SlideShare a Scribd company logo
Smartphone Insecurity


           
               Click to edit the outline text
           
                •
                   Georgia
               Click to         Weidman
               formatedit the outline text format
                
                   Second Outline Level
                    Second Outline Level
                     −
                     −   Third Outline Level
                         Third Outline Level
                          
                             Fourth Outline
                              Fourth Outline
Agenda


    Smartphone Security Basics

    Common Attack Vectors and Examples

    Mitigation Strategies

    Common vulnerabilities in 3rd party apps

    Attack strategies against apps

    Secure coding practices for developing apps
                                     
                                         Click to edit the outline text
                                     
                                         formatedit the outline text format
                                         Click to
                                          
                                             Second Outline Level
                                              Second Outline Level
                                               −
                                               −   Third Outline Level
                                                   Third Outline Level
                                                    
                                                       Fourth Outline
                                                        Fourth Outline
What is a smartphone?




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
What is a smartphone?




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
What’s on your phone


    Personal info



    Work info



    Location info


                              
                                  Click to edit the outline text

    Account info                  formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Do We Need Privacy? (SMS examples)


    “Hi meet me for lunch”



    “Meet me for lunch while my wife is out”



    “Here is your bank account credentials”


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Attacks on Privacy (Infrastructure)



                   ? ?                 Cell Network



            io n
         p t
     c ry
  E n
                         
                             Click to edit the outline text
                         
                             formatedit the outline text format
                             Click to
                              
                                 Second Outline Level
                                  Second Outline Level
                                   −
                                   −   Third Outline Level
                                       Third Outline Level
                                         
                                            Fourth Outline
                                             Fourth Outline
Is GSM traffic encrypted?

SMSPDU:07914140540510F1040B915117344588F100
000121037140044A0AE8329BFD4697D9EC37




                         
                             Click to edit the outline text
                         
                             formatedit the outline text format
                             Click to
                              
                                 Second Outline Level
                                  Second Outline Level
                                   −
                                   −   Third Outline Level
                                       Third Outline Level
                                        
                                           Fourth Outline
                                            Fourth Outline
Is GSM traffic encrypted?

SMSPDU:07914140540510F1040B915117344588F100
000121037140044A0AE8329BFD4697D9EC37




                         
                             Click to edit the outline text
                         
                             formatedit the outline text format
                             Click to
                              
                                 Second Outline Level
                                  Second Outline Level
                                   −
                                   −   Third Outline Level
                                       Third Outline Level
                                        
                                           Fourth Outline
                                            Fourth Outline
Is GSM traffic encrypted?

Sending Number: 1-571-435-4881
Data: hellohello




                           
                               Click to edit the outline text
                           
                               formatedit the outline text format
                               Click to
                                 
                                    Second Outline Level
                                     Second Outline Level
                                      −
                                      −   Third Outline Level
                                          Third Outline Level
                                           
                                              Fourth Outline
                                               Fourth Outline
2G(EDGE)


Bad crypto:


          Up to the base station


          Algorithms breakable


                                    Click to edit the outline text
                                        

          No authentication of base format
                                     stations
                                    Click to edit the outline text format
                                        



                                            
                                               Second Outline Level
                                                Second Outline Level
                                                 −
                                                 −   Third Outline Level
                                                     Third Outline Level
                                                      
                                                         Fourth Outline
                                                          Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                                Research by: Chris Pagent
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                                Research by: Chris Pagent
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Breaking 2G Crypto


Break session key to get on the network


A5/2 trivial to break


Karsten Nohl broke A5/1 in 2009 in minutes


                                 
                                     Click to edit the outline text
                                 
                                     formatedit the outline text format
                                     Click to
                                      
                                         Second Outline Level
                                          Second Outline Level
                                           −
                                           −   Third Outline Level
                                               Third Outline Level
                                                
                                                   Fourth Outline
                                                    Fourth Outline
Attacks on Privacy (Infrastructure)


                                     Cell Network




                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                                Research by: Chris Pagent
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
Who cares about EDGE anyway?


