpenSSL libraries and affirmed this assault. The greater part of the
powerless applications are recreations, and some are office-based provisions. In spite of the fact
that there is very little profitable data in the diversion applications, ambushers can take Oauth
tokens (access tokens and revive tokens) to commandeer the amusement accounts; thusly, the
data may be valuable for commandeering those connected interpersonal organization accounts
with off base arrangements. Office applications helpless against Heartbleed are considerably
more hazardous because of further potential information spillage. Inside the 17 Heartbleed locator
applications on Google play, just 6 identifiers check introduced applications on the gadget for
Heartbleed powerlessness. Inside the 6, 2 report all applications introduced as "Protected",
including those we affirmed as defenseless. One locator doesn't indicate any application output
results and another doesn't check the OpenSSL form accurately. Just 2 of them did a better than
average scout Heartbleed weakness of applications. Despite the fact that they conservatively
marked some non-helpless applications as defenseless, we concur it is a suitable report which
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015
93
highlights both the vulnerabilities and the linkage botches. We've likewise seen a few fake
Heartbleed indicators in the 17 applications, which don't perform genuine discoveries nor show
recognition results to clients and just serve as adware.android's security sandbox outline keeps a
noxious application from having the capacity to get to memory substance utilized by partitioned
applications. Additionally lucky is the way that the greater part of Android telephones aren't
powerless. Still, the danger shouldn't be released. To end Heartbleed's hang on the server,
merchants and administration suppliers must embrace the Fixed OpenSSL programming.
A.The right kind of wrong: Coding error protects some Android apps from
Heartbleed
From the start, some Android office benefit requisitions likewise had all the earmarks of being
helpless. Be that as it may the scientists discovered a typical coding oversight really implied the
Heartbleed bug wouldn't work. "A deeper look indicates that these applications either commit an
error in the local code linkage or simply hold dead code," "In this manner, when they attempt to
conjure SSL capacities, they straightforwardly utilize the non-helpless OpenSSL library held
inside the Android OS, as opposed to utilizing the powerless library gave by the application."
REFERENCES
[1] Nielsen, "Smartphones Account for Half of all Mobile Phones, Dominate New Phone Purchases in the
US," March 29, 2012, http://blog.nielsen.com/nielsenwire/category/online-mobile/
[2] "Google play," April 2012, https://play.google.com/.
[3] E. Linstead and P. Baldi, "Mining the Coherence of GNOME Bug Reports with Statistical Topic
Models," in Proceedings of the 2009 6th IEEE International Working Conference on Mining Software
Repositories, ser. MSR '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 99-102.
[4] J. Śliwerski, T. Zimmermann, and A. Zeller, "When do changes induce fixes?", in Proc. MSR, 2005,
pp. 1-5.
[5] M. Fisher, M. Pinzger, and H. Gall, "Analyzing and relating bug report data for future tracking", in
Proc. WCRE, 2003, pp. 90-99.
[6] A. Pathak, A. Jindal, Y. C. Hu, and S. P. Midkiff, "What is keeping my phone awake?: characterizing
and detecting no-sleep energy bugs in smartphone apps", in Proceedings of the 10th international
conference on Mobile systems, applications, and services, ser. MobiSys'12. New York, NY, USA:
ACM, 2012, pp. 267-280. [Online]. Available: http://doi.acm.org/10.1145/2307636. 2307661
[7] OpenRadar, "Openradar bug repository", http://openradar. appspot.com/.

