Lightweight Mobile Applications Certification: Prepared By: Rahul Biswas.

Slides:



Advertisements
Similar presentations
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Advertisements

SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
SSL From Your Smartphone Support for Android Smartphones /
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Norman SecureSurf Protect your users when surfing the Internet.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Sophos Mobile Security
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Our Online Courier Management Application is developed with the latest technology and State of the Art Database. This Management Software will be very.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Makes Accessing Virtual Apps and Desktops from Any Device as easy as turning on your TV Citrix Receiver.
Security Vulnerabilities in A Virtual Environment
Use flash eBook software AnyFlip to make page flip book works seamlessly on mobile devices.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
VMM Based Rootkit Detection on Android
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.
AKick Software’s Many Years of Excellence us: | Website: Toll Free:
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
The world’s open source learning platform Moodle Mobile SCORM 1.2 player Juan Leyva & Daniel
NORTON PHONE NUMBER TOLL FREE NUMBER ort.html.
PC security:  Digital era requires 100% effective PC security solutions. The more we grow, the more is the threat. The answer lies in multiple layers.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
Welcome McAfee Not updating In Windows
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Windows 10 Tech Support Call On Windows 10 the latest product updates from Microsoft providing a lots of easy facilities to the It professionals.
ETSI Software Reconfiguration Overview
TurningPoint ResponseWare
Contact Norton Support Canada for Firewall Issues.
Putting It All Together
Putting It All Together
eScan Antivirus Technical Support Toll Free Number
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Software Chapter 11.
Contact Norton Support by Phone if your Antivirus is not working.
Norton.com/setup Norton SetupProduct Key Norton is one of the trusted names in the world of online security. It offers a great range of.
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
How To Install Norton Security on Android Phone
Steps to Troubleshoot Norton 360 Error Norton 360 security software is all in one solution that combined online protection and performance tuning.
Trend Micro Antivirus Tech Support Number
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
How to Fix Norton Antivirus Sonar Protection Error.
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
NORTON CUSTOMER SUPPORT NUMBER. NORTON CUSTOMER SERVICE.
WEL-COME to BULLGUARD ANTIVIRUS SUPPORT WEL-COME to BULLGUARD ANTIVIRUS SUPPORT Are you getting issues with bullguard antivirus technical support phone.
Google Photos Not Working Google Photos Google photos an application provided by Google to share or to store photos Google photos can.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Multi-Factor Authentication
norton.com/setup - Considering the requirement of antivirus and anti-malware on all web-enabled devices in today's.
SBS 2008 – One year on David Overton

Presentation transcript:

Lightweight Mobile Applications Certification: Prepared By: Rahul Biswas

Metamorphosis: Today Old Times

Mobile Applications: Mobile phones or so called Smartphones have become technologically very advanced. Users are downloading/installing increased number of applications via online application stores.

Threat Perception: Increased number of downloads = increased threat of getting a malware installed. Not all the Applications have been thoroughly tested or went through due diligence.

Solution: Performing * Lightweight certification of Applications* while installing. Most effective phone malware mitigation strategy till now is to ensure “that only approved software can be installed”

Kirin Certification: Kirin security service for Android phones Kirin certification basically uses security rules. Security rules are basically templates which are designed to match unwanted properties in the security configuration.

Kirin Certification: The focus of Kirin is on Google-led Android platform, because it: Combines useful security information with applications Is already adopted by major American and EU service providers Is open source.

Kirin Security service: Design of Kirin is such that it serves as a security service which is running on the smartphone. Interface of the installer directly interacts with the Security service.

Kirin Certification: 1. Practicality factor. 2.Prevent malware and allow legitimate software.

The Road ahead: The best defense mechanism for mobile phone malware is still not clear. Operating systems own protection and security mechanisms have been improving. e,g. Technical flaw for Cabir fixed. Anti-virus software also act as a second layer of defense against malware.

Conclusion: Technology like Kirin provides Lightweight Mobile application certification at the install time and thus helps a lot in installing only the legitimate application on the smartphone.

Thank You