Mobile Device Security - Reading Material Adam C. Champion and Dong Xuan CSE 4471: Information Security Based on materials from Tom Eston (SecureState),

Slides:



Advertisements
Similar presentations
Kadra Alvaro April,2010. Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future.
Advertisements

Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
What is Android?.
Android architecture overview
Introduction to Android Mohammad A. Gowayyed CS334-Spring 2014.
Android Platform Overview (1)
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
Vivek-Vijayan University of Tennessee at Chattanooga.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
DEPARTMENT OF COMPUTER ENGINEERING
Mobile Application Development
Android An open handset alliance project Janice Garcia September 18, 2008 MIS 304.
Mobile Device Security
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department.
Introduction to Android Platform Overview
Android Security What is out there? Waqar Aziz. Android Market Share - I 2.
IOS & Android Security, Hacking and Tweaking Workshop D.Papamartzivanos University Of the Aegean – Info Sec Lab Android Security – Cydia Substrate Dimitris.
Emerging Platform#4: Android Bina Ramamurthy.  Android is an Operating system.  Android is an emerging platform for mobile devices.  Initially developed.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Android Introduction Platform Overview.
Introduction to Mobile Malware
Mobile Application Development with ANDROID. Agenda Mobile Application Development (MAD) Intro to Android platform Platform architecture Application building.
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
Android Introduction Based on slides made by
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Presented By: Steven Zittrower William Enck ( Penn St) (Duke)
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion,
Authors: William Enck The Pennsylvania State University Peter Gilbert Duke University Byung-Gon Chun Intel Labs Landon P. Cox Duke University Jaeyeon Jung.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Copyright© Jeffrey Jongko, Ateneo de Manila University Android.
Computer and Information Sciences
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Mobile Device Security
ANDROID 응용 프로그래밍 과정 – 목차 - 안드로이드란 - 안드로이드가 만들어지게 된배경 - 안드로이드의 철학 - 안드로이드 환경설정 ( SDK download, eclipse plug-in 설정, 간단한 프로그램 실행 ) - 안드로이드 동작원리 - 안드로이드 핵심.
Android Husam Abdel Rahman. Introduction Android Operating system is most popular operating system these days with the advance in voice communications.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Android Security Auditing Slides and projects at samsclass.info.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)
Created By. Jainik B Patel Prashant A Goswami Gujarat Vidyapith Computer Department Ahmedabad.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Wireless and Mobile Security
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
1 Android Workshop Platform Overview. 2 What is Android?  Android is a software stack for mobile devices that includes an operating system, middleware.
Analysis And Research Of System Security Based On.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
By Adam Reimel. Outline Introduction Platform Architecture Future Conclusion.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
By: Chuqing He. Android Overview - Purchased by Google in First Android Phone was sold in Oct Linux-based - Holds 75% of the worldwide.
ANDROID OS Ravi Soni MTech (CS) III Sem. W HAT IS A NDROID ? Android is a software stack for mobile devices that includes an operating system, middleware.
Android. Android An Open Handset Alliance Project A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Module 51 (Mobile Device Fundamentals - Android)
Mobile Device Security
Mobile Hacking - Fundamentals
Visit for more Learning Resources
Android Developer Fundamentals V2
Android Introduction Platform Mihail L. Sichitiu.
Android Platform, Android App Basic Components
Presentation transcript:

Mobile Device Security - Reading Material Adam C. Champion and Dong Xuan CSE 4471: Information Security Based on materials from Tom Eston (SecureState), Apple, Android Open Source Project, and William Enck (NCSU)

Organization Quick Overview of Mobile Devices iOS/Android Threats and Attacks iOS/Android Security

Overview of Mobile Devices Mobile computers: –Mainly smartphones, tablets – Sensors: GPS, camera, accelerometer, etc. – Computation: powerful CPUs (≥ 1 GHz, multi-core) – Communication: cellular/4G, Wi-Fi, near field communication (NFC), etc. Many connect to cellular networks: billing system Cisco: 7 billion mobile devices will have been sold by 2012 [1] Organization