    Still deployed



    By default phones will drop back to EDGE



    Is anyone on EDGE right now?


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Mitigation Strategies


    Replace 2G



    Option to turn off 2G on phones



    Encrypt data on phones before sending


                                  
                                      Click to edit the outline text
                                  
                                      formatedit the outline text format
                                      Click to
                                       
                                          Second Outline Level
                                           Second Outline Level
                                            −
                                            −   Third Outline Level
                                                Third Outline Level
                                                 
                                                    Fourth Outline
                                                     Fourth Outline
Attacks on Privacy (Platform)




              =
Attackers know how to attack these platforms



                                  
                                      Click to edit the outline text
                                  
                                      formatedit the outline text format
                                      Click to
                                       
                                          Second Outline Level
                                           Second Outline Level
                                            −
                                            −   Third Outline Level
                                                Third Outline Level
                                                 
                                                    Fourth Outline
                                                     Fourth Outline
Rooting/Jailbreaking


    Exploiting kernel/platform flaws



    Client side attacks



    Gain system level privileges similarly to PC platforms


                                       
                                           Click to edit the outline text
                                       
                                           formatedit the outline text format
                                           Click to
                                            
                                               Second Outline Level
                                                Second Outline Level
                                                 −
                                                 −   Third Outline Level
                                                     Third Outline Level
                                                      
                                                         Fourth Outline
                                                          Fourth Outline
JailbreakMe 3.0


    iPhone jailbreak



    Client side flaw in PDF (Mobile Safari)



    Kernel exploit


                                    
                                        Click to edit the outline text
                                    
                                        formatedit the outline text format
                                        Click to
                                         
                                            Second Outline Level
                                             Second Outline Level
                                              −
                                              −   Third Outline Level
                                                  Third Outline Level
                                                   
                                                      Fourth Outline
                                                       Fourth Outline
Rootstrap


    Android app loads kernel exploits



    Loads code dynamically



    Runs native code


                                    
                                        Click to edit the outline text

    Packaged with interesting app       formatedit the outline text format
                                    
                                        Click to
                                         
                                            Second Outline Level
                                             Second Outline Level
                                              −
                                              −   Third Outline Level
                                                  Third Outline Level
                                                   
                                                      Fourth Outline
                                                       Fourth Outline
DroidDream


    Android app in the market



    Rooted phones via kernel exploits



    Stole information


                                  
                                        Click to edit the outline text

    Ran up charges                      formatedit the outline text format
                                  
                                        Click to
                                         
                                            Second Outline Level
                                             Second Outline Level
                                              −
                                              −   Third Outline Level
                                                  Third Outline Level
                                                   
                                                      Fourth Outline
                                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Payload example: SMS botnet




                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
SMS PDU

SMSPDU:07914140540510F1040B915117344588F100
000121037140044A0AE8329BFD4697D9EC37




                        
                            Click to edit the outline text
                        
                            formatedit the outline text format
                            Click to
                             
                                Second Outline Level
                                 Second Outline Level
                                  −
                                  −   Third Outline Level
                                      Third Outline Level
                                       
                                          Fourth Outline
                                           Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key (Swallows Message)


                               
                                   Click to edit the outline text
7.   Performs Functionality        formatedit the outline text format
                               
                                   Click to
                                    
                                       Second Outline Level
                                        Second Outline Level
                                         −
                                         −   Third Outline Level
                                             Third Outline Level
                                              
                                                 Fourth Outline
                                                  Fourth Outline
How the Botnet Works


1.   Bot Receives a Message


3.   Bot Decodes User Data


5.   Checks for Bot Key


                              
                                  Click to edit the outline text
7.   Performs Functionality       formatedit the outline text format
                              
