Why Eve & Mallory Love Android

Slides:



Advertisements
Similar presentations
Installation & User Guide
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar NC State University William.
SSLstrip Stepan Shykerynets
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
More Trick For Defeating SSL
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
Encryption, SSL and Certificates BY JOSHUA COX AND RACHAEL MEAD.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Chapter 9 Deploying IIS and Active Directory Certificate Services
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Securing and Sharing Files Over The Internet (Content Server Security) By Amihay Schwarz Instructor: Viktor Kulikov Software System Laboratory Department.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
The Inconvenient Truth about Web Certificates Jean-Pierre Hubaux Joint work with N. Vratonjic, J. Freudiger and V. Bindschaedler Work presented at WEIS.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
The Inconvenient Truth about Web Certificates Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jean-Pierre Hubaux June 2011, WEIS’11.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Configuring Active Directory Certificate Services Lesson 13.
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Course 201 – Administration, Content Inspection and SSL VPN
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Session 11: Security with ASP.NET
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSC-682 Advanced Computer Security Analyzing Websites for User-Visible Security Design Flaws Pompi Rotaru Based on an article by : Laura Falk, Atul Prakash,
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
EVALUATING SECURITY OF SMART PHONE MESSAGING APPLICATIONS PRESENTED BY SUDHEER AKURATHI.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Can SSL and TOR be intercepted? Secure Socket Layer.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Web Services Security Patterns Alex Mackman CM Group Ltd
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Setting and Upload Products
SSL Certificates for Secure Websites
How to Check if a site's connection is secure ?
Using SSL – Secure Socket Layer
Presented by Hussein Almulla
Presentation transcript:

Why Eve & Mallory Love Android An Analysis of Android SSL (In)Security

Android Apps Android is the most used Smartphone OS in the world with 48% market share Over 400,000 apps in the Google Play Market Android apps have been installed over 10 billion times Apps process a lot of privacy-related user data and have valid reasons to transmit it over the internet

Problem Apps are not forced to use SSL Apps are allowed to customize SSL so many Android apps use SSL incorrectly and are vulnerable to MITM attacks User has no idea when Android uses SSL Users are misinformed about the security of the connection or misinterpret warning signs

Able to inject virus code into an antivirus app to disable virus detection and detect arbitrary apps as a virus.

log-in credentials, personal documents, contacts, financial data, messages, pictures or videos. Able to capture credentials from American Express, Paypal, various bank accounts, Facebook, Twitter, Google, Yahoo, Microsoft Live ID, etc

Secure Sockets Layer (SSL) Used to establish a secure connection between a client and server. Client receives a X.509 certificate containing the server’s public key that is signed by a certificate authority. Client should validate certificate but this is not yet required by the SSL and X.509 standards.

SSL Validation Checks Does the subject (CN) of the certificate match the client’s desired destination? Is it a trusted Certificate Authority (CA)? Is the signature correct? Has the certificate expired? Has the certificate been revoked? Check Certificate Revocation Lists (CRLs)? Use Online Certificate Status Protocol (OCSP)?

SSL Misuses in Android Trusting all certificates Disregards the signer of the certificate and the subject Allowing all hostnames Does not check if certificate was issued for a given address Trusting many Certificate Authorities Attacks on CAs in 2011 makes trusting 134 root authorities questionable Mixed-Mode / No SSL Can mix secure with insecure connections or use no SSL

Man-in-the-Middle Attacks MITMA: an attacker can intercept messages between conversation partners Passive (eavesdropping) vs. active (tampering) Mixed-Mode/No SSL allows for passive MITMA by eavesdropping on non-protected communication or allowing for SSL stripping SSL stripping avoids SSL by replacing https:// with http:// Can occur if a browsing session begins using HTTP and switches to HTTPS via a link or a redirect.

