LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Internet Protocol Security (IP Sec)
Mobile Devices in the DoD
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Dongyan Wang GlobalPlatform Technical Program Manager
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
FIT3105 Smart card based authentication and identity management Lecture 4.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
SECURITY IN MOBILE NETWORKS BY BHONGIRI ANAND RAJ VENKAT PAVAN RAVILISETTY NAGA MOHAN MADINENI.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Applied Cryptography for Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Web services security I
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Information Security for Managers (Master MIS)
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Chapter 4 Application Level Security in Cellular Networks.
Leveraging UICC with Open Mobile API for Secure Applications and Services.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
Key management issues in PGP
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Presentation transcript:

LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015

Motivation  Smartphones become the handheld computer and the personal assistant  Growing market has attracted hackers to make the potential for serious security threats on smartphones a reality  UICC serves as the security anchor in mobile networks  GSM Association: the UICC is the strategically best alternative as a secure element for mobile devices [Sma09]  Interface is required to fill the gap between UICC applets and mobile applications 2 9/3/2015

Solution Idea  SIMAlliance Open Mobile API: the communication channel  Dual Application Architecture: the basic architecture  An example: Smart OpenID 3 9/3/2015

Agenda  Motivation and Solution Idea  Basic Technologies  State of the Art  Smart OpenID  Implementation  Summary and Future Work 4 9/3/2015

Universal Integrated Circuit Card: UICC  The bearer of the subscriber’s identity in cellular networks  Secure element secure storage, cryptographic functions  Secure channel transmission between the UICC and the server with authenticity, integrity, confidentiality  Wireless PKI mobile network operator owns root certificate: becomes a certificate authority 5 9/3/2015

Open Mobile API Open Mobile API is established by SIMalliance as an open API between secure element and the mobile applications Crypto Authentication Secure Storage PKCS#15 … 6 Open Mobile API 9/3/2015

Open Mobile API 7 9/3/2015

Agenda  Motivation and Solution Idea  Basic Technologies  State of the Art  Smart OpenID  Implementation  Summary and Future Work 8 9/3/2015

State of the Art  Financial applications online-banking, contactless payment, tickets apps  Enterprise applications secure , ERP, Software as a Service  Content protection applications digital rights management, secure document  Authentication applications generic bootstrapping architecture, public key infrastructure 9 9/3/2015

State of the Art  Malware virus, Trojan horse, Spyware  Eavesdropping traffic (password) on the network  Man-in-the-middle attacker manipulates the transmitted data  Replay attacks a valid data is maliciously repeated or delayed  Phishing acquires data by masquerading as a trustworthy entity 10 9/3/2015

State of the Art  Private information is the main aim of the attacker, e.g., password, credit card number etc.  Anti-Malware, secure storage, digital certificate, transport layer security, authentication etc.  Some countermeasures are unusual on smartphone  Existed protocols are vulnerable to different attacks 11 9/3/2015

Agenda  Motivation and Solution Idea  Basic Technologies  State of the Art  Smart OpenID  Implementation  Summary and Future Work 12 9/3/2015

OpenID Provider Relying Party User Device Relying Parties Submit OpenID Association session: a shared symmetric key + association handle User authentication Authentication response: signed with the shared key OpenID 13

Threats to OpenID  Malware virus, Trojan horse, Spyware  Eavesdropping password on the network  Man-in-the-middle attacker captures the transmitted password, authentication assertion, optionally alters it  Replay attacks a valid authentication assertion is maliciously repeated  Phishing acquire password by masquerading as an OP 14 9/3/2015

Smart OpenID: Concept  Authentication factor  something the user knows: password  something the user has: smart card  something the user is: finger print  Using UICC as credential  shares a long-term secret (LTS) with the server  derives a key from the LTS and an one-time password  PIN verification to activate the function 15 9/3/2015

Network OpenID Provider Relying Party User Local OP Provider = Mobile Application + UICC Applet Relying Parties Association Signed assertion (with same derivated key) Smart OpenID Trust (long-term secret) Local authentication (with PIN) Association handle + derived key (symmetric) Submit OpenID Association Handle 16

Smart OpenID  Long-term secret: 64 bytes  Association handle: less than 255 bytes  Key derivation functions: PBKDF2  use HMAC-SHA-1/HMAC-SHA-256 (hash-based message authentication code) as underlying algorithm  configurable iteration count and derived key length 17

Security Analysis 18

Security Analysis : Phishing 19 Derived Key S = PBKDF2-HMAC-SHA-1(LTS, AH, 64, 64)

Agenda  Motivation and Solution Idea  Basic Technologies  State of the Art  Smart OpenID  Implementation  Summary and Future Work 20 9/3/2015

Implementation  Platform Android Java Card UICC  Algorithms key derivation function: PBKDF2-HMAC-SHA-1 signature: HMAC-SHA /3/2015

Demo 9/3/

Performance Iteration : 64 rounds AH: 240 bytes Derived key length: 64 bytes 23 9/3/2015

Performance Derived key length: 64 bytes 24 9/3/2015

Agenda  Motivation and Solution Idea  Basic Technologies  State of the Art  Smart OpenID  Implementation  Summary and Future Work 25 9/3/2015

Summary  UICC as secure element on smartphones  Dual Application Architecture with Open Mobile API  Improve existed protocols with the UICC  Other usages:  Digital certificate  Wireless PKI  NFC payment  … 26 9/3/2015

Future Work  Smart OpenID with HMAC-SHA-256  Implementation of other applications 27 9/3/2015

28 Thank you! Questions? 28 9/3/2015

Bibliographie [Sma09]SmartTrust. The role of SIM OTA and the mobile operator in the NFC environment, /3/2015

Smartphone  Mobile phone voice communication and messaging  Feature phone digital camera, gaming, music and video streaming  Smartphone modern operating system, high speed connectivity, third- party applications /3/2015

Access Control Module 31 9/3/2015

Security Analysis : Phishing 32

Security Analysis : Phishing 33