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Demo




 Demo of Botnet Click to edit the outline text
                Payload


                       
                           formatedit the outline text format
                           Click to
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                      
                                         Fourth Outline
                                          Fourth Outline
Mitigations for Platform Attacks


    Updating



    Better sandboxing



    Vigilance from users


                             
                                 Click to edit the outline text
                             
                                 formatedit the outline text format
                                 Click to
                                  
                                     Second Outline Level
                                      Second Outline Level
                                       −
                                       −   Third Outline Level
                                           Third Outline Level
                                            
                                               Fourth Outline
                                                Fourth Outline
App attacks on privacy




                     
                         Click to edit the outline text
                     
                         formatedit the outline text format
                         Click to
                          
                             Second Outline Level
                              Second Outline Level
                               −
                               −   Third Outline Level
                                   Third Outline Level
                                    
                                       Fourth Outline
                                        Fourth Outline
App Stores


    iPhone
    
        Expensive
    
        Closed
    
        Identity verified




    Android
    
        Cheap               
                                Click to edit the outline text
                                formatedit the outline text format
    
        Self Signed         
                                Click to
                                 
                                    Second Outline Level
                                     Second Outline Level
    
        Open
                                      −
                                      −   Third Outline Level
                                          Third Outline Level
    
        Anonymous                              Fourth Outline
                                               Fourth Outline
                                           
                                           
Android Permission Model


    Specifically request permissions



    Users must accept at install



    Send SMS, Receive SMS, GPS location


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
App attacks on privacy




Is this system working? Are users
making good decisions about
apps?                 Click to edit the outline text
                              


                              
                                  formatedit the outline text format
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Top Android App of All Time




                     
                         Click to edit the outline text
                     
                         formatedit the outline text format
                         Click to
                          
                             Second Outline Level
                              Second Outline Level
                               −
                               −   Third Outline Level
                                   Third Outline Level
                                    
                                       Fourth Outline
                                        Fourth Outline
Demo




Demo: App Abusing Permissions
                
                    Click to edit the outline text
                
                    formatedit the outline text format
                    Click to
                     
                        Second Outline Level
                         Second Outline Level
                          −
                          −   Third Outline Level
                              Third Outline Level
                               
                                  Fourth Outline
                                   Fourth Outline
App Attacks Mitigations


    Oversight on apps



    Analysis of permissions



    User awareness


                              
                                  Click to edit the outline text
                              
                                  formatedit the outline text format
                                  Click to
                                   
                                      Second Outline Level
                                       Second Outline Level
                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline
Vulnerabilities in Android Apps


    No coding standards for Android apps



    Badly coded apps



    Data Leak


                                  
                                      Click to edit the outline text

    Permission Leak                   formatedit the outline text format
                                  
                                      Click to
                                       
                                          Second Outline Level
                                           Second Outline Level
                                            −
                                            −   Third Outline Level
                                                Third Outline Level
                                                 
                                                    Fourth Outline
                                                     Fourth Outline
Data Leak


    Access to sensitive data



    Insecure storage
    
        sdcard
    
        World readable
    
        Stored in source code

                                
                                    Click to edit the outline text
                                
                                    formatedit the outline text format
                                    Click to
                                     
                                        Second Outline Level
                                         Second Outline Level
                                          −
                                          −   Third Outline Level
                                              Third Outline Level
                                               
                                                  Fourth Outline
                                                   Fourth Outline
Return to the Source


    Free tools available



    Complete source available



    Don’t store secrets here


                                
                                    Click to edit the outline text
                                
                                    formatedit the outline text format
                                    Click to
                                     
                                        Second Outline Level
                                         Second Outline Level
                                          −
                                          −   Third Outline Level
                                              Third Outline Level
                                               
                                                  Fourth Outline
                                                   Fourth Outline
Demo




DEMO: Abusing bad storage practices
                    
                        Click to edit the outline text
                    
                        formatedit the outline text format
                        Click to
                         
                            Second Outline Level
                             Second Outline Level
                              −
                              −   Third Outline Level
                                  Third Outline Level
                                   
