This document summarizes Ron Munitz's presentation on Android security features and future vulnerabilities. It provides an overview of Android's security timeline and architecture. It then discusses past vulnerabilities like Stagefright and potential new avenues of attack in Android Marshmallow, such as issues with the fingerprint API, dynamic permission model, and app linking. The presentation speculates that future vulnerabilities may target certificate validation, media functions, and timing attacks against the keystore. It concludes by advertising Android security training classes.
TSC Sponsored BoF: Can Linux and Automotive Functional Safety Mix ? Take 2: T...Linaro
Session ID: SFO17-218
Session Name: TSC Sponsored BoF: Can Linux and Automotive Functional Safety Mix ? Take 2: Towards an open source, industry acceptable high assurance OS - SFO17-218
Speaker:
Track:
★ Session Summary ★
All are welcome!
At the first edition of the Automotive BoF held at Budapest David Rusling and
Robin Randhawa broached the topic of open source software use in the safety
critical parts of the Automotive domain. That discussion led to some important
realisations about Linux possibilities and realities. In this second edition
of the Automotive Bof David and Robin provide further interesting insights
from discussions with major Tier 1 Automotive OEMs. Overall, things seem to be
trending towards some concrete proposals for the role of Linaro in this space.
Join us at the BoF to learn more.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-218/
Presentation:
Video:
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
---------------------------------------------------
Keyword:
'http://www.linaro.org'
'http://connect.linaro.org'
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
This presentation covers rarely discussed topics of porting Qt to a new smartphone platform. Goals, strategies, and technical challenges will be discussed.
Qt is a cross-platform application framework that is widely used for developing application software with a graphical user interface.
Qt for Tizen is a community-driven port of Qt 5 to Tizen smartphones and possibly cars, tablets and notebooks. It brings the legendary programming experience of Qt to Tizen application developers.
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015Codemotion
Ron Munitz - Codemotion Rome 2015
In this session I will present the essential security measures for Application Developers, show how to reverse engineer purely protected apps, and discuss what common security guidelines will and will not work against untrusted, rooted devices. The session will include the confessions of an evil, yet good attacker, and will unleash some serious security flaws you have probably never considered in your app development.
Planting early seeds for blooming compliance
All small businesses are short on money and time, often putting free and open source software compliance (FOSS) at the bottom of their priorities. But FOSS compliance is not merely a matter of legal risk, it can deeply affect a company’s reputation and with it, the ability to hire engineers, form partnerships, and present a good external image. Moreover, a basic level of FOSS compliance is generally a must for companies going through funding rounds and M&A events. And a compliance journey also implies understanding the provenance of third-party software in use with other applications such as security or quality.
Traditionally, FOSS conferences have featured presentations by large companies that begin with “my Open Source Program Office handles…”. They describe tooling and processes for companies with thousands of employees, none of which small companies can even attempt to replicate. What small companies need is a way to prioritize their tasks and risks and to break down the process of getting into compliance into discrete and tangible steps supported by free and open source compliance tools. Some steps make sense at a one person company, others at 50 and yet others at 500. (...)
The Ultimate Android Security Checklist (Mdevcon 2014)Ron Munitz
My session in Mdevcon, March 2014, Amsterdam, The Netherlands.
In this session I will present the essential security measures for Application Developers, show how to reverse engineer purely protected apps, and discuss what common security guidelines will and will not work against untrusted, rooted devices.
The session will include the confessions of an evil, yet good attacker, and will unleash some serious security flaws you have probably never considered in your app development.
For Training/Consulting requests: info@thepscg.com
TSC Sponsored BoF: Can Linux and Automotive Functional Safety Mix ? Take 2: T...Linaro
Session ID: SFO17-218
Session Name: TSC Sponsored BoF: Can Linux and Automotive Functional Safety Mix ? Take 2: Towards an open source, industry acceptable high assurance OS - SFO17-218
Speaker:
Track:
★ Session Summary ★
All are welcome!
At the first edition of the Automotive BoF held at Budapest David Rusling and
Robin Randhawa broached the topic of open source software use in the safety
critical parts of the Automotive domain. That discussion led to some important
realisations about Linux possibilities and realities. In this second edition
of the Automotive Bof David and Robin provide further interesting insights
from discussions with major Tier 1 Automotive OEMs. Overall, things seem to be
trending towards some concrete proposals for the role of Linaro in this space.