Quick Overview of Mobile Devices iOS/Android Threats and Attacks iOS/Android Security

iOS/Android Malware iOS malware: very little Juniper Networks: Major increase in Android malware from 2010 to 2011 [18] Android malware growth keeps increasing ($$$) Main categories: [19] – Trojans – Monitoring apps/spyware – Adware – Botnets We’ll look at notable malware examples

iOS Malware Malware, “fake apps” have hit iOS too – iKee, first iPhone virus, “rickrolled” jailbroken iDevices [25] – Example “fake/similar” apps: Temple Run: Temple Climb, Temple Rush, Cave Run Angry Birds: Angry Zombie Birds, Shoot Angry Birds Not to mention “walkthroughs,” “reference” apps, etc. Google Play banned such apps… – iOS, Android hit with “Find and Call” app SMS spammed contacts from central server Removed from App Store, Google Play

Android: DroidDream Malware Infected 58 apps on Android Market, March ,000 downloads in 4 days How it worked: – Rooted phone via Android Debug Bridge ( adb ) vulnerability – Sent premium-rate SMS messages at night ($$$) Google removed apps 4 days after release, banned 3 developers from Market More malware found since

Android: Fake Angry Birds Space Bot, Trojan Masquerades as game Roots Android 2.3 devices using “Gingerbreak” exploit Device joins botnet Source: [20]

Android: SMS Worm Students in previous information security classes wrote SMS worms, loggers on Android Worm spreads to all contacts via social engineering, sideloading, etc. Logger stored/forwarded all received SMS messages – Only needed SEND_SMS, RECEIVE_SMS, READ_SMS permissions – Can send 100 SMS messages/hour – One group put SMS logger on Google Play (removed it)

Android: Google Wallet Vulnerabilities (1) Google Wallet enables smartphone payments – Uses NFC technology – Many new mobile devices have NFC Some credit card info stored securely in secure element – Separate chip, SD card, SIM card Unfortunately, other data are not stored as securely

Android: Google Wallet Vulnerabilities (2) Some information can be recovered from databases on phone: [21] – Name on credit card – Expiration date – Recent transactions – etc. Google Analytics tracking can reveal customer behavior from non-SSL HTTP GET requests NFC alone does not guarantee security – Radio eavesdropping, data modification possible [22] – Relay attacks, spoofing possible with libnfc [23]

Android: Sophisticated NFC Hack Charlie Miller’s Black Hat 2012 presentation: Nokia, Android phones can be hijacked via NFC [24] – NFC/Android Beam on by default on Android 2.3+, Android 4.0+ – Place phone 3–4 cm away from NFC tag, other NFC- enabled phone – Attacker-controlled phone sends data to tag/device, can crash NFC daemon, Android OS – For Android 4.0–4.0.1, can remotely open device browser to attacker-controlled webpage

Organization Quick Overview of Mobile Devices iOS/Android Threats and Attacks iOS/Android Security

iOS System Architecture (1) Boot sequence: – Bootloader, kernel, extensions, baseband firmware all have cryptographic signatures – Root of trust: burnt into boot ROM at the factory – Each component’s signature is verified – If any signature doesn’t match, the “connect to iTunes” screen is shown Icons from Double-J Design, IconBlock

iOS System Architecture (2) Software updates – Cannot install older version of iOS on an iDevice; e.g., if device runs iOS 5.1.1, cannot install iOS 4 – Device cryptographically “measures” components, sends to Apple install server with nonce, device ID Nonce: value used only once Prevents attacker from “replaying” the value – Server checks measurements; if allowed, server adds device ID to measurements, signs everything

iOS Apps and App Store All iOS apps signed by Apple (not developer) Third-party apps signed only after: – Developer ID verification (individual, company) – Review: bugs, work correctly (program analysis) Each app sandboxed in its own directory – Cannot communicate with other apps – Apps need signed “entitlements” to access user data Further app protection: – Address Space Layout Randomization (ASLR) for all apps – ARM eXecute Never (XN) bit set for all memory pages