More Related Content

Similar to Impact of HeartBleed Bug in Android and Counter Measures

Heartbleed by-danish amber
Heartbleed by-danish amberHeartbleed by-danish amber
Heartbleed by-danish amberRaghunath G
 
How to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstrationHow to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstrationPankaj Rane
 
Heartbleed Bug Flaw in Servers and its reverse
Heartbleed Bug Flaw in Servers and its reverseHeartbleed Bug Flaw in Servers and its reverse
Heartbleed Bug Flaw in Servers and its reverseMohamed Hisham Ache
 
Dismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsDismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsOlli-Pekka Niemi
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
A Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsIJERD Editor
 
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...IJCNCJournal
 
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...IJCNCJournal
 
Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things! Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things! Kymberlee Price
 
Sensorpedia
SensorpediaSensorpedia
SensorpediaFranciel
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityAhmed Banafa
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelledlosalamos
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityShubhneet Goel
 

Similar to Impact of HeartBleed Bug in Android and Counter Measures (20)

Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Heartbleed by-danish amber
Heartbleed by-danish amberHeartbleed by-danish amber
Heartbleed by-danish amber
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
How to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstrationHow to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstration
 
Heartbleed Bug Flaw in Servers and its reverse
Heartbleed Bug Flaw in Servers and its reverseHeartbleed Bug Flaw in Servers and its reverse
Heartbleed Bug Flaw in Servers and its reverse
 
Dismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsDismantling intrusion prevention_systems
Dismantling intrusion prevention_systems
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
A Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of ThingsA Survey: DDOS Attack on Internet of Things
A Survey: DDOS Attack on Internet of Things
 
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
 
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examina...
 
Dependency check
Dependency checkDependency check
Dependency check
 
Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things! Security Vulnerabilities in Third Party Code - Fix All the Things!
Security Vulnerabilities in Third Party Code - Fix All the Things!
 
Sensorpedia
SensorpediaSensorpedia
Sensorpedia
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Ijetr012045
Ijetr012045Ijetr012045
Ijetr012045
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Impact of HeartBleed Bug in Android and Counter Measures