                                      Fourth Outline
                                       Fourth Outline
Mitigating this risk


    Store sensitive data privately



    Don’t use the sdcard



    Don’t put secrets in source code


                                     
                                         Click to edit the outline text
                                     
                                         formatedit the outline text format
                                         Click to
                                          
                                             Second Outline Level
                                              Second Outline Level
                                               −
                                               −   Third Outline Level
                                                   Third Outline Level
                                                    
                                                       Fourth Outline
                                                        Fourth Outline
Permission leak through components


    Other apps can call public components



    That’s a reason Android is awesome



    If not used safely, this can be dangerous


                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Demo




DEMO: Stealing permissions from exposed
components
                       
                           Click to edit the outline text
                       
                           formatedit the outline text format
                           Click to
                            
                               Second Outline Level
                                Second Outline Level
                                 −
                                 −   Third Outline Level
                                     Third Outline Level
                                      
                                         Fourth Outline
                                          Fourth Outline
Mitigating This Risk


    Require permissions to access components



    Use custom permissions



    Don’t have dangerous functionality accessible without
    user interaction
                                   
                                       Click to edit the outline text
                                   
                                       formatedit the outline text format
                                       Click to
                                        
                                           Second Outline Level
                                            Second Outline Level
                                             −
                                             −   Third Outline Level
                                                 Third Outline Level
                                                  
                                                     Fourth Outline
                                                      Fourth Outline
Contact




                Georgia Weidman
    Security Consultant, Researcher, Trainer
    Website: http://www.georgiaweidman.com
Slides: http://www.slideshare.net/georgiaweidman
                            Click to edit the outline text
                                

         Email:georgia@grmn00bs.com
                            formatedit the outline text format
                            Click to
                                



           Twitter: @georgiaweidman Outline Level
                                Second Outline Level
                                    
                                Second
                                    



                                        −
                                        −   Third Outline Level
                                            Third Outline Level
                                             
