SAFETYCHECK Eric Hatch | David Allen |Bailee Lucas| Austin Rhodes.

Slides:



Advertisements
Similar presentations
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Advertisements

Chrome Extentions Vulnerabilities. Introduction Google Chrome Browser Chrome OS Platform Chrome Web Store Applications Open Source Platform.
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
7 Effective Habits when using the Internet Philip O’Kane 1.
QUICK REFERENCE GUIDE PRESENTATION Tablets and Education: a new learning paradigm Adapted for each user’s requirements Tablet out of school: a tool for.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Update 2 Sarah Mercier. Summary Current status ▫Implemented features ▫Known bugs ▫Changes from original plan Prototype demo ▫Before/after ▫GAE/Play!/Siena.
The Current System Log and Update Time Switch Weeks via Calendar View, Edit, Delete Time for Selected Week Manage and View Leave Time Submit and Print.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Bypassing the Android Permission Model Georgia Weidman Founder and CEO, Bulb Security LLC.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Sophos Mobile Security
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Is Your Mobile App Secure. DEF CON 23 Wall of Sheep Sat
OOWL TECH LTD ystem. Are your tire safe??? Monitoring your tire stauts Easy to install Easy to setting Blurtooth iOS and Android Monitoring tire status.
Security Trifecta – Overview of Vulnerabilities in the Racing Industry Gus Fritschie December 11, 2013.
OS Hardening Justin Whitehead Francisco Robles. ECE Internetwork Security OS Hardening Installing kernel/software patches and configuring a system.
The Microsoft Baseline Security Analyzer A practical look….
Downloading Lumi Show on Android Devices Through our technology, people gain insight, instantly.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
Introduction for Families. Seesaw gives your child a place to document their learning, be creative and learn how to use technology. Seesaw is a new way.
1. On your smartphone or tablet, visit the Apple App Store or the Google Play Store. Search for: In Case of Crisis Education OR, with the QR code reader.
Android Security Extensions. Android Security Model Main objective is simplicity Users should not be bothered Does the user care? Most do not care…until.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
IPSOS / Vodafone / Novartis Kenya 17 December 2014.
Latest Technology News and Updates |Information Technology updates | Android Blog | SSO
 Android OS: Java  iOS: Objective C NSArray * foo = [[NSArray alloc]
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Adding Trojans to Apps Slides and projects at samsclass.info.
Goodbye SEO, hello ASO App Store Optimization(ASO) ASO is SEO for mobile apps.ASO is the first step to succeed in mobile app marketing.It is the process.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Foodbank App Now available for your Sheffield S6 Foodbank.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery (SCAD) Gareth Ayres (Speaker) Stefan.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Android and IOS Permissions Why are they here and what do they want from me?
Salvus App Solutions Our branding strategy is to maintain long-term relationship with our clientele so as to achieve our specific goals and satisfy them.
How to Use an Android Tablet Well Come To You few Steps For How to Use an Android Tablet?
By : Appsverge Appsverge. MegaBox HD App can be an awesome application that's specially designed for android users who desire to watch movies and TV shows.
IDS Intrusion Detection Systems
Downloading and Installing
Welcome © GTM Software. Welcome © GTM Software.
Understanding Android Security
Secure Software Confidentiality Integrity Data Security Authentication
AUDACIOUS: USER DRIVEN ACCESS CONTROL WITH UNMODIFIED OPERATING SYSTEM
APK Downloader
MOA Delta Mobile OA Installation Guide 2015/12/16.
5.0 : Windows Operating System
Binder Attack Surface in Android
Enrolling Two-Factor Authentication (2FA)
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
How To Install Norton Security on Android Phone
Mohammed Alhusein.
MOA Delta Mobile OA Installation Guide 2015/12/16.
How to Install Norton Antivirus on Android Phone? We are providing easy steps to install Norton antivirus on android phone. If you facing any technical issue related to installing then you should contact via support. Get more details to visit our website
Mobile Pen Testing w/ drozer
TDW-11: 24-28th April 2017, Noumea, New Caledonia
Information Security Awareness
The Effects of Jailbreaking on iPhone Security
Understanding Android Security
Revision PowerPoint By Nicole Davidson.
Download the My Learning App
Presentation transcript:

SAFETYCHECK Eric Hatch | David Allen |Bailee Lucas| Austin Rhodes

SECURITY PROBLEM New vulnerabilities are discovered everyday in tools used by Android Apps. Users don’t know about or understand latest vulnerabilities.

SECURITY PROBLEM Google play store doesn’t check for known vulnerabilities in source code.

SECURITY PROBLEM Users are left to trust developers that their apps are safe. Often developers are unaware of vulnerabilities in there app.

POSSIBLE ATTACKS

SOLUTION Two parts: SafetyCheck PlayDrone

PLAYDRONE -Scans source code of apps on the Google play store. -Detects vulnerabilities. -Stores results in database.

SAFETYCHECK End User Android App. SafetyCheck will warn users of apps that contain vulnerabilities. Uses data collected via PlayDrone

IMPACT OF SOLUTION Users are better informed about apps on their phone. Users can now make a more educated decision about what apps to install.

IMPACT OF SOLUTION CONT. Increase motivation for developers to produce patches

CHALLENGES 1.Obtaining PlayDrone technology 2.Finding a way to coexist with Google’s Play Store restrictions 3.Keeping the database updated for: App updates New vulnerabilities

RECAP 1.Non-malicious apps can unintentionally contain security vulnerabilities 2.There exists a technology, PlayDrone, to scan for these vulnerabilities 3.Our solution informs end-users of these potential vulnerabilities

THANK YOU Q&A