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2,April 2015 DOI:10.5121/ijcsa.2015.5208 87 Impact of HeartBleed Bug in Android and Counter Measures Santosh Naidu P and Kasamsettty KedarNath Department of CSE,M.V.G.R College of Engineering,Vizianagaram, India Abstract Now a days smart phones revolving around the globe. The no of Android users are also increasing day by day, the main problem arises here. The Android operating system based devices are more advance and also prone to bugs when compared to other OS devices. Mainly Android comes with lot of Apps so in order to provide the services to the user. So the App developers was in a hurry to release the Apps as per market strategy which causes vulnerabilities. Some of them intentionally creates the Apps in order to hack the device. When compared to other operating system Android is a open source so everybody trys to perform the reverse-engineering of Apks and perform some modifications, release the Apks into the market. We believe that our study will awaken the developers and researches. Keywords— OpenSSL; TLS; DTLS; gadgets 1.INTRODUCTION Android and ios, and the provisions (applications) that run on these platforms have picked up market share vastly . The vicinity of application development systems and rich libraries, and also simple dispersion by means of online application stores, for example, Google Play furthermore Apple App Store have significantly brought down the boundary to passage in application improvement and organization. Not withstanding, the low boundary to enter the business sector implies applications (or application upgrades) are liable to constrained investigation before scattering, permitting slip inclined applications through and thusly influencing client experience. A first step towards redressing this circumstance is to comprehend the way of bugs and the bug- fixing methodology connected with cell phone stages and applications. In any case, exact bug studies have so far centered generally on desktop and also server applications. The main cause for the vulnerabilities occurring in the Android is open-source so that any App Developer can peek into Apks by following the procedure of Reverse- Engineering with the help of apk-tool and we can acquire all the source code used by the App Developer, and the modified can be released into the store. We are having three stages of balancing the study of Bugs.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015 88 At first we need to focus on the quality of bug reports , fix process, fix time, priority, categories and engagement of the community during the fix process. The main problem occurs at stage of reporting time and fixing of bugs will vary. There will be lot of gap between these two stages. Secondly we need to maintain the life-cycle process of bug with the hlep of google code. Mainly every App developer will maintain their bug repository therefore everybody can access the bug reports and try to fix them. Finally at third stage Android Apps which in turn access the information related to user which can be harmful. Day-to-day these bugs increasing widely. 2.HEARTBLEED BUG Heartbleed is a security bug in the OpenSSL cryptography library. OpenSSL is a broadly utilized usage of the Transport Layer Security(tls) convention. Heartbleed may be misused whether the gathering utilizing a helpless OpenSSL case for TLS is a server or a customer. Heartbleed results from dishonorable info acceptance (because of a missing limits check) in the execution of the TLS pulse augmentation, the heartbeat being the premise for the bug's name. The powerlessness is delegated a cradle over-perused, a circumstance where programming permits more information to be perused than ought to be permitted. An altered rendition of OpenSSL was discharged on April 7, 2014, on that day Heartbleed was openly revealed. Around then, practically 17 percent (around a large portion of a million) of the Internet's safe web servers ensured by trusted powers were accepted to be powerless against the strike, permitting burglary of the servers' private keys and clients' session treats and passwords. The Electronic Frontier Foundation, Ars Technica, and Bruce Schneier all regarded the Heartbleed bug "disastrous". Forbes cyber security writer Joseph Steinberg composed, "Some may contend that [heartbleed] is the most exceedingly bad helplessness found (in any event as far as its potential effect) since business movement started to stream on the Internet." As of May 20, 2014, 1.5% of the 800,000 most prevalent TLS-empowered sites were still defenseless against Heartbleed. Heartbleed is enlisted in the Common Vulnerabilities and Exposures framework as CVE-2014-0160. The elected Canadian Cyber Incident Response Center issued a security release exhorting framework chairmen about the bug. Different TLS usage, for example, Gnutls and Mozilla's Network Security Services, are not influenced, as the deformity lies in OpenSSL's execution instead of in the Internet convention itself. Thus, none of Microsoft's items or administrations are influenced by Heartbleed. A.Appearance The Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) conventions was proposed as a standard in February 2012 by RFC 6520. It gives an approach to test and keep alive secure correspondence joins without the need to renegotiate the association each one time. The helpless code was received into across the board use with the arrival of OpenSSL adaptation 1.0.1 on March 14, 2012. Pulse backing was empowered of course, creating influenced renditions to be defenseless naturally.
