Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26, 2010 1.

Slides:



Advertisements
Similar presentations
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Advertisements

Mobile Devices and Support Kathy Boock Diane Jachimowicz.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
Mobile Protection Overview
Mobile Application Development Keshav Bahadoor. Part 1 Cross Platform Web Applications.
Portable Device Operating Systems. Portable Device OS Portable devices use scaled down operating systems, which are smaller than those found in notebook.
Corporate File Sharing Solution CORPORATE DROP-BOX.
MOOC on M4D 2013 I NTRODUCTION TO THE A NDROID P LATFORM Ashish Agrawal Indian Institute of Technology Kanpur.
 یعنی چی؟  تاریخچه  مقایسه  مزایا  معایب.  1979–1992 Mobile phones use embedded systems to control operation.  Martin Cooper.
Objectives Overview Define an operating system
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
KoolSpan Comparison to CellCrypt
Security Issues and Challenges in Cloud Computing
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Management lifecycle summary Mobile Device Management with Windows Intune or 3 rd Party tools Simplified and flexible device enrollment, using.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Steve Lamb - QAD QAD Enterprise Applications and Mobile Devices.
1 Integrating ISA Server and Exchange Server. 2 How works.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
Exchange Exchange Connecter with Configuration Manager Configuration Manager with Intune Protect and Manage Devices and Infrastructure.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Company Confidential © 2008 Nokia V1-Filename.ppt / YYYY-MM-DD / Initials 1 Mobile emulator technology: S60 Platform Software Development Kit for Symbian.
HTML5 Application Development Fundamentals
Explain the purpose of an operating system
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Mobile Platforms. Competitive Landscape Operating Systems iPhone BlackBerry Windows Mobile Android Symbian.
What is Android……? Android is an Operating System (OS) created by Google to run on any small electronic devices such as cell phones, e- books, Media Internet.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
Chapter 2 Securing Network Server and User Workstations.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS First look at the Mobile Framework Ivan Deloose,
Wireless and Mobile Security
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
Riva – Sync GoldMine to Exchange and Office 365 Server-side sync | No plug-ins required Neil Graham Riva Specialist Riva CRM Integration ext.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Kaspersky Small Office Security INTRODUCING New for 2014!
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Introduction to Mobile Computing
11/12/ :06 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
REDCap Mobile Application
Smartphone Security Evaluation
File Management in the Cloud
Two-factor authentication
Call to Fix QuickBooks Error
CA16R405 - Mobile Application Development (Theory)
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Different Types of Apps. App Development ● App Development refers to the creation of computer applications for use on mobile devices such as tablets,
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Chapter 4.
MICROSOFT AZURE ISV PROFILE: ONEBE
Securing Windows 7 Lesson 10.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26,

Nokia Research Center Many Development Platforms 2 Worldwide Smartphone Sales to End Users by Operating System in 2Q10 Coming soon… Windows Phone 7 MeeGo (Maemo + Moblin) BlackBerry Tablet OS

Nokia Research Center A Few Usable Security Topics in Smartphones Better application permissions models Using smartphones for authentication Better models for website authentication Phone-friendly CAPTCHAs Lost or stolen devices / data backup and restoration 3

Nokia Research Center Application Permissions: Threat Model Company Confidential 4 PC Many users share the same machine Protect users from one another Implement access control on users’ data Smartphone One user, one device Users may install malicious applications Protect processes from one another Implement access control on resources Protect business model

Nokia Research Center Application Permissions: Symbian Company Confidential 5 Symbian signed Application has passed certain tests and is signed against a certificate Signed installation package contains a list of the application’s capabilities Company Confidential 5

Nokia Research Center Application Permissions: Symbian Self-signed Has no capabilities User can grant capabilities Blanket Installation time One-shot When the requiring action takes place

Nokia Research Center Application Permissions: BlackBerry Resource grant during installation and first start Configurable through menu May also be configured by administrator through BlackBerry Enterprise Server Application installation Application permissions Data that application can access Company Confidential 7

Nokia Research Center Application Permissions: iPhone Codesigning used for certifying applications that pass app store requirements All apps need to be signed by Apple's private key(s) to run on (non-jailbroken) iPhone Password demonstrates user’s intent to install No options or requests for resource access Company Confidential 8

Nokia Research Center Application Permissions: Android Applications are self-signed Used for continuity (package updates) and integrity Android’s blanket grant during installation 112 Google-defined permissions Developers can define their own permissions to expose APIs to other applications Company Confidential 9 Content from David Barrera

Nokia Research Center Using Smartphones for Authentication 10 [ Coming up next! ]

Nokia Research Center Better Model for Authenticating Websites 11

Nokia Research Center Better CAPTCHAs? 12 Alex Smolen, Becky Hurwitz, Dhawal Mujumdar, UC Berkeley i213 Spring 2010 Project

Nokia Research Center Lost or Stolen Devices / Data Backup and Restoration When your phone is your primary device, what happens when you lose it? Company Confidential 13

Nokia Research Center Summary: A Few Usable Security Topics Better application permissions models Using smartphones for authentication Better models for website authentication Phone-friendly CAPTCHAs Lost or stolen devices / data backup and restoration 14

Nokia Research Center Thank You 15