Join us at the BoF to learn more.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-218/
Presentation:
Video:
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
---------------------------------------------------
Keyword:
'http://www.linaro.org'
'http://connect.linaro.org'
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
This presentation covers rarely discussed topics of porting Qt to a new smartphone platform. Goals, strategies, and technical challenges will be discussed.
Qt is a cross-platform application framework that is widely used for developing application software with a graphical user interface.
Qt for Tizen is a community-driven port of Qt 5 to Tizen smartphones and possibly cars, tablets and notebooks. It brings the legendary programming experience of Qt to Tizen application developers.
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015Codemotion
Ron Munitz - Codemotion Rome 2015
In this session I will present the essential security measures for Application Developers, show how to reverse engineer purely protected apps, and discuss what common security guidelines will and will not work against untrusted, rooted devices. The session will include the confessions of an evil, yet good attacker, and will unleash some serious security flaws you have probably never considered in your app development.
Planting early seeds for blooming compliance
All small businesses are short on money and time, often putting free and open source software compliance (FOSS) at the bottom of their priorities. But FOSS compliance is not merely a matter of legal risk, it can deeply affect a company’s reputation and with it, the ability to hire engineers, form partnerships, and present a good external image. Moreover, a basic level of FOSS compliance is generally a must for companies going through funding rounds and M&A events. And a compliance journey also implies understanding the provenance of third-party software in use with other applications such as security or quality.
Traditionally, FOSS conferences have featured presentations by large companies that begin with “my Open Source Program Office handles…”. They describe tooling and processes for companies with thousands of employees, none of which small companies can even attempt to replicate. What small companies need is a way to prioritize their tasks and risks and to break down the process of getting into compliance into discrete and tangible steps supported by free and open source compliance tools. Some steps make sense at a one person company, others at 50 and yet others at 500. (...)
The Ultimate Android Security Checklist (Mdevcon 2014)Ron Munitz
My session in Mdevcon, March 2014, Amsterdam, The Netherlands.
In this session I will present the essential security measures for Application Developers, show how to reverse engineer purely protected apps, and discuss what common security guidelines will and will not work against untrusted, rooted devices.
The session will include the confessions of an evil, yet good attacker, and will unleash some serious security flaws you have probably never considered in your app development.
For Training/Consulting requests: info@thepscg.com
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)Ron Munitz
My Android Security session in Code Motion , December 2014, Tel-Aviv, Israel.
In this session I will present the essential security measures for Application Developers, show how to reverse engineer purely protected apps, and discuss what common security guidelines will and will not work against untrusted, rooted devices. The session will include the confessions of an evil, yet good attacker, and will unleash some serious security flaws you have probably never considered in your app development.
For Training/Consulting requests: info@thepscg.com
https://www.tizen.org/events/tizen-developer-conference/2014/tizencommon-new-development-profile-tizen-3
Tizen:Common: a new development profile for Tizen 3
Tizen:Common provides a common development/build/test environment for Tizen 3. With the coming multiplication of verticals, creating a Common build base was becoming critical. All profiles will inherit from Tizen:Common and add their profile-specific features.
This talk will focus on the following topics:
* Tizen:Common architecture
* New features coming in Tizen:Common (Tizen 3): Multiuser, Wayland, 64 bits, Crosswalk, Buxton, SMACK, 3D UI
* Development, build, test workflow (OBS, GBS)
* Images availability
* Hardware reference targets
* Use cases: development, integration, QA
Year:
2014
Track:
Platform development
Presenter(s):
Stéphane Desneux, EUROGICIEL
Location:
Continental 5
Scheduled Time:
Tuesday, 3 June 2014 - 12:15pm to 12:55pm
Rob Herring is going to talk to us about the future ideas for his HAL work and how it could relate to our IoT group. Please bring your ideas, problem statements and be ready to discuss!
Cooperating with upstream projects Packaging tips and tricks
https://wiki.tizen.org/wiki/User:Pcoval
https://dockr.eurogiciel.fr/blogs/embedded/back-from-tdcsf14/
Session ID: SFO17-TR01
Session Name: Philosophy of Open Source
- SFO17-TR01
Speaker: Daniel Lezcano
Track:
★ Session Summary ★
What is the history and culture of Open Source?
