Android Security What is out there? Waqar Aziz. Android Market Share - I 2.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Kadra Alvaro April,2010. Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future.
Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Vivek-Vijayan University of Tennessee at Chattanooga.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Apple iPhone I-224 March 21, 2007 I-224 March 21, 2007.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Presentation By Deepak Katta
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Chapter 10: Authentication Guide to Computer Network Security.
eScan Total Security Suite with Cloud Security
Sophos Mobile Security
Introduction Our Topic: Mobile Security Why is mobile security important?
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
박 종 혁 컴퓨터 보안 및 운영체제 연구실 Workshop on Mobile Security Technologies (MoST)
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
ASP.NET 2.0 Chapter 5 Advanced Web Controls. ASP.NET 2.0, Third Edition2 Objectives.
Phones and fieldTask. Session Objective Be familiar with: – selecting smart phones for a survey, – configuring them – and using them – fieldTask (c) Smap.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Specialist communication channel. Sarah-Jane king.
Android Boot Camp for Developers Using Java, 3E
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Android Security Auditing Slides and projects at samsclass.info.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)
VirtuCo :: Authentication and Billing ::. VirtuCo v©v© Authentication schemes –Public key –Username and password –Combination –Additional possibilities.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Wireless and Mobile Security
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Mobile Banking Dangers Denise Butler Rick Hebert & Associates
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
AccessData User Summit 2016 April 5 th – 7 th, 2016 Lake Mary, FL iOS 9 and Android 6.
Analysis And Research Of System Security Based On.
By Collin Donaldson.   In conventional OS architectures, the user accesses the OS via an account that has certain privileges (admin, guest). They can.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Android and IOS Permissions Why are they here and what do they want from me?
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
By Hello Team Awesome World™.  To avoid strangers using others’ keys, cards, and passwords to enter the buildings, our team will develop a face recognition-based.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Facebook privacy policy
Managing Windows Security
Information Security.
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Securing Windows 7 Lesson 10.
Understanding Android Security
Digital Literacy 1.00 Computer Basics
Presentation transcript:

Android Security What is out there? Waqar Aziz

Android Market Share - I 2

Android Market Share - II 3

Android Market Share - III 4

Android App Market Security Model No formal application screening process. Any developer can upload an application. Android Market relies on community to identify and flag: Malfunctioning applications Malicious applications Inherently, early adopters suffer if the application is malicious. Note: Unlike iPhone, Android application can be directly downloaded and installed from a third party as well. 5

Phishing App Example Bank Phishing application: Advertised to do banking activities from phone. User to give account information and credentials for the app to facilitate banking activities. In reality the app did only the following: Open the banking website in phone’s browser. That’s it!! A number of users were scammed before the application was taken out from Android Market. 6

Android Market Statistics About 20% of 48,000 apps in Android Marketplace allow a third-party application access to sensitive or private information. 5% apps can place calls to any number without user interaction. 2% apps can send text messages without user interaction. 29 apps require the exact same permissions as applications that are known to be spyware. 383 apps have the ability to read and use the authentication credentials from another app or service. 7

Android Security Apps - I Both apps are developed by Pittsburgh based security researcher and hacker who goes by Moxie Marlinspike. RedPhone Uses ZRTP, Internet voice cryptography scheme. It uses two users’ keys to create a passphrase, which is later displayed at both ends for users to verify. SecureText Encrypted text messages. Both apps generate a new key for every communication session. 8

Android Security Apps – II OI Safe It saves password and other private data with AES encryption. No information is kept online. It works with OI Notepad to encrypt notes, and with Obscura to encrypt pictures. Other apps for content encryption: B-folder + sync Secrets-for-android 9

Android Manifest - I Android Manifest does the following: Declares application’s components Identifies any permissions that the application expects to be granted: Access the Internet, read phone contacts, access sensors, etc. Thus, what an application can and cannot do is constrained by the total set of permissions that can be granted in a Manifest file. Currently, almost all user content and private data can be accessed from phone’s internal phone and SD card. However, no permission can be granted to do anything on system level except for accessing some small number of settings. 10

Android Manifest - II 11

Anti-malware Apps - I Smobile Security Shield It does permission-based malware detection. Scans manifest files of apps installed on phone, and flags them based on suspicious manifest permissions. Maintains a database of manifest files of all apps on Android Market & other 3 rd party sources. Scans application signatures. Maintains a database of application signatures. 12

Anti-malware Apps - II WaveSecure Remotely wipes out all user data. Tracks and locates the phone. Lock the phone as soon as SIM change is detected. Protection again application uninstallation. Backs up and restores private data – SMS, contacts, etc. Other similar apps Mobile Defense 13

What you see is what they get - I “Google’s Android OS grants access to sensors such as cameras and audio inputs only if their use is disclosed at installation time. At installation time, a user may not understand an application well enough to determine why it would need sensor data or guage its trustworthiness…” “…iPhone instead uses standardized OS interface to prompt the user user to approve access…” 14

What you see is what they get - II Sensor-access widget: When an application requests access to a sensor, runtime environment overlays a GUI widget on a portion of the screen, such as status bar, to notify user of a sensor access. 15

What you see is what they get - III SWAAID (Show Widget and Allow After Input & Delay): Turn sensors from passive into active input devices. User intervention is required before sensor access. User can also enable access without any intervention for a while. Then the waiting period (or delay) is intended to give the user sufficient time to notice and respond to the sensor access. _ 16

I am allowing what? A paper on Application Authority Disclosure by Microsoft Research “…the great majority of participants preferred designs that used images or icons to represent resources. This great majority also disliked designs that used paragraphs, the central design element of Facebook’s disclosures, and outlines, the central design element of Android’s disclosures.” 17

Rooting Android Rooting Android: Gaining root access to Android operating system. It can be deemed as similar to iPhone jailbreaking. Why root Android? To gain full control over the system. Modify system files: themes, core apps, boot images, linux binaries, etc. Run applications that require system level access … 18

Other Findings… Not a single application currently does user authentication using accelerometer. No application attempts to do anything on a system level, such as access network packets. Two main reasons for the above findings: Android Manifest does not permit anything on system level, such as, replacement of factory default user authentication mechanism or access to other applications’ traffic. An application written for rooted Android will not work on non-rooted Android phones. Apps for rooted Android: Internet tethering, ad-hoc network, … 19

Questions? 20

Sources 1. tml 2. monitor/download.php?id= wiretap-proof-cell-phone-calls/