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015 89 B.Discovery As per Mark J. Cox of OpenSSL, Neel Mehta of Google's security group reported Heartbleed on April 1, 2014. The bug was named by a designer at Codenomicon, a Finnish cybersecurity organization, which additionally made the draining heart logo, and dispatched the space Heartbleed.comto clarify the bug to the general population. As per Codenomicon, Neel Mehta initially reported the bug to OpenSSL, however both Google and Codenomicon ran across it autonomously. Codenomicon reports April 3, 2014 as their date of disclosure of the bug and as their date of warning of NCSC-FI (previously known as CERT-FI) for helplessness coordination. C.Code patch Bodo Moeller and Adam Langley of Google arranged the fix for Heartbleed. The ensuing patch, which was added to Red Hat's issue tracker, is dated March 21, 2014. The following ordered date accessible from general society confirmation is the case by Cloudflare that they altered the defect on their frameworks on March 31, 2014. Stephen N. Henson connected the fix to OpenSSL's variant control framework on 7 April. The initially settled adaptation, 1.0.1g, was discharged on that day. 3.BEHAVOIUR OF HEARTBLEED BUG The RFC 6520 Heartbeat Extension tests TLS/DTLS secure correspondence interfaces by permitting a workstation toward one side of an association with send a "Pulse Request" message, comprising of a payload, normally a content string, alongside the payload's length as a 16- bitinteger. The getting workstation then must send literally the same payload again to the sender. The influenced adaptations of OpenSSL allot a memory support for the message to be returned focused around the length field in the asking for message, without respect to the genuine size of that message's payload. Due to this disappointment to do fitting limits checking, the message returned comprises of the payload, potentially emulated by whatever else happened to be in the distributed memory cushion.
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015 90 Fig 1. A Depiction of Heartbleed Heartbleed is accordingly misused by sending a distorted pulse demand with a little payload and substantial length field to the powerless gathering (typically a server) so as to inspire the exploited person's reaction, allowing agressors to peruse up to 64 kilobytes of the exploited person's memory that was liable to have been utilized long ago by OpenSSL. Where a Heartbeat Request may ask a gathering to "send back the four-letter word 'winged creature'", bringing about a reaction of "fledgling", a "Heartbleed Request" (a noxious pulse solicitation) of "send back the 500-letter word 'fowl'" would result in the victimized person to return "feathered creature" took after by whatever 496 characters the victimized person happened to have in dynamic memory. Agressors along these lines could get delicate information, trading off the classifiedness of the exploited person's interchanges. Despite the fact that an assaulter has some control over the revealed memory piece's size, it has no influence over its area, and thusly can't pick what substance is uncovered. OpenSSL normally reacts with the lumps of memory it has most as of late tossed. A.Affected OpenSSL installations The affected versions of OpenSSL are OpenSSL 1.0.1 through 1.0.1f (inclusive). Later versions (1.0.1g and ulterior) and previous versions (1.0.0 branch and older) are notvulnerable. Installations of the affected versions are vulnerable unless OpenSSL was compiled with - DOPENSSL_NO_HEARTBEATS.
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015 91 B.Vulnerable program and function Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. The vulnerable program source files are t1_lib.c and d1_both.c and the vulnerable functions are tls1_process_heartbeat() and dtls1_process_heartbeat(). 4.IMPACT OF HEARTBLEED BUG Any android gadgets running the 4.1.1 form of jam bean are vulnerable after the content alter has been finished, the paper is prepared for the format. t's still vague what number of gadgets are defenseless, yet the harm is prone to be substantially more held than Heartbleed. The most helpless targets are EAP-based switches that require both an individual login and a secret key — an answer regularly found in remote Lans. In those cases, an assaulter could utilize Heartbleed to draw a private key from the switch or confirmation server, successfully bypassing any efforts to establish safety. All the more significantly, the strike could just target gadgets inside Wi-Fi range, genuinely restricting the potential targets. This specific variant of the strike may be slower to close, But it ought not be about as across the board as the first bug, since the universe of defenseless gadgets is easier. An alternate concern is Android gadgets even now running the 4.1.1 rendition of Jelly Bean, which are known to be powerless against the bug. In a switch based ambush, the ambusher would offer an open Wi-Fi sign and after that perform the Heartbleed assault to draw information from any associated gadgets. It's another line of assault, leaving numerous Android gadgets recently defenseless. As now, a large number of gadgets were all the while running 4.1.1, including a few varieties of the HTC One. Numerous were redesigned in the wake of the strike, yet others may even now be defenseless. All the more extensively, its an update that the security world is even now working through the different impacts of Heartbleed. Significantly after the focal servers have been fixed, scientists can find more darken strike that follow less evident targets. Helpless administrations like OpenSSL and TLS were generally utilized, leaving an expansive reach of potential targets. "The web and email are the greatest clients of [tls], however in no way, shape or form the main ones" says Columbia teacher Steve Bellovin, "Any unpatched executions are at danger from Heartbleed." Most current frameworks will have moved up to a Heartbleed-verification adaptation of OpenSSL at this point, yet there's dependably the worry that a few access focuses will stay unpatched. With respect to the more extensive effect of Heartbleed, Errata Security originator Robert David Graham assesses just a large portion of the harm is cleaned up, proposing Cupid may be the minimum of the groups inconveniences. "We'll be seeing vital Heartbleed hacks for a considerable length of time,".