New to Open Source? Always wondered why certain tools and processes are in place? Our presenters have experienced the good, bad and ugly of working with Open Source software and will share their wisdom and hard won tips.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-tr01/
Presentation:
Video:
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
---------------------------------------------------
Keyword:
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
BUD17-405: Building a reference IoT product with Zephyr Linaro
"Session ID: BUD17-405
Session Name: Building a reference IoT product with Zephyr - BUD17-405
Speaker: Michael Scott, Ricardo Salveti
Track: LTD
★ Session Summary ★
An example of a reference IoT product can be thought of supporting several core technologies such as IPv4/IPv6, 6LoWPAN, Bluetooth LE and also several protocols such as MQTT, CoAP and LWM2M. Additional requirements such as having a complete secure boot and execution environment, besides being able to be securely updated with FOTA support are also critically important. This session will cover the development and challenges faced when producing a reference IoT product implementation with Zephyr, describing the state of the project, and the current gaps to productization.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-405/
Presentation: https://www.slideshare.net/linaroorg/bud17405-building-a-reference-iot-product-with-zephyr
Video: https://youtu.be/TOJkzIJ_3jg
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: LTD, Zephyr. IoT
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Lean Software Production and Qualification InfrastructuresAdaCore
Florian Villoing presents the infrastructure AdaCore put in place to build and tests its compilation tool chains and add-on technology on a daily basis.
He also present the "qualification machine" that AdaCore created to ease the DO-178B tool qualification process.
These slides were used to support the talks Florian gave at the Agile Tour 2009 conferences in Grenoble (October 20, 2009) and Valence (October 22, 2009).
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)Ron Munitz
My session at the Embedded Linux Conference, April 2014, San Jose, CA
Think about the software development routines in the last couple of years. Now think of how they used to be before the "explosion" of cloud services provided by Amazon, Google, Rackspace, Microsoft and the likes.
Even when putting aside distinguished niches such as Safety Critical platforms, and ignoring for the moment the buzz for project management "Agile" methodologies, you will probably notice that the Software Building Practices have completely changed.
You will notice That developing a Software product has become more of an integration effort due to the "explosion" of open source repositories for "high level" components, and that the proficient software developer has become a master of Lego craft.
Now take a look at what Embedded Systems were back at the time, and what it is becoming these days. Not only can one choose their set of components, in ever decreasing prices, sell hardware on kickstarter before even starting a prototype, but one can also replace old times designated HW/SW assembly and libraries, and choose from a variety of Powerful General Purpose Operating Systems that can run servers, desktops, phones, tablets, fitness bracelets, and their next product.
Development has definitely evolved. From mainframes to AWS.
From the V2 analog controller to processing monsters running Linux, Android, Tizen, Windows, FireFoxOS, or your next hand made operating system.
In this session, I am going to present key milestones in the evolution of the Internet of Things, focusing on the present and immediate future techniques for rapidly prototyping and building product stacks, and discuss the many similarities of building a modern Software stack, and a modern Hardware stack.
For Training/Consulting requests: info@thepscg.com
My session at AnDevCon, April 2014, Boston, MA
The session gives an introduction to using the Java Native Interface (JNI) in Java, and in particular in the Android Platform. The session then covers the use of the Native Development Kit (NDK) for developing Android applications.
@todo update description
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)Ron Munitz
My Android Security session in Code Motion , December 2014, Tel-Aviv, Israel.
In this session I will present the essential security measures for Application Developers, show how to reverse engineer purely protected apps, and discuss what common security guidelines will and will not work against untrusted, rooted devices. The session will include the confessions of an evil, yet good attacker, and will unleash some serious security flaws you have probably never considered in your app development.
For Training/Consulting requests: info@thepscg.com
https://www.tizen.org/events/tizen-developer-conference/2014/tizencommon-new-development-profile-tizen-3
Tizen:Common: a new development profile for Tizen 3
Tizen:Common provides a common development/build/test environment for Tizen 3. With the coming multiplication of verticals, creating a Common build base was becoming critical. All profiles will inherit from Tizen:Common and add their profile-specific features.