Evaluating Android SSL Usage Built MalloDroid to perform static code analysis on 13,500 free apps from Google’s Play Market Permissions Request INTERNET and other privacy related permissions Network API calls HTTP transport and Non-HTTP (direct socket connections) HTTP vs. HTTPS HTTP only, mixed-mode (HTTP and HTTPS), or HTTPS only HTTPS available Able to establish a secure connection to the HTTP urls? Deployed certificates Evaluates SSL certificates of hosts referenced in apps SSL Validation

Android SSL Usage HTTP vs. HTTPS Deployed SSL Certificates 74% could have used HTTPS instead of HTTP 46% mixed-mode, 43% HTTP only, 0.8% HTTPS only Deployed SSL Certificates 17.3% bypass effective SSL verification by accepting all certificates or all hostnames for a from a trusted CA Many apps include HTTPS URLs for hosts that have certificates that are either expired, self-signed, have mismatching CNs (site’s common name) or are signed by non-default-trusted CAs. By adding an s to the url

MITMA: Trusting All Certificates 51% use the INTERNET permission in addition to permissions to access privacy related information Trusting all certificates Attack: MITMA proxy with self-signed certificate Over half of the banking apps tested leaked login credentials, affecting an install base of 100,000 – half a million users Windows Live Messenger service app with 10-50 million users leaks login credentials for email, messaging, or SkyDrive cloud storage users’ calendars, contacts, browser histories, profile information, social streams, short messages, or exact geographic locations

MITMA: Trusting All Hostnames Attack: Cert for an unrelated domain signed by startSSL Apps, including one used by 82% of Fortune 500 companies, leaked credentials for sensitive data Antivirus app updated virus signatures via broken SSL Install base of 500,000 – 1 million users Trusted that connection was secure and did no further validation Able to send empty signature database that was accepted without informing the user Able to create a virus signature for the antivirus which caused it to recognize itself as a virus and delete itself cre- dentials for different services, emails, text messages, contact data, bitcoin-miner API keys, premium content or access to online meetings

Overcoming MITMA SSL stripping Lazy SSL Used to go to secure login page from insecure landing page Apps with 1.5 million - 6 million installs leak login credentials for Yahoo, Facebook, and Google Overcome by forcing HTTPS Lazy SSL Poor SSL validation Overcome with SSL pinning A custom list of trusted CAs or a custom list of specific certificates

Feedback to Users Apps don’t always display visual feedback about whether the communication is secure. Email clients did login and registration in SSL, but sending and receiving mail defaulted to HTTP without alerting the user. Apps indicate that the connection is secure but are vulnerable MITMA when they fail to establish an SSL connection or do SSL validation Replay attack when the logins are encrypted but not fresh Apps that did prevent MITMA failed and gave confusing error messages

Countermeasures: OS Solutions Enforced certificate checking Disallow custom SSL handling by forcing users to use standard Android API implementation HTTPS everywhere Integrated into communication APIs to prevent SSL stripping Improved permissions and policies Separate permissions for SSL and PLAIN so apps can specify Policies like GSM_ONLY, NO_OPEN_WIFI, TRUSTED_NETWORKS to prevent MITMA Visual security feedback Properly inform users about connection type and security status. MalloDroid installation protection Integrated into app installers to warn user of unsafe apps

Countermeasures: Other Solutions App Market Solutions MalloDroid could be integrated into app market Automatically checks apps Could prevent apps from entering market or display the warnings in the app description Standalone Solution: The MalloDroid App and Service Easily deployed Allows user to perform checks on apps before install

Conclusion Google apps handle a lot of personal information for a lot of different people Users wrongly assume, or are incorrectly informed, that they are transmitting your securely when apps are not required to use SSL Apps are vulnerable to MITMA by failing to correctly validate the SSL certificates or by mixing HTTP with HTTPS Instead of allowing for SSL customization, proper certificate validation should be enforced, HTTPS should be used everywhere, and permissions and policies should be separated so that apps can better protect users’ data. Users should be better informed about how secure the connection is.