Security of Mobile Operating Systems

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Security for Mobile Devices
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Vivek-Vijayan University of Tennessee at Chattanooga.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Presentation By Deepak Katta
Introduction Our Topic: Mobile Security Why is mobile security important?
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
IT Security for Users By Matthew Moody.
Computer and Information Sciences
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Wireless and Mobile Security
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
CSCE 201 Identification and Authentication Fall 2015.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Mobile Device Security Threats Christina Blakley Host Computer Security.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computer Security Keeping you and your computer safe in the digital world.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
Module 51 (Mobile Device Fundamentals - Android)
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Chapter 40 Internet Security.
iPhones and iPads and iTunes, Oh My!
DATA SECURITY FOR MEDICAL RESEARCH
Common Methods Used to Commit Computer Crimes
Android System Security
Outline What does the OS protect? Authentication for operating systems
Symantec Code Signing Certificate
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Outline What does the OS protect? Authentication for operating systems
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ETS Inside Product Launch
Computer Literacy Unit 2
© EIT, Author Gay Robertson, 2017
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
The security and vulnerabilities of IoT devices
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Cloud Storage Services
Get Office 2016 with Office 365 and get down to business
Swipe to Donate Life.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
How to keep the bad guys out and your data safe
Understanding Android Security
Erica Burch Jesse Forrest
Information Security.
Security in mobile technologies
Vulnerability in an Android App I Found last November - Attack and Countermeasure - Ken Okuyama Sony Digital Network Applications.
Chapter 10. Mobile Device Security
Presentation transcript:

Security of Mobile Operating Systems Muneeb Alvi

Windows Phone RIP: 2010-2015/2017

end of slide show. click to exit…

Android and iOS

Android 2 Billion Monthly Active Android devices 82 billion (yes billion with a b) app downloads in just 2016 65 billion in 2015 (significant increase) On phones, tablets, TVs, smart watches, cameras, … Most popular smartphone OS sources: https://www.theverge.com/2017/5/17/15654454/android-reaches-2-billion-monthly-active-users https://en.wikipedia.org/wiki/Usage_share_of_operating_systems

iOS 1.2 billion iPhones sold App Store as 2 million apps 130 billion downloads (yes with a b again) 50 billion dollars paid to app developers from successful apps On tablets, phones, tvs (shares similar apps and ecosytems with tvOS) sources: techcrunch, https://www.forbes.com/sites/niallmccarthy/2017/06/29/apple-has-sold-1-2-billion- iphones-over-the-past-10-years-infographic/#27f3d1ab42f8

Problems Lots of apps, lots of security concerns Devices are very personal Hold lots of personal data (pictures, contacts, etc…) Can get lost (should still be secure)

Solutions Application Provenance Inspecting apps Updating OS to handle new vulnerabilities

iOS Provenance Provenance: determining ownership or assigning some responsibility/origin One way to distribute apps (Apple App Store) Developer must register with Apple (Requires identity of developer) Licensing agreement App must be tested for privacy and security violations (could take days to weeks) If everything passes, app is signed digitally Digital signature Certificate from Apple linked to the developer Embedded directly into the app before being published Responsibility on developer, deters hackers from attacking published apps (must break digital seal)

Not Perfect Apple doesn’t reveal automated process for checking app How good is it? We don’t know Some bad apps do make it 2009. All apps from Storm8 removed. Were trying to collect personal information.

Android Provenance Digitally signed apps (like iOS) However, does not require developers to register with Google and have Google signed certificates Developers can create as many personal certificates without being monitored by Google $25 fee to distribute from Google’s Play Store Can install apps from APKs without using Google’s Play Store Can be downloaded from any website without monitoring from Google Now hackers can attack website to distribute malicious apps Hackers can create fake digital certificate and put fake company name in certificate (M!CRO$OFT) -> (Microsoft)

Android Provenance (Cont) Hackers can modify trustworthy apps, create fake certificate, distribute elsewhere (Trojan horse) Tradeoff More usability for less security More customizable User should know most of the risks. Responsibility shifts from supplier to user.

App on the Phone Provenance: First stage. Tries to prevent bad apps from being available Permissions: Second Stage. Prevent bad apps from affecting device if app has been installed

iOS Permissions Permissions: What the app can and cannot do/access Apple decides which limited set of permissions App can have (closed system, walled garden) User not told/asked about app permissions unless it is absolutely necessary or related to privacy Accessing location, camera, making a phone call, etc… App must ask every time if it can access those personal features

Android Permissions User is told what permissions the app will have once it is installed Once app has permissions, it does not need to ask user again until deleted Responsibility moved to user once again Developer just has to convince users to download apps Some apps don’t install until users give full permissions Outcome depends on how aware the user is 100 built in permissions CAMERA, INTERNET With the right permissions, a hacker can do wrong things Data Loss Attacks, obtaining user’s phone number

Isolation Each app is protected from other apps

iOS Isolation Each app protected from one another (Sandboxing) Sometimes don’t even know other apps are installed on the device No app can escalate privilege level or affect the kernel Malware attacks can be minimal and only affect app data and some other minor data Apps have access to some system information, can gain other valuable information if app is malicious (email, devices unique ID)

Android Isolation Similar to iOS (Sandboxing) Cannot access kernel or other apps A malicious app cannot affect/hack other apps Using some permissions App can get list of other apps App can launch other apps (such as Maps)

Encryption Solution for if device is stolen Process of transforming data into being unusable unless it is transformed back using a key (typically a long number) Encrypt data on device and data being sent/received by device Passwords (what if they are stored insecurely on otherwise encrypted device) Fingerprints (easy to use and you always have it with you, not difficult to create false fingerprint)

iOS Encryption Use of hardware and software Hardware AES (Advanced Encryption Standard) Encrypt all data stored on device flash memory (Device Unique ID: UID) Each device has unique UID AES keys used to encrypt file system metadata, files, etc… If memory chips are moved to another device, they can’t be decrypted without UID GID (Device Group ID key) Same across all processors in device Used for installing new system software (verify iOS updates)

iOS Encryption Data Protection Operating System (Software) provided level protection All files encrypted with unique File Key Protects data across communication with other devices and internet Prevents decrypting important data while device is locked Rapid Remote wipe Wipe a single encryption key, all data is useless

Doesn’t always work Background applications can access system storage iOS always keeps necessary decryption keys for background apps that need them Malicious app can try to gain access to key and then have access to other sensitive information. Passwords: can be guessed by experienced hacker within 20 minutes Using jailbreak tool (requires physical access)

Android Encryption File System based encryption All user data is encrypted in the kernel (requires user to set password) Uses part of password to perform encryption Encryption has to be explicitly asked by the user (depends on settings of OS) KeyChain Used to securely store user passwords/certificates from installed apps Backed by hardware support Depends on user and applications that decide whether it is used Application should not store a password itself (especially if it is not encrypted)

Closing points Security should be considered from the moment an app wants to be hosted on an app store, website, server, etc… Both iOS and Android offer many security systems Difference is who decides when these systems should be activated iOS puts most of the responsibility on Apple Android puts most of the responsibility on user Even with all the systems in place, clever hackers can still get through

References Android vs iOS Security: A Comparative Study Authors: Ibtisam Mohamed, Dhiren Patel An Analysis of Vulnerabilities Presented by Android Malware and iOS jailbreaks Author: Charles Jones