Presented by: Tom Staley. Introduction Rising security concerns in the smartphone app community Use of private data: Passwords Financial records GPS locations.

Slides:



Advertisements
Similar presentations
All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, ThanassisAvgerinos,
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Dynamic Analysis of Windows Phone 7 apps Behrang Fouladi, SensePost.
A Survey of Approaches for Automated Unit Testing
CS457 – Introduction to Information Systems Security Software 4 Elias Athanasopoulos
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection Tielei Wang 1, Tao Wei 1, Guofei Gu 2, Wei Zou 1 1 Peking.
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P
Presented by: Tom Staley. About Paper by Emiliano Miluzzo Alexander Varshavsky Suhrid Balakrishnan Romit Roy Choudhury Originally presented at MobiSys2012,
Automatic and Scalable Fault Detection for Mobile Applications MobiSys’ 14 Presented by Haocheng Huang
Safe  Secure  Reliable. Traceloc is a Location tracker application for Tracking the movement of your phone or device. Install this App to your target.
VanarSena: Automated App Testing. App Testing Test the app for – performance problems – crashes Testing app in the cloud – Upload app to a service – App.
Happy Home Helper Software Design Presentation Jeremy Searle Apr 7, 2004.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
AUTOMATIC CONCOLIC TEST GENERATION WITH VIRTUAL PROTOTYPES FOR POST-SILICON VALIDATION Reviewer: Shin-Yann Ho Instructor: Jie-Hong Jiang.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Automatic Mediation Of Privacy-sensitive Resource Access In Smartphone Applications Ben Livshits and Jaeyeon Jung Microsoft Research.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Presentation By Deepak Katta
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps Bin Liu (SRA), Bin Liu (CMU), Hongxia Jin (SRA), Ramesh Govindan (USC)
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
Common Alerting Protocol (CAP) Implementation Workshop – 2014 ArcGIS Geotrigger for CAP Implementation by Nalaka Kodippili Geo Technical Manager GIS Solutions.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang Department of Computer Science North Carolina State University CCS 2013.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Presented By: Steven Zittrower William Enck ( Penn St) (Duke)
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion,
Authors: William Enck The Pennsylvania State University Peter Gilbert Duke University Byung-Gon Chun Intel Labs Landon P. Cox Duke University Jaeyeon Jung.
CUTE: A Concolic Unit Testing Engine for C Technical Report Koushik SenDarko MarinovGul Agha University of Illinois Urbana-Champaign.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
1 A Static Analysis Approach for Automatically Generating Test Cases for Web Applications Presented by: Beverly Leung Fahim Rahman.
A Presentation Of TaintDroid & Related Topics
Presented by Mark Thompson High Level Overview and Demo.
University of Central Florida TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Written by Enck, Gilbert,
Event Management & ITIL V3
Effective Real-time Android Application Auditing
An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
White Box Testing Arun Lakhotia University of Southwestern Louisiana P.O. Box Lafayette, LA 70504, USA
Android Permissions Demystified
VMM Based Rootkit Detection on Android
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
IS3220 Information Technology Infrastructure Security
Coverage Efficiency in Autonomous Robots With Emphasis on Simultaneous Localization and Mapping Mo Lu Computer Systems Lab
Language-Based Information- Flow Security (Sabelfeld and Myers) “Practical methods for controlling information flow have eluded researchers for some time.”
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
AppAudit Effective Real-time Android Application Auditing Andrew Jeong
Better Performance Through Thread-local Emulation Ali Razeen, Valentin Pistol, Alexander Meijer, and Landon P. Cox Duke University.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
Android forensics: Automated data collection and reporting from a mobile device Justin Grover Digital Investigation Volume 10, Supplement, August 2013,
Edmodo’s mission is to connect all learners with the people and resources they need to reach their full potential.
Tool Support for Testing
Security and Programming Language Work on SmartPhones
Understanding Android Security
Android System Security
Viewbiquity HTML5 Tom Shafron Developer’s Blog CEO, Viewbiquity
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Sadiq Basha.
Automated Pattern Based Mobile Testing
Test Automation for IoT solutions A Paradigm shift
Systematic Detection of capability leaks in stock android smartphones
Pradeo Security Systems
ADVANCED KEY CONTROL TECHNOLOGY FOR NEW CAR DEALERSHIPS
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis.
Understanding Android Security
Presentation transcript:

Presented by: Tom Staley

Introduction Rising security concerns in the smartphone app community Use of private data: Passwords Financial records GPS locations Malware attacks have been found targeting smartphones

TaintDroid Previous attempt by presenters to address security problems Tracks sensitive data as it flows between apps Raises an alert when sensitive data is transmitted off the phone Leaks are only found after the data has been lost

Current Security Methods Unlike PCs, the app market is highly centralized Scan apps as they join the market Currently applied manually, if at all Some banned behavior still slips through the cracks

Proposed Solution AppInspector Service run by market providers or by a third-party Uses multiple virtual smartphones to run instances of apps before they reach the market Entire process is automated to ensure thorough testing

Challenges Three challenges with AppInspector How to track and log data How to determine security violations using the logs How to ensure all branches of code are covered

AppInspector Components Four main components Input generator Execution explorer Information flow tracker Security analyzer

Types of violations Security violation - when an app accesses data without permissions to do so Privacy violation – when an app discloses information without prompting the user AppInspector focuses on privacy violations

Tracking Data Log data about explicit and implicit data flows Various actions also logged, like methods that access disk memory or device sensors Action logging has to be limited to reduce overhead

Data Flows Explicit data flow – following data through use of data dependencies Attach a “label” to data as it leaves the source of the data Track the label through the program until it reaches a “sink” Implicit data flow – when sensitive information can be found by looking at control flow if (w == 0) x = y; else z = y; If w is privacy-sensitive, looking at values of x and z can determine if w == 0;

Violation Detection Two methods to detect privacy violations When sensitive data is disclosed: Use data dependency graph to trace sensitive data back to source Check for user notifications or search license agreements for permissions

Input Generation App are event-driven Two types of events: UI inputs Callback triggers from device sensors These inputs can be randomly generated to test apps

Concrete Execution Randomly generating input is known as Concrete Execution Developers tested this approach on 9 apps Fed constant stream of input for 30 minutes 40% or lower code coverage found

Symbolic Execution Another type of input testing known as symbolic testing Systematically tests all possible execution paths Highly inefficient

Concolic Execution Mix of concrete and symbolic execution Run symbolic execution on main application code All other code (code libraries, system code, etc.) tested with concrete execution Switch between the two methods as required during testing

Conclusion The app market is at risk for security and privacy violations AppInspector developed to scan apps before they reach marketplace Uses concolic execution to generate input Tracks sensitive data as it propagates through app Uses logs to determine if privacy violation has occurred

Bibliography Peter Gilbert, "Vision: Automated Security Validation of Mobile Apps at App Markets", MCS’11, June 28, 2011, Bethesda, Maryland, USA.