William Enck, Machigar Ongtang, and Patrick McDaniel.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.
Win the Cyberwar on Mobile Banking and Payments
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Dissecting Android Malware : Characterization and Evolution
Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel Department of Computer Science and Engineering The Pennsylvania State University ACSCA.
Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
Android Security. N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Threats To A Computer Network
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Mobile Malware in the Wild Acknowledgement: Hiromu Enoki.
Android Security What is out there? Waqar Aziz. Android Market Share - I 2.
Chapter Nine Maintaining a Computer Part III: Malware.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Threats to I.T Internet security By Cameron Mundy.
Presentation By Deepak Katta
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Introduction to Mobile Malware
Introduction Our Topic: Mobile Security Why is mobile security important?
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
THREATS TO MOBILE NETWORK SECURITY
Lightweight Mobile Applications Certification: Prepared By: Rahul Biswas.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Leave Me Alone: App- level Protection Against Runtime Information Gathering on Android NAN ZHANG, KAN YUAN, MUHAMMAD NAVEED†, XIAOYONG ZHOU AND XIAOFENG.
Mobile Application Security on Android Originally presented by Jesse Burns at Black Hat
Safety and Security issues of using ICT Alys brooks.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Malicious Software.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
CISC Machine Learning for Solving Systems Problems Presented by: Suparna Manjunath Dept of Computer & Information Sciences University of Delaware.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
VMM Based Rootkit Detection on Android
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
Android and IOS Permissions Why are they here and what do they want from me?
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
ANDROID ACCESS CONTROL Presented by: Justin Williams Masters of Computer Science Candidate.
Joshua Garcia Institute for Software Research
Android App Permission Manager
Understanding Android Security
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Lecture 8. Cyber Security, Ethics and Trust
How To Install Norton Security on Android Phone
The Internet of Unsecure Things
Chapter 27 Security Engineering
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
WELCOME TO MY AVG ANTIVIRUS AVG is antivirus software that is known in the market from a long time period this particular antivirus software is known for.
Presentation transcript:

William Enck, Machigar Ongtang, and Patrick McDaniel

Mobile Phone Threats  Cabir Used on Symbian platform Did not exploit code Repeatedly request file transfer via Bluetooth  Other viruses more malicous

Threat Down  Proof of Concept No damage done Proves that attack vector exists  Destructive Delete data Mostly harmless  Spyware Bugging the phone via software

Threat Down II  Direct payoff Calling premium services Directly generate revenue for attacker  Information Scavengers Steal user data like contacts  Ad-ware  Botnet Voice spam

Why Kirin?  Android defines sets of permissions  Permissions are static  Certain combinations can be used maliciously

Security requirements engineering  Three basic concepts Assets Functional Requirements Security Requirements

Assets  Extracted from Android platform Permissions Intents Components  Example: Microphone Input, call activity

Functional Requirements  Descriptions of how Assets interact with rest of the system  Example: Redirecting international calls to calling card number Recording audio using MediaRecorder API

Determine Assets Security Goals and Threats  Consider things such as confidentiality, integrity, and availability.  How can functional requirements be abused Threat descriptions

Develop Asset’s Security Requirements  Define what combination of permissions might be harmful  Example: Receive phone state Record audio Access the Internet

Determine Security Mechanisms  Limited by PackageInstaller  Permissions only set at install time  Can’t set policies not defined in by Android Monitoring how many SMS messages sent during a set time period

Kirin Rules  Dangerous combination of permissions GPS + Internet + Start On Boot Install Shortcut + Uninstall Shortcut Debug

Kirin Rule Syntax  KSL – Kirin Security Language

Kirin Security Service  Three components Service and ContentProvider that is a database of rules Patches to the PackageInstaller application Activity to manage the rules

Evaluation  Assumed apps in market do not contain malware  Investigate further apps not passing security rules  Downloaded top 20 apps from each of the 16 categories, 311 total

Empirical Results  12 failed to pass  3 failed Rule 2 Phone State + Record Audio + Internet  9 failed Rules 4 and 5 Access {fine, coarse} location + Internet + Receive Boot Complete

Mitigating Malware  Only protects against complex attacks  Useful in stopping some attacks like SMS spam or information gathering  No runtime logic Limitation of Android, not Kirin