17/11/99S3 and MExE1 S3 review of MExE release 99 security Tim Wright, Vodafone UK 3GPP SA3, ETSI SMG10

Slides:



Advertisements
Similar presentations
INFN CA1 active since July manager: –Roberto Cecchini types of certificates released: –personal –server –object signing.
Advertisements

CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Chapter 14 – Authentication Applications
Education applications and the FAST project. Jonathan Gay Co-ordinator for Sheffield.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
SMG10 report to SMG#30 Tdoc SMG P
Child-friendly Terms of Use: Empowering children through social media Veronica Donoso 2 December, ICT coalition forum, Brussels.
MExE - SMG4/3GPP T2 SWG1 - April Mobile Station Application Execution Environment (MExE) Java and WAP ETSI/SMG4 and 3GPP.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
PKI Implementation in the Real World
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Trojan Horse Program Presented by : Lori Agrawal.
Mark Cataldo / Louis Finkelstein 1 st March, 2001 Slide 1 MExE +44 (0)
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Trusted Path Client- server applications Using COTS components Tommy Kristiansen
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
By: Nicole and Marco.  What Is Mobile Computing?  Devices & Operating Systems  Mobile Phones  Facebook & Microsoft  Process Before/Without MC  Process.
APACHE SERVER By Innovationframes.com »
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Java Security. Topics Intro to the Java Sandbox Language Level Security Run Time Security Evolution of Security Sandbox Models The Security Manager.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Byron Alleman Will Galloway Jesse McCall. Permission Based Security Model Users can only use features for which their permissions grant them access Abstracts.
Masud Hasan Secue VS Hushmail Project 2.
PKI interoperability and policy in the wireless world.
Network Resource Gateway (NRG) Application DevelopmentDSLD Unit Florin van Slingerland Rev A Slide 1 Application Development Presentation/Course Teaser.
Issues in Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
Android Husam Abdel Rahman. Introduction Android Operating system is most popular operating system these days with the advance in voice communications.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
Week I Security and Mobile Devices. Overview Purpose of Security Application to Mobile Devices Threats to Mobile Devices Security and the Blackberry Threats.
Security Vulnerabilities in A Virtual Environment
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Design Principles and Common Security Related Programming Problems
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Device Guard and AppLocker Better Together Troy L. Martin 1E.com/blogs/author/troymartin/ Technical Architect 1E.
Key management issues in PGP
Timeline – Standards & Requirements
Topic: Java Security Models
Timeline - ATIS Involvement
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Nessus Vulnerability Scanning
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
The Effects of Jailbreaking on iPhone Security
Advanced Tips and Tricks
Presentation transcript:

17/11/99S3 and MExE1 S3 review of MExE release 99 security Tim Wright, Vodafone UK 3GPP SA3, ETSI SMG10

17/11/99S3 and MExE2 Contents MExE refresher course Specification history and S3/SMG10 involvement Break for clarification Issues raised by Colin Blanchard and self Questions and discussions

17/11/99S3 and MExE3 MExE refresher course Mobile Execution Environment A spec to create a standardised execution environment on mobile terminals, similar to PDA, such as Palm, Psion Classmark 1 is WAP Classmark 2 is Java, specifically the PersonalJava virtual machine

17/11/99S3 and MExE4 Execution domains Operator, manufacturer and third party execution domains Applications can only execute in a domain if authorised for that domain Broadly similar capabilities for each domain Untrusted domain

17/11/99S3 and MExE5 Domain authorisation Apps that can run in a domain must have a a digitally signature that can be verified by the terminal using valid certificates Certificates are verified with root public keys for each domain Operator and third party root keys can be on the SIM Untrusted apps are unsigned

17/11/99S3 and MExE6 Third party Administrator Third party roots may be installed by manufacturer and user (and operator) Operator may have no control over signing policy of a third party root controller Therefore, Operator may (but is not obliged to) elect to be Administrator and can then control which Third Party roots are valid (but cannot delete or revoke)

17/11/99S3 and MExE7 User permission Apps cannot be installed without user permission Apps cannot carry out functions without user permission Three types of user permission –Single action –Session –Blanket

17/11/99S3 and MExE8 Specification history MExE begun within ETSI in January 1998 Stage 1 approved in February (March?) 1998 Release 98 stage 1 and 2 approved in July 1999 Release 99 to be approved in December 1999

17/11/99S3 and MExE9 S3/SMG10 involvement Some review of specs since February Little real interaction until December 1998 Productive MExE/SMG10 meeting in February 1999 S3 took responsibility for MExE security in August 1999

17/11/99S3 and MExE10 Goal of this session MExE (and) WAP are powerful developments with enormous potential to change the way phones are used Security is a key issue MExE has worked hard on security and deserve credit Time, and last chance, for S3 to take corporate responsibility

17/11/99S3 and MExE11 Clarifications

17/11/99S3 and MExE12 Issues raised by CB Application could be downloaded that would: –Eavesdrop on user –Perform internal denial of service –Make bogus calls and so complicate law enforcement

17/11/99S3 and MExE13 Issues raised by CB User would have to give permission for installation Process of giving permission by user must be clear - can this be ensured? Above apps would have to be trusted Issue of whether third parties can be trusted

17/11/99S3 and MExE14 VF issues - Security table Security table is currently very complex List actions that can be performed by each domain and that are forbidden for each domain Status of actions not listed uncertain Suggest - security table lists forbidden actions only Would be clearer and more likely to be implemented

17/11/99S3 and MExE15 VF issues - external port access Difficult to manage permissions if don’t know what is attached to the port for example, location info in phone is forbidden to an app but it can be accessed via port if GPS attached to phone Have to rely on user/ Warnings should be given

17/11/99S3 and MExE16 VF issues - untrusted applications Can acess screen and keyboard without user permission Apps are long lived - Trojan horses App could listen to keyboard and pick up PINs Could interfere with UI and get user to perform actions they did not want

17/11/99S3 and MExE17 VF issues - untrusted applications But untrusted apps could be a popular market sector What can be done? Rules for precedence in screen access Session user permission? ?