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015 92 Fig 2. A proof-of-concept exploitation of Android 4.1.1 mobile browser using the Heartbleed exploit 5.COUNTERMEASURES FOR HEARTBLEED BUG At present there are about 17 antivirus applications on Google Play marked as "Heartbleed finders". Six of them output the OpenSSL library having a place with the Android stage for vulnerabilities. Lamentably, this technique isn't sufficient for identifying the Heartbleed weakness on Android. But in restricted Android adaptations (principally 4.1.0-4.1.1), the lion's share of Android stages are not powerless, as most forms utilization OpenSSL libraries that are not helpless or essentially have the OpenSSL pulse usefulness debilitated. In any case, Android applications much of the time use local libraries, which either specifically or by implication power defenseless OpenSSL libraries. Hence, despite the fact that the Android stage itself is not powerless, ambushers can even now ambush those helpless applications. They can commandeer the system movement, redirect the application to a vindictive server and after that send made heartbeats messages to the application to take delicate memory substance. Applications with powerless OpenSSL libraries and affirmed this assault. The greater part of the powerless applications are recreations, and some are office-based provisions. In spite of the fact that there is very little profitable data in the diversion applications, ambushers can take Oauth tokens (access tokens and revive tokens) to commandeer the amusement accounts; thusly, the data may be valuable for commandeering those connected interpersonal organization accounts with off base arrangements. Office applications helpless against Heartbleed are considerably more hazardous because of further potential information spillage. Inside the 17 Heartbleed locator applications on Google play, just 6 identifiers check introduced applications on the gadget for Heartbleed powerlessness. Inside the 6, 2 report all applications introduced as "Protected", including those we affirmed as defenseless. One locator doesn't indicate any application output results and another doesn't check the OpenSSL form accurately. Just 2 of them did a better than average scout Heartbleed weakness of applications. Despite the fact that they conservatively marked some non-helpless applications as defenseless, we concur it is a suitable report which
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.2, April 2015 93 highlights both the vulnerabilities and the linkage botches. We've likewise seen a few fake Heartbleed indicators in the 17 applications, which don't perform genuine discoveries nor show recognition results to clients and just serve as adware.android's security sandbox outline keeps a noxious application from having the capacity to get to memory substance utilized by partitioned applications. Additionally lucky is the way that the greater part of Android telephones aren't powerless. Still, the danger shouldn't be released. To end Heartbleed's hang on the server, merchants and administration suppliers must embrace the Fixed OpenSSL programming. A.The right kind of wrong: Coding error protects some Android apps from Heartbleed From the start, some Android office benefit requisitions likewise had all the earmarks of being helpless. Be that as it may the scientists discovered a typical coding oversight really implied the Heartbleed bug wouldn't work. "A deeper look indicates that these applications either commit an error in the local code linkage or simply hold dead code," "In this manner, when they attempt to conjure SSL capacities, they straightforwardly utilize the non-helpless OpenSSL library held inside the Android OS, as opposed to utilizing the powerless library gave by the application." REFERENCES [1] Nielsen, "Smartphones Account for Half of all Mobile Phones, Dominate New Phone Purchases in the US," March 29, 2012, http://blog.nielsen.com/nielsenwire/category/online-mobile/ [2] "Google play," April 2012, https://play.google.com/. [3] E. Linstead and P. Baldi, "Mining the Coherence of GNOME Bug Reports with Statistical Topic Models," in Proceedings of the 2009 6th IEEE International Working Conference on Mining Software Repositories, ser. MSR '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 99-102. [4] J. Śliwerski, T. Zimmermann, and A. Zeller, "When do changes induce fixes?", in Proc. MSR, 2005, pp. 1-5. [5] M. Fisher, M. Pinzger, and H. Gall, "Analyzing and relating bug report data for future tracking", in Proc. WCRE, 2003, pp. 90-99. [6] A. Pathak, A. Jindal, Y. C. Hu, and S. P. Midkiff, "What is keeping my phone awake?: characterizing and detecting no-sleep energy bugs in smartphone apps", in Proceedings of the 10th international conference on Mobile systems, applications, and services, ser. MobiSys'12. New York, NY, USA: ACM, 2012, pp. 267-280. [Online]. Available: http://doi.acm.org/10.1145/2307636. 2307661 [7] OpenRadar, "Openradar bug repository", http://openradar. appspot.com/.