Mobile Device Security

Slides:



Advertisements
Similar presentations
OPERATING SYSTEM REVIEW AND SIMULATIONS
Advertisements

Vpn-info.com.
David Angulo Rubio ANDROID OS Open Software Platform for Mobile Devices.
Chapter 1: Voilà! Meet the Android
Joemarie Comeros Amparo Android Development Orientation for Starters.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
IOS VS ANDROID Presented by, Lowkya Pothineni.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Android and Project Structure. Android Android OS – Built on Linux Kernel – Phones – Netbooks – Readers – Other???
Android Wentworth Institute of Technology Elec101 07/08 Douglas A. Arevalo-Santos.
Case study 2 Android – Mobile OS.
Chapter 1: Voilà! Meet the Android. Smartphones –Can browse the Web –Allow you to play games –Use business applications –Check –Play music –Record.
© by Pearson Education, Inc. All Rights Reserved. 1 Introduction to Android From “Android: How to Program” By Paul Deitel and Harvey Deitel.
Mobile Application Development with ANDROID. Agenda Mobile Application Development (MAD) Intro to Android platform Platform architecture Application building.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Android Introduction Based on slides made by
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Chapter 1: Voilà! Meet the Android
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. iOS.
Computer and Information Sciences
Presentation Seminar on “IMAGE SLIDER –AN ANDROID APPLICATION”
Android is an open source operating system based on Linux kernel designed for touch screen devices.
© by Pearson Education, Inc. All Rights Reserved. 1 Introduction to Android From “Android: How to Program” By Paul Deitel and Harvey Deitel.
Presentation on android based application
Operating Systems David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 432.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
Android Overview History and architecture. Brief History 1996 The WWW already had websites with color and images But, the best phones displayed a couple.
Introduction to Android
Mobile Application Security on Android Originally presented by Jesse Burns at Black Hat
Wireless and Mobile Security
Android History.
By, Rutika R. Channawar. Content Introduction Open Handset Alliance Minimum Hardware Requirements Versions Feature Architecture Advantages Disadvantages.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
Coding is Fun 6 How Cool Can You Get?. Raspberry Pi Cheap – under £30 Needs a few extras!
Mobile Software Development for Android - I397 IT COLLEGE, ANDRES KÄVER, WEB:
Android Development For Beginners. What is Android? Android is an open mobile phone platform that was developed by Google and later by Open Handset Alliance.
By : Abhishek Verma Main Topics : 1. Introduction 2. Platform 3. Software Development 4. Overall Evaluation.
Android. I. What’s Android Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google. Android is designed.
By: Dylan Small.  History of Android  Android Versions  Technical Specs  New/Current Versions  Future of Android  Summary Road Map.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Android. Android An Open Handset Alliance Project A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google.
GCSE COMPUTER SCIENCE Computers 1.6 Software. Software Software is the term used to refer to the programs (applications/apps) that are run on computers.
COM594: Mobile Technology Practical – Week 1 Android and Android Studio.
Module 51 (Mobile Device Fundamentals - Android)
A brief information about the Android Operating System
Workshop by T.Naveen sai kumar.
INFO 448: Android Development
Introduction To Android Programming
Rooting Android Created By : Mayank Talwar.
chapter 6- Android Introduction
ANDROID AND ANDROID PHONES
Operating System.
Android Versions’ Relative Distribution
Who owns your phone? Who feels that they have the right to use your phone for their purposes or on your behalf?
CIS 470 Mobile App Development
What is an Operating System?
By Filip Tyrala, Jack Wright, Jennifer Nolan
ANDROID AND ANDROID PHONES
SE4S701 Mobile Application Development
ANDROID OS Architecture
MOBILE OPERATING SYSTEM
MOBILE OPERATING SYSTEM
Android Developer Fundamentals V2
CIS 493/EEC 492 Android Sensor Programming
Korea Software HRD Center
CIS 694/EEC 693 Android Sensor Programming
Presentation transcript:

Mobile Device Security Common Mobile OS Android iOS Windows Mobile Symbian ? RIM (Blackberry)? Who are attackers targeting? In 2013 Android accounts for "nearly all mobile malware." -- McAfee report

Android The good  built on top of Linux kernel  apps largely written in Java (Apache Harmony)  open source The bad (challenges)  must support different hardware (phones, netbooks, GoogleTV, cameras, Google glass…)  version proliferation (Cupcake, Donut, Éclair, Froyo, Gingerbread, Honeycomb, Ice Cream Sandwich, Jelly Bean, KitKat …)  legal issues  application piracy

Android Security Security a priority in the software life cycle Mandatory app sandbox  each process is a subject & has its own ID  safe mode ensures the system partition is read-only  the API includes common encryption ciphers  user consulted to grant permission to new app Application signing  every application must be signed with a public key  CA not required and no CA verification is currently performed Other the kernel intercepts common software vuls (buffer overflow, integer overflow, heap corruption, format string errors) hardware-based Never eXecute

iOS Layers of Security  secure boot process  secure system install/upgrade  app security  runtime protections  file encryption  passcode security  support for network security standards

iOS ROM Secure Boot Process Boot Program ApplePublicKey 1) run boot program (integrity guaranteed by ROM) 2) Remaining system code is signed by Apple 3) Recovery to iTunes if necessary

iOS System install/upgrade

iOS app security  provided software (Mail, Safari, etc.) signed by Apple  other apps from registered developers are signed Apple supplies certificates to registered developers.  firms can use Apple service for in-house only software runtime protections  each app has its own home directory for files  most processes run in a non-privileged mode  all OS code is in read-only memory  processes are assigned to random memory locations

iOS file encryption crypto engine for AES-256 and SHA-1 UID | GID crypto engine for AES-256 and SHA-1 There is also a random number generator using interrupt timing.  Each file encrypted with _________ key  Each per-file key is wrapped (encrypted) with _________ key  Each class key is encrypted with UID (and possibly a passcode) Each file's metadata includes wrapped per-file key and class key encrypted with ____________ key

iOS passcode security  The passcode is "tangled with UID  Passcode checking ________ to 80 msec.

iOS support for network standards  secure low-level protocols (SSL, TLS)  secure higher-level VPN (L2TP, PPTP)  wi-fi via 128-bit AES encryption  …and many others