This talk will focus on the following topics:
* Tizen:Common architecture
* New features coming in Tizen:Common (Tizen 3): Multiuser, Wayland, 64 bits, Crosswalk, Buxton, SMACK, 3D UI
* Development, build, test workflow (OBS, GBS)
* Images availability
* Hardware reference targets
* Use cases: development, integration, QA
Year:
2014
Track:
Platform development
Presenter(s):
Stéphane Desneux, EUROGICIEL
Location:
Continental 5
Scheduled Time:
Tuesday, 3 June 2014 - 12:15pm to 12:55pm
Rob Herring is going to talk to us about the future ideas for his HAL work and how it could relate to our IoT group. Please bring your ideas, problem statements and be ready to discuss!
Cooperating with upstream projects Packaging tips and tricks
https://wiki.tizen.org/wiki/User:Pcoval
https://dockr.eurogiciel.fr/blogs/embedded/back-from-tdcsf14/
Session ID: SFO17-TR01
Session Name: Philosophy of Open Source
- SFO17-TR01
Speaker: Daniel Lezcano
Track:
★ Session Summary ★
What is the history and culture of Open Source?
New to Open Source? Always wondered why certain tools and processes are in place? Our presenters have experienced the good, bad and ugly of working with Open Source software and will share their wisdom and hard won tips.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/sfo17/sfo17-tr01/
Presentation:
Video:
---------------------------------------------------
★ Event Details ★
Linaro Connect San Francisco 2017 (SFO17)
25-29 September 2017
Hyatt Regency San Francisco Airport
---------------------------------------------------
Keyword:
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
BUD17-405: Building a reference IoT product with Zephyr Linaro
"Session ID: BUD17-405
Session Name: Building a reference IoT product with Zephyr - BUD17-405
Speaker: Michael Scott, Ricardo Salveti
Track: LTD
★ Session Summary ★
An example of a reference IoT product can be thought of supporting several core technologies such as IPv4/IPv6, 6LoWPAN, Bluetooth LE and also several protocols such as MQTT, CoAP and LWM2M. Additional requirements such as having a complete secure boot and execution environment, besides being able to be securely updated with FOTA support are also critically important. This session will cover the development and challenges faced when producing a reference IoT product implementation with Zephyr, describing the state of the project, and the current gaps to productization.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-405/
Presentation: https://www.slideshare.net/linaroorg/bud17405-building-a-reference-iot-product-with-zephyr
Video: https://youtu.be/TOJkzIJ_3jg
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: LTD, Zephyr. IoT
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Lean Software Production and Qualification InfrastructuresAdaCore
Florian Villoing presents the infrastructure AdaCore put in place to build and tests its compilation tool chains and add-on technology on a daily basis.
He also present the "qualification machine" that AdaCore created to ease the DO-178B tool qualification process.
These slides were used to support the talks Florian gave at the Agile Tour 2009 conferences in Grenoble (October 20, 2009) and Valence (October 22, 2009).
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)Ron Munitz
My session at the Embedded Linux Conference, April 2014, San Jose, CA
Think about the software development routines in the last couple of years. Now think of how they used to be before the "explosion" of cloud services provided by Amazon, Google, Rackspace, Microsoft and the likes.
Even when putting aside distinguished niches such as Safety Critical platforms, and ignoring for the moment the buzz for project management "Agile" methodologies, you will probably notice that the Software Building Practices have completely changed.
You will notice That developing a Software product has become more of an integration effort due to the "explosion" of open source repositories for "high level" components, and that the proficient software developer has become a master of Lego craft.
Now take a look at what Embedded Systems were back at the time, and what it is becoming these days. Not only can one choose their set of components, in ever decreasing prices, sell hardware on kickstarter before even starting a prototype, but one can also replace old times designated HW/SW assembly and libraries, and choose from a variety of Powerful General Purpose Operating Systems that can run servers, desktops, phones, tablets, fitness bracelets, and their next product.
Development has definitely evolved. From mainframes to AWS.
From the V2 analog controller to processing monsters running Linux, Android, Tizen, Windows, FireFoxOS, or your next hand made operating system.
In this session, I am going to present key milestones in the evolution of the Internet of Things, focusing on the present and immediate future techniques for rapidly prototyping and building product stacks, and discuss the many similarities of building a modern Software stack, and a modern Hardware stack.
For Training/Consulting requests: info@thepscg.com
My session at AnDevCon, April 2014, Boston, MA
The session gives an introduction to using the Java Native Interface (JNI) in Java, and in particular in the Android Platform. The session then covers the use of the Native Development Kit (NDK) for developing Android applications.