iOS Data Protection Measures Each iDevice has hardware-accelerated crypto operations (AES-256) Effaceable Storage: securely removes crypto keys from flash memory – “Erase all content and settings” wipes user data using Effaceable Storage (locally or remotely) – Interact with mobile device management (MDM), Exchange ActiveSync servers – Developers can use APIs for secure file, database storage Passcodes – Admins can require numeric, alphanumeric, etc. – Wipe device after 10 failed login attempts

iPhone Configuration Utility

Miscellaneous iOS Security Built-in support for SSLv3, TLS, VPNs Extensive administrative controls: – Password policies – Disable device features, e.g., camera – Disable Siri – Remote wipe Apps can access contacts without permission (fixed in iOS 6) Source: [8]

iOS Jailbreaking Circumvents Apple’s iOS security mechanisms – Violates iDevice’s terms of use – Allows installation of apps from alternative app stores, e.g., Cydia – Removes app sandbox – Usually replaces kernel with one accepting non-Apple signatures – Tools: redsn0w, Absinthe, etc. Legal in U.S. under DMCA 2010 exemption

Google Android Platform Android: Linux-based mobile handset platform Developed by Google, Open Handset Alliance for handset manufacturers – Includes T-Mobile, Sprint Nextel, Google, Intel, Samsung, etc. [29] – Free, open mobile handset platform for industry [30] Flagship: Google Nexus 4

Android Architecture

Android Features and Software Features – 3D: OpenGL ES 1.0 – SQLite: Database engine – WebKit: Web browser – Dalvik: Register-based VM similar to Java VM [32] – FreeType: Bitmap and vector font rendering – Connectivity: Bluetooth, , GPS Core Applications – , SMS, calendar, Google apps, browser, etc. – Written in Java App Framework – Full access to same framework APIs – Architecture designed for component reuse Runtime – Core C++ library – Multiple Dalvik VMs run in a process, rely on Linux kernel for process isolation [32]

Android Security (1) Android built on Linux kernel, which provides – User permissions model – Process isolation Each app is assigned unique user/group IDs, run as a separate process ⇒ app sandbox System partition mounted read-only Android 3.0+ enables filesystem encryption using Linux dmcrypt (AES-128) Device admins can require passwords with specific criteria, remote wipe devices, etc.

Android Security (2) Android device administration (3.0+): – Remote wipe – Require strong password – Full device encryption – Disable camera

Android Security (3) Other protection mechanisms: – Android 1.5+: stack buffer, integer overflow protection; double free, chunk consolidation attack prevention – Android 2.3+: format string protection, NX, null pointer dereference mitigation – Android 4.0+: ASLR implemented – Android 4.1+: ASLR strengthened, plug kernel leaks Capability-based permissions mechanism: – Many APIs are not invoked without permission, e.g., camera, GPS, wireless, etc. – Every app must declare the permissions it needs – Users need to allow these permissions when installing app

Android Security (4) All Android apps need to be signed: by the developer, not Google Google Play app store less regulated – Apps available rapidly after publishing – Bouncer service scans for malware in store [11] Google Play permissions interface

Android Device Diversity (1) Android runs on various devices – Different devices run different OS versions – Device manufacturers often add their own custom UIs, software – Mobile operators add their own software – Not all devices are updated to latest Android version! Security challenges… Android devices accessing Google Play, August Some devices are not always updated to the latest version. These devices tend to have security vulnerabilities targeted by attackers. Source: [12]

Android Device Diversity (2) Notice many Android devices are “orphaned” without major updates [13] Android developers need to secure their apps for many different devices…

Android Device Diversity (3) The OpenSignalMaps Android app sees almost 4,000 types of device clients. Source: [14]

Rooting Android Devices Android device owners can often get root access to their devices – Process can be as simple as unlocking bootloader – Sometimes, exploit bugs to get root – Result: install OS of choice, bypass device/operator restrictions – Legal under 2010 DMCA exemption Security problems: – Voids device warranty (usually) – Circumvents app sandbox: root can modify any app’s files – Malware can root and own your device!