                                                Fourth Outline
                                                 Fourth Outline

More Related Content

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Smartphone Insecurity

  • 1. Smartphone Insecurity  Click to edit the outline text  • Georgia Click to Weidman formatedit the outline text format   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 2. Agenda  Smartphone Security Basics  Common Attack Vectors and Examples  Mitigation Strategies  Common vulnerabilities in 3rd party apps  Attack strategies against apps  Secure coding practices for developing apps  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 3. What is a smartphone?  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 4. What is a smartphone?  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 5. What’s on your phone  Personal info  Work info  Location info  Click to edit the outline text  Account info formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 6. Do We Need Privacy? (SMS examples)  “Hi meet me for lunch”  “Meet me for lunch while my wife is out”  “Here is your bank account credentials”  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 7. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 8. Attacks on Privacy (Infrastructure) ? ? Cell Network io n p t c ry E n  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 9. Is GSM traffic encrypted? SMSPDU:07914140540510F1040B915117344588F100 000121037140044A0AE8329BFD4697D9EC37  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 10. Is GSM traffic encrypted? SMSPDU:07914140540510F1040B915117344588F100 000121037140044A0AE8329BFD4697D9EC37  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 11. Is GSM traffic encrypted? Sending Number: 1-571-435-4881 Data: hellohello  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 12. 2G(EDGE) Bad crypto: Up to the base station Algorithms breakable Click to edit the outline text  No authentication of base format stations Click to edit the outline text format    Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 13. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to Research by: Chris Pagent   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 14. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to Research by: Chris Pagent   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 15. Breaking 2G Crypto Break session key to get on the network A5/2 trivial to break Karsten Nohl broke A5/1 in 2009 in minutes  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 16. Attacks on Privacy (Infrastructure) Cell Network  Click to edit the outline text  formatedit the outline text format Click to Research by: Chris Pagent   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 17. Who cares about EDGE anyway?  Still deployed  By default phones will drop back to EDGE  Is anyone on EDGE right now?  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 18. Mitigation Strategies  Replace 2G  Option to turn off 2G on phones  Encrypt data on phones before sending  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 19. Attacks on Privacy (Platform) = Attackers know how to attack these platforms  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 20. Rooting/Jailbreaking  Exploiting kernel/platform flaws  Client side attacks  Gain system level privileges similarly to PC platforms  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 21. JailbreakMe 3.0  iPhone jailbreak  Client side flaw in PDF (Mobile Safari)  Kernel exploit  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 22. Rootstrap  Android app loads kernel exploits  Loads code dynamically  Runs native code  Click to edit the outline text  Packaged with interesting app formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 23. DroidDream  Android app in the market  Rooted phones via kernel exploits  Stole information  Click to edit the outline text  Ran up charges formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 24. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 25. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 26. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 27. Payload example: SMS botnet  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 28. SMS PDU SMSPDU:07914140540510F1040B915117344588F100 000121037140044A0AE8329BFD4697D9EC37  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 29. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 30. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 31. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 32. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key (Swallows Message)  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 33. How the Botnet Works 1. Bot Receives a Message 3. Bot Decodes User Data 5. Checks for Bot Key  Click to edit the outline text 7. Performs Functionality formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 34. Demo Demo of Botnet Click to edit the outline text Payload  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 35. Mitigations for Platform Attacks  Updating  Better sandboxing  Vigilance from users  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 36. App attacks on privacy  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 37. App Stores  iPhone  Expensive  Closed  Identity verified  Android  Cheap  Click to edit the outline text formatedit the outline text format  Self Signed  Click to   Second Outline Level Second Outline Level  Open − − Third Outline Level Third Outline Level  Anonymous Fourth Outline Fourth Outline  
  • 38. Android Permission Model  Specifically request permissions  Users must accept at install  Send SMS, Receive SMS, GPS location  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 39. App attacks on privacy Is this system working? Are users making good decisions about apps? Click to edit the outline text   formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 40. Top Android App of All Time  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 41. Demo Demo: App Abusing Permissions  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 42. App Attacks Mitigations  Oversight on apps  Analysis of permissions  User awareness  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 43. Vulnerabilities in Android Apps  No coding standards for Android apps  Badly coded apps  Data Leak  Click to edit the outline text  Permission Leak formatedit the outline text format  Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 44. Data Leak  Access to sensitive data  Insecure storage  sdcard  World readable  Stored in source code  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 45. Return to the Source  Free tools available  Complete source available  Don’t store secrets here  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 46. Demo DEMO: Abusing bad storage practices  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 47. Mitigating this risk  Store sensitive data privately  Don’t use the sdcard  Don’t put secrets in source code  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 48. Permission leak through components  Other apps can call public components  That’s a reason Android is awesome  If not used safely, this can be dangerous  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 49. Demo DEMO: Stealing permissions from exposed components  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 50. Mitigating This Risk  Require permissions to access components  Use custom permissions  Don’t have dangerous functionality accessible without user interaction  Click to edit the outline text  formatedit the outline text format Click to   Second Outline Level Second Outline Level − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline
  • 51. Contact Georgia Weidman Security Consultant, Researcher, Trainer Website: http://www.georgiaweidman.com Slides: http://www.slideshare.net/georgiaweidman Click to edit the outline text  Email:georgia@grmn00bs.com formatedit the outline text format Click to  Twitter: @georgiaweidman Outline Level Second Outline Level  Second  − − Third Outline Level Third Outline Level   Fourth Outline Fourth Outline

Editor's Notes

  1. Ubiquitous. Rural areas Saving my battery during a hurricane
  2. Edit and Read SMS, send SMS, receive SMS Modify/delete USB storage contents Prevent phone from sleeping, write sync settings GPS data Services that cost you money Act as account authenticator, manage accounts Read and write to your personal information including contact data Phone calls, read phone state and identity Full network access