@todo update description
The Android Build System - Android MarshmallowRon Munitz
Part of my workshop in MobModCon 2015, where I explained how to approach the Android Build System, prior to customizing or building a custom ROM. Within the presentation there are updates which are not yet a part of Marshmallow, but are already in the master branch, and I gave them special attention (mostly painted them in Red). Such items include the Ninja build system and some of its derivatives.
Android ROM cooking: A practical Tutorial (DroidCon Torino 2014)Ron Munitz
My workshop at DroidCon, February 2014, Torino, Italy.
In this tutorial, you will have a hands-on journey of customizing and building Android right off the Android Open Source Project (AOSP). We will begin with introducing the concepts of ROM cooking for any Android compatible device, and we we will then walk-through the build system of the AOSP. You will learn what Android is made of, how to build a bullet speed Android emulator, and how to build a minimal, fully operational Android configuration that will run on the QEMU virtual machine. You will step out of the classroom with the ability to follow the exact steps made in the tutorial to jump-start building your own Android system for any Virtual Machine - and with the tools and knowledge to build it for any custom device! Note: The tutorial is extremely hands on. Although it is not a strict requirement, it is strongly recommended to come prepared with a setup of Linux or OS X with the source code for an Android platform from http://source.android.com
Viva l'Italia!
For Training/Consulting requests: info@thepscg.com
Building Android for the Cloud: Android as a Server (Mobile World Congress 2014)Ron Munitz
My session in the Mobile World Congress WIPJam, Barcelona 2014.
In the cloud era, most software projects have shifted from asking "What hardware architecture should be chosen for my backend?" to "Which cloud configuration should be used for my backend?" Bringing up a cloud server has become an obvious choice for any Linux- or Windows-based deployment. As Android emerges as the new Embedded Linux for a growing number of industries, it only makes sense to consider its cloud application as a server. This session will discuss why and how Android can be brought on the cloud system, and on any cloud infrastructure, using AWS (Amazon Web Services) as an example.
Multi-User Android - The Complete Guide (AnDevCon Boston 2014)Ron Munitz
My session at AnDevCon, May 2014, Boston, MA
While Android was originally created for as a "single user, multiple apps, each app is a user" paradigm, much has changed once tablets were introduced.
The world has somewhat became a rounded rectangle, and multiple users, using the same tablet, has become the standard a la Android.
In this lecture, we will discuss how multi-user is implemented in Android, how to enable it for non-tablet devices, what has changed since the first introduction of multi-user support in Jelly-Bean, what is multi-user safe, what is not (as per Kit-Kat, or whatever is upstream at the time of slides submission), and more.
For Training/Consulting requests: info@thepscg.com
X86 ROM Cooking 101 (Android Builders Summit 2014)Ron Munitz
My session at the Android Builders Summit, April 2014, San Josa, CA
Video: https://www.youtube.com/watch?v=7iLeBD33Fo0
In this tutorial, you will have a hands-on journey of customizing and building Android right off the Android Open Source Project (AOSP).
We will begin with introducing the concepts of ROM cooking for any Android compatible device, and we we will then walk-through the build system of the AOSP. You will learn what Android is made of, how to build a bullet speed Android emulator, and how to build a minimal, fully operational Android configuration that will run on the QEMU virtual machine using the following components: Vanilla Android KitKat, Vanilla Linux Kernel, and a working QEMU. You will step out of the classroom with the ability to follow the exact steps made in the tutorial to jump-start building your own Android system for any Virtual Machine - and with the tools and knowledge to build it for any custom device!
For Training/Consulting requests: info@thepscg.com
The PSCG's Ron Munitz's talk on MobSecCon, September 3rd, 2015.
A PDF is available in: http://thepscg.com/events/MobSecCon
Israel's first Android (and mobile) Internals conference coming up this November!
http://www.thepscg.com/events/MobModCon
Android ROM Cooking 101: A practical tutorial (DroidCon Tel-Aviv 2014)Ron Munitz
My session at DroidCon Tel-Aviv, June 2014
In this tutorial, you will have a hands-on journey of building and customizing Android right off the Android Open Source Project (AOSP). We will begin with introducing the concepts of ROM cooking for any Android compatible device, and we we will then walk-through the build system of the AOSP. You will learn what Android is made of, how to build a bullet speed Android emulator, and how to build a minimal, fully operational Android configuration that will run on the QEMU virtual machine.