References (1) 1.Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011– 2016”, 14 Feb. 2012, ns705/ns827/white_paper_c htmlhttp:// ns705/ns827/white_paper_c html 2.Samsung, “Exynos 5 Dual,” 2012, product/application/detail?productId=7668&iaId=2341http:// product/application/detail?productId=7668&iaId= Nielsen Co., “Two Thirds of All New Mobile Buyers Now Opting for Smartphones,” 12 Jul. 2012, now-opting-for-smartphones/ now-opting-for-smartphones/ 4.K. De Vere, “iOS leapfrogs Android with 410 million devices sold and 650,000 apps,” 24 Jul. 2012, million-devices-sold/ 410-million-devices-sold/ 5.K. Haslem, “Macworld Expo: Optimised OS X sits on ‘versatile’ Flash,” 12 Jan. 2007, Macworld, 6.Wikipedia, “iOS,” updated 2012, 7.Apple Inc., “iPhone Developer University Program,” Apple Inc, “iOS Security,” iOS_Security_May12.pdfhttp://images.apple.com/ipad/business/docs/ iOS_Security_May12.pdf 9.Android Open Source Project, “Android Security Overview,” security/index.htmlhttp://source.android.com/tech/ security/index.html Presentation organization inspired by T. Eston, “Android vs. iOS Security Showdown,” 2012,

References (2) 10.A. Rubin, 15 Feb. 2012, posts/Btey7rJBaLF 11.H. Lockheimer, “Android and Security,” 2 Feb. 2012, /02/android-and-security.htmlhttp://googlemobile.blogspot.com/ 2012/02/android-and-security.html 12.Android Open Source Project, 13.M. DeGusta, “Android Orphans: Visualizing a Sad History of Support,” 26 Oct. 2011, of-support of-support ` 16.Lookout, Inc., “Mobile Lost and Found,” 2012, reports/mobile-lost-and-found/ reports/mobile-lost-and-found/ 17.K. Haley, “Introducing the Smartphone Honey Stick Project,” 9 Mar. 2012, project project 18.Juniper Networks, Inc., “Global Research Shows Mobile Malware Accelerating,” 15 Feb. 2012, mobile-malware-accelerating-nyse-jnpr http://newsroom.juniper.net/press-releases/global-research-shows- mobile-malware-accelerating-nyse-jnpr

References (3) 19.F-Secure, “Mobile Threat Report Q2 2012,” 7 Aug. 2012, mobile-threat-report-q2-2012http:// mobile-threat-report-q ndroid-malware-angry-birds-space-game/ ndroid-malware-angry-birds-space-game/ 21.Via Forensics LLC, “Forensic Security Analysis of Google Wallet,” 12 Dec. 2011, Proxmark, 23.libnfc, 24.D. Goodin, “Android, Nokia smartphone security toppled by Near Field Communication hack,” 25 Jul. 2012, 25.B. Andersen, “Australian admits creating first iPhone virus,” 10 Nov. 2009, R. Radia, “Why you should always encrypt your smartphone,” 16 Jan. 2011, Heritage Foundation, “Solutions for America: Overcriminalization,” 17 Aug. 2010, Wikipedia, 29.C. Quentin,

References (4) 30.A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and A. M. Smith, “Smudge Attacks on Smartphone Touch Screens,” Proc. USENIX WOOT, X. Ni, Z. Yang, X. Bai, A. C. Champion, and Dong Xuan, “DiffUser: Differentiated User Access Control on Smartphones,” Proc. IEEE Int’l. Workshop on Wireless and Sensor Networks Security (WSNS), W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” Proc. USENIX OSDI, 2010, 33.W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” 34.B. Gu, X. Li, G. Li, A. C. Champion, Z. Chen, F. Qin, and D. Xuan, “D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources,” Technical Report, 2012.