Mobile Device Security Challenges  Mustaque Ahamad, Director, Georgia Tech Information Security Center  Patricia Titus, VP and Global Chief Information.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
MedVault: Ensuring Security and Privacy for Medical Data Mustaque Ahamad, Douglas Blough, Ling Liu, David Bauer, Apurva Mohan, Daisuke Mashima, Bhuvan.
Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
MNO Cloud Use Case 3 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_116.
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
Automated Remote Repair for Mobile Malware Yacin Nadji, Jonathon Giffin, Patrick Traynor Georgia Institute of Technology ACSAC’ 11.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Security Issues and Challenges in Cloud Computing
Microsoft Ignite /16/2017 4:54 PM
SESSION ID: #RSAC Chaz Lever Characterizing Malicious Traffic on Cellular Networks A Retrospective MBS-W01 Researcher Damballa,
Consumerisation of IT James Lockyer Windows Product Manager.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
Presentation By Deepak Katta
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Sophos Mobile Security
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO twitter.com/LacoonSecurity.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Dell Connected Security Solutions Simplify & unify.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
The Changing World of Endpoint Protection
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Arpit Jain Mtech2. Outline Introduction Attacks Solution Experimental Evaluation References.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential Unified Communications 8/16/ Competing with the Cisco Unified Communications Architecture.
Trusted Passages: Managing Trust Properties of Open Distributed Overlays Faculty: Mustaque Ahamad, Greg Eisenhauer, Wenke Lee and Karsten Schwan PhD Students:
Monitoring commercial cloud service providers CERN openlab Summer Students Lightning Talk Sessions Lassi Kojo › 19/08/2015.
A Lightweight Scheme for Securely and Reliably Locating SIP Users Lei Kong Vijay A. Balasubramaniyan Mustaque Ahamad.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Copyright © 2013 OneNeck IT Services Corporation. All Rights Reserved. 1 Cloud Enablement For Microsoft Dynamics Cloud Enablement for Dynamics AX and Use.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
Internal primer Optimize Your Operations
Sophos Central for partners and customers: overview and new features
CudaLaunch for Barracuda NG Firewall.
Cloud App Security vs. O365 Advanced Security Management
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Secure Hyperconnectivity with TeamViewer and Windows technologies
CBRNE Project Team Meeting 01 November, 2011
The utility belt for managing security and compliance in Office 365
Automated Response with Windows Defender ATP
Prevent Costly Data Leaks from Microsoft Office 365
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Business Brochure.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
The Internet of Unsecure Things
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Unified Communications in the Call Center
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
Mobile Security Evangelos Markatos FORTH-ICS and University of Crete
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Mobile Device Security Challenges  Mustaque Ahamad, Director, Georgia Tech Information Security Center  Patricia Titus, VP and Global Chief Information Security Officer, Unisys  Robert Smith, Founder & CTO, M.A.D. Partners  Moderator: Illena Armstrong

Attacks from the desktop world moving into the mobile environment –2009: iPhone botnet –2010: Google remotely nukes two apps that violated TOS –2010: 20% of Android apps leak private user data –2010: Android media player trojan spreads via text message Nov Mobile Attacks

Current Mobile Device Security Nov Direct interaction with service provider Ignore Periodically check revocation server Migrating desktop solutions

Avoiding Mobile Malware Mobile application market place can be used to propagate infected or malicious applications How are applications being evaluated? –Sophistication of malware in the desktop space (GT Mtrace system) –Analysis must focus on what they do rather than what they are –Utilizing available resources (IP reputation, DNS domain reputation, blacklists etc.) –Drive-by-downloads Nov Joint work with Jonathon Giffin, Wenke Lee, Paul Royal & Patrick Traynor

Mobile Security Analytics Capturing security relevant feature values and their analysis Local vs. proxy server IP vs. telecom network Other challenges: privacy, scalability, sharing intelligence across networks Call source feature analysis (Pindrop) Nov Joint work with Vijay Balasubramanian, Jonathon Giffin and Patrick Traynor.

Remote repair 1.Alert of malicious activity 2.Recovery server queries execution state of infected device 3.Server pushes remediation actions to device 4.Device’s trusted kernel executes remediation Nov Provider’s network Recover y server Jonathon Giffin, Patrick Traynor and their PhD students are working on this project.

Some questions Nov Are we making the right assumptions about threats to mobile devices? What security guarantees are possible? What is the best way to provide these guarantees? Some Questions