For Training/Consulting requests: info@thepscg.com
TEE - kernel support is now upstream. What this means for open source securityLinaro
TEE security infrastructure is now upstream in the Linux kernel, thanks to the hard work of many people in the ARM open source ecosystem. In this upcoming webinar, Joakim Bech and Jens Wiklander of the Linaro Security Working Group explain:
‣ Why upstream Linux kernel driver support is an important milestone.
‣ The relationship with specifications such as GlobalPlatform.
‣ A recap of the design principles for the TEE driver.
‣ How to get involved with TEE development.
This webinar is based on the work of the Linaro Security Working Group. Their work helps Linaro achieve its mission of providing upstream open source support for the ARM ecosystem. The webinar will be of interest to developers and engineering managers who would like the latest status on TEE support in Linux, particularly those looking to develop secure applications with e.g. OP-TEE. It’s also a great case study for those interested in the challenges of Linux kernel upstreaming. There will be the opportunity to ask questions before, during and after the webinar.
🎙 Speakers:
Joakim Bech, Security Working Group Tech Lead, Linaro
Jens Wiklander, Security Working Group Engineer & Upstream Driver Author, Linaro
🎯 Moderator:
Bill Fletcher, EMEA Field Engineering, Linaro
✨ Register here
http://linaro.co/webinar01
For more information on...
On Linaro - Leading Collaboration in the ARM Ecosystem - linaro.org
On OP-TEE - the TEE in Linux using the ARM® TrustZone® technology op-tee.org
----------------------------------------------
Videos & Presentation
--
Introduction to OP-TEE
--
A great introduction to OP-TEE security written from the standpoint of Automotive Grade Linux. It's only 13 slides with some great diagrams explaining trusted execution, secure boot and isolation.
#Automotive #AGL #OP-TEE #Linux
https://www.slideshare.net/YannickGicquel/introduction-to-optee-26-may-2016
--
OP-TEE for Beginners and Porting Review
--
Explains the building blocks involved in Security including TrustZone, OP-TEE, Trusted Firmware etc. Goes into detail on how Secure Boot Works.. and Why. Explains how a simple secure Trusted Application interacts with OP-TEE and works. Brief overview on how to port OP-TEE to an ARM platform. Opens discussions for Potential Challenges and Hardware limitations and how they can be overcome.
#TrustedApplication #Trustzone
http://connect.linaro.org/resource/hkg15/hkg15-311-op-tee-for-beginners-and-porting-review/
Learn how Decisiv provides secure access to developers and deals with compliance hurdles. Senior Engineer Hunter Madison will talk about how Decisiv needed to quickly solve the pain of scaling the engineering team, migrating to AWS, maintaining ISO 27002 compliance, and a few of his key learnings from his two-year journey using Teleport.
Flutter not yet another mobile cross-platform framework - i ox-kl19oradoe
Having painful experiences with NativeScript and a failed proof-of-concept (PoC) React Native, especially on Android, our development and Executive teams are terrified of any further mention of cross-platform mobile frameworks. However, when approaching Flutter, we believe it is NOT yet another cross-platform mobile development framework. And this is not a pure faith, but based on observation and analysis of (1) its technology, (2) the community adoption, and (3) most importantly, the strategy of Google — its original author and backer.
Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)Ron Munitz
My session in AnDevcon, November 2011, Burlingame, CA.
In the cloud era, most software projects have shifted from asking "What hardware architecture should be chosen for my back-end?" to "Which cloud configuration should be used for my back-end?" Bringing up a cloud server has become an obvious choice for any Linux or Windows-based deployment. As Android emerges as the new Embedded Linux for a growing number of industries, it only makes sense to consider its cloud application as a server.
In this class, we will discuss why and how Android can be brought on the cloud system, and on any cloud infrastructure, using AWS (Amazon Web Services) as an example.
LEVEL: Intermediate
AUDIENCE: Developer Essentials
For Training/Consulting requests: info@thepscg.com
Talking TUF: Securing Software DistributionDocker, Inc.
The Update Framework (TUF) secures new or existing software update systems by providing a specification and library that can be flexibly and universally integrated or natively implemented. The update procedure is notoriously susceptible to malicious attacks and TUF is designed to prevent these and other updater weaknesses.
Docker's Notary project integrates the Go implementation of TUF with Docker Content Trust to verify the publisher of Docker images.
https://github.com/theupdateframework/tuf
Iot development from prototype to productionMender.io
This is my talk on IOT connected device development. Topics include hardware, system software, application software, patching/updating, and other design considerations.
Similar to Voxxed Days Villnius 2015 - Burning Marshmallows (20)
1. PSCG
Ron Munitz
Founder & CEO - The PSCG
ron@thepscg.com
Voxxed Days
Vilnius
18 September 2015
@ronubo
The slides are available online at:
thepscg.com/talks/
Burning
Marshmallows
3. about://Ron Munitz
● Founder and CEO of the PSCG
○ The Premium Embedded/Android consulting and Training firm
● Android*, Linux*, Security* Trainer and Instructor
○ The PSCG, NewCircle and the Linux Foundation
● Senior Lecturer at Afeka College of Engineering and
Holon Institute of Technology
● Founder and (former) CTO of Nubo Software
○ The first Remote Android Workspace
● Always up for something new. Builder, Adviser.
● Building up on diverse engineering experience:
○ Distributed Fault Tolerant Avionic Systems
○ Highly distributed video routers
○ Real Time, Embedded, Server bringups
○ Operating Systems, very esoteric libraries, 0’s, 1’s and lots of them.
PSCG
6. Android Security Architecture
● Key Features
○ Robust security at the OS level through the Linux
kernel
○ Mandatory application sandbox for all applications
○ Secure interprocess communication
○ Application signing
○ Application-defined and user-granted permissions
○ SE Linux
○ Multi-User support, “work profiles”, “guest profiles”,...
○ FUSE for sdcard (permissions, encryption)
○ Trusted Execution Environment and HW support
PSCG
7. Android Security features timeline
● Permission System / Signature Systems
● JCE (BouncyCastle), OpenSSL
● Partial ASLR (“stagefright” → ICS!)
● Hardware Backed KeyStore
● Full ASLR (and later heap randomization and full PIE)
● SE Linux (first permissive, then Enforcing)
● OTA Update System (e.g. Chromium)
● Full disk encryption, dm-crypt
● Trusted Boot support, dm-verity
● SE Linux - Full domain enforcement (important addition)
● Partial Permission Module (Burden on the developer...)
● Fingerprinting API,
● Keystore redesign
● ...
9. Popular Attack Surfaces
● The AOSP builds on countless lines of code
○ Developed by Google and Partners
■ AOSP → OEM → Carrier chain of (mis)trust
○ “Borrowed”/Ported
● init services
○ If defined critical may lead to device reboot
○ If restarts other services - may lead to DoS
● Android services
○ Usually one service (server) serves multiple
components (clients) ⇒ DoS
● Separate code injection and privilege
escalation from DoS!
10. Don’t (blindly) believe the news
● StageFright sequences (by several vendors).
○ Fact: “Everyone” is fuzzing stagefright.
■ @see “Fuzzing the media framework in android”
by the Intel OTC, at ELC 2015
○ The mediaserver runs stagefright as the “media
backend”
○ If “everyone” fuzzes ⇒ at least someone succeeds
11. Don’t (blindly) believe the news
● Fact: One of the Stagefright exploits was
severe because it could be triggered
remotely.
○ This is a huge deal.
○ If only...
● Fact: ASLR, PIE, DEP, SELinux,...
● Home exercise/Group bet:
○ Assuming an MMS costs $0.01. How many USD
would you spend on arbitrary remote code
execution?
○ Volunteers?
12. Don’t (blindly) believe the news
● Fact: One of the stagefright exploits resulted
in DoS attacks on the media server due to
heap overflow.
● This can lead to annoying behavior, and
more.
● Fact: mediaserver is not a privileged user.
Software components have bugs. It’s a part
of life.
● Opinion: If someone manages to exploit
those vulnerabilities, they probably deserve
a prize...
13. Yet, don’t avoid somewhat silent news
● A good attack is a low profile attack.
● An excellent attack is a zero-day attack
● Disclosure does not always help, and the
Android Ecosystem does is not a great
helper
○ AOSP → OEM → Carrier → (?) → User
● And when someone in the chain decides to
do something stupid within the chain -
someone else will take advantage
○ @see the “yearly” signature verification attacks
○ In fact, let’s have a quick look at a recent one
14. Silent but lethal news as per Sep 15
A great example which has not been published without
proportions and been recently patched at most, but not all
implementations is the Certifi-gate attack against RST
(Remote Support Tools):
15. Silent but lethal news as per Sep 15
● It turns out that RST such as TeamViewer, RSupport
and more, which were bundled in some popular device
ROMs from leading companies (LG, Samsung, Huawei
and more), had privileged access to elements such as
○ Screen Recording (Surface Flinger/Framebuffer)
○ Event Injection
○ Package Installation
16. Silent but lethal news as per Sep 15
● It also turns out that these RST’s enabled “trusted”
applications to take advantage of these permissions, by
using them as a (confused?) deputy, while the
applications would be an “extension”.
● What is trust?
○ Apparently, comparing an X509 certificate serial
number to a hard-coded value, comparing a
certificate “HashCode” to a hardcoded value etc…
● Given that, one could just build a “trusted” “extension” to
the RST, that would have full device control, without
ever asking for any permission.
● Great.
18. Marshmallow Additions
● FingerPrinting API
○ Biometric ID’s anyone?
○ Trusted Execution Environment implementation
■ @see attacks on ARM TrustZone..
○ What if the device has no TEE?
■ Prone to forensics…
● Dynamic Permission API
○ Basically a good thing. Finally catches up with iOS
dynamic permission model
○ Drawback: Will break applications. Not because it is
a bad things. But because of application developers
○ Mitigation: SDL, Captain Hindsight
19. Marshmallow Additions
● Keystore API redesign
● Keystore HAL redesign/additions
○ keymaster v. 1.0 - First signs of maturity?
● Symmetric key cryptography support at (HW
backed) keystores
○ This has been out for a while.
○ But on a platform hidden API (@hide)
○ Now available for all!
● Enable timed authentication
○ Introducing the gatekeeper HAL
20. Marshmallow Additions
● APK Validation changes
○ Following various notorious APK signing bugs (Master
Key etc.).
○ If a file is declared in the manifest but not present in
the APK itself ⇒ APK is considered corrupt
● Android for Work
○ Behavior is still evolving (for better? worse?)
○ Examples: Automatic System updates
○ Runtime Permission policy for all applications
○ Data usage tracking.
○ Most changes are Android. Not Google Play services.
● External Storage Encryption, App Linking and
21. Dynamic Permission API
Target API < 23 Target API >= 23
Device API < 23 No change (shocking, isn’t it?) Use Build.VERSION.SDK_INT switch.
Device API >= 23 No change on installation (all
permissions granted)
Permission can be revoked -
may break apps. The device
will warn the user about it.
Full dynamic permission model.
Make sure you check for SDK_INT ,
and always checkSelfPermission() ,
[shouldShowPermissionRationale()],
and requestPermission() when
relevant.
Then, handle the user’s choice on
onRequestPermissionResults()
22. Dynamic Permission API
● Long story short:
Target API Level 23 ⇒ Application
developer needs to be aware of dynamic
permissions
● Device Level 23 ⇒ End User needs to be
aware of the consequences of disabling
permissions for older SDK level apps.
● It’s quite obvious researchers will
celebrate this significant behavior
change...
23. Ahead Of Time Compiling (ART)
● Marshmallow provides ART as the default
(and only unless specifically configured) run
time.
● It seems that the OAT files are still “Lollipop
compliant” ⇒ Trivially reversible due to:
● A full mapping from Native code to DEX bytecode
● A full mapping from both to Java functions.
● So you can apply the same techniques for .dex
file decompiling.
● @see my upcoming Android Reverse Engineering
Lab
24. Speculations
● The most dominant attacks we’ll hear of will
be in the categories of:
○ Certificate validation, self Certificate Chain validation
○ Everything under the AOSP /external/
■ Home exercise: Can you play with toybox?
○ Everything media related
○ Application breaking
○ Fingerprint stealing (if and when)
○ Bad SE Linux policies (unlikely for the “serious”
vendors, but hey, Android fragmentation…)
○ Timing attacks against the new Keystore API’s
● Or maybe we will hear of nothing. But
attackers/researchers will definitely try.
25. Follow up:
● Android Security workshop
○ Public class in Tel-Aviv - October 18-20, 2015.
○ training@thepscg.com
○ Discount Code: VoxxedDays1809
● Private/Public classes in Lithuania?
○ Contact me - training@thepscg.com