EVALUATING SECURITY OF SMART PHONE MESSAGING APPLICATIONS PRESENTED BY SUDHEER AKURATHI.

Slides:



Advertisements
Similar presentations
Module: 201 Create and Manage Your Agent Account.
Advertisements

Why Eve & Mallory Love Android
Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications (NDSS Symposium 2012) Sebastian Schrittwieser, Peter Frühwirt, Peter.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Lecture 23 Internet Authentication Applications
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Computer Security and Penetration Testing
Cellular Networks and Mobile Computing COMS , Fall 2012 Instructor: Li Erran Li
SSL From Your Smartphone Support for Android Smartphones /
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Presentation By Deepak Katta
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Cyber Crimes.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Wireless and Security CSCI 5857: Encoding and Encryption.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Masud Hasan Secue VS Hushmail Project 2.
HOW-TO guide This tutorial has sound.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
THE DEVIL IS IN THE (IMPLEMENTATION) DETAILS: AN EMPIRICAL ANALYSIS OF OAUTH SSO SYSTEMS SAN-TSAI SUN & KONSTANTIN BEZNOSOV PRESENTED BY: NAZISH KHAN COMPSCI.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Building a contactless university examination system using NFC Speaker : Chih-Ching Chen Advisor : Dr. Ho-Ting Wu 2013/12/2 1.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
ADVANCED COMPUTER TO, Kanishka Sir's. Introduction to Whatsapp Whatsapp Inc. Was Founded In 2009 By Brian Acton And Jan Koum (Also The Current CEO) Whatsapp.
The Session Initiation Protocol - SIP
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Electronic Banking & Security Electronic Banking & Security.
Android and IOS Permissions Why are they here and what do they want from me?
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Network security Vlasov Illia
INFORMATION TECHNOLOGY NEW USER ORIENTATION
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Exam Review.
Cross-Site Request Forgeries: Exploitation and Prevention
Security in Networking
Network Security: IP Spoofing and Firewall
X-Road as a Platform to Exchange MyData
Mobile Phone Technology
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

EVALUATING SECURITY OF SMART PHONE MESSAGING APPLICATIONS PRESENTED BY SUDHEER AKURATHI

 Introduction.  Related Work  Mobile Messaging Applications  Evaluation  Methodology  Experimental Setup  Conclusion  References OUTLINE

In all these applications users’ phone numbers are used as a unique token to identity accounts. Several new smartphone messaging and VoIP services with a novel client authentication are introduced. The new-era communication applications aim at substituting traditional text messaging (sms)and request the client’s telephone number. INTRODUCTION

EXAMPLES

An immeasurable number of conventions has been intended to give secure client verification, in view of public key cryptography and the use of a PKI. Because of the relentlessly growth of cell phones these platforms have started the enthusiasm of the security group. The security highlights and properties of Android and in addition iOS have been generally considered. RELATED WORK

They utilize the client's telephone number as the premise for ID. During the setup handle, the product requests that the client enter the telephone number of the gadget. MOBILE MESSAGE APPLICATIONS

Wi-Fi tablets can be activated using the telephone number of another gadget. These applications use the telephone number just to identify the clients and do not attempt to communicate over the mobile network. All the applications we discussed execute measures to keep users from impersonating others by attempting to form a number they don’t control. CONTINUED…..

Methodology Experimental Setup EVALUATION

Authentication Mechanism and Account Hijacking Sender ID Spoofing and Message Manipulation Unrequested Sms /Phone CallsEnumerationModifying Status Messages METHODOLOGY

To read encrypted HTTPS traffic from and to the tested applications, we set up a SSL proxy that acted as a man-in-the middle. Experimental setup for intercepting SSL EXPERIMENTAL SETUP

The attacker targets for connecting cell phone and the telephone number to the exploited person. AUTHENTICATION MECHANISM AND ACCOUNT HIJACKING

WhatsappTango and VoypiEasy Talk Viber and Wow Talk Hey Tell EXAMPLES

To prevent Another person utilizing the victimized person’s number, a confirmation SMS with a 4-digit PIN is sent. An attacker could misuse this process to hijack any whatsapp account. Blocking the communication between the telephone and the server to listen stealthily the PIN. SSL intermediary for security. WHATSAPP

Applications request the client’s telephone number. If the number is not enlisted for the service yet, no conformation is finished. Just if the number is known to the system, a conformation process by means of SMS (like WhatsApp) is performed. As long as the number is not enlisted for Tango or Voypi, an attacker can hijack it without SMS conformation. TANGO & VOYPI

Utilizes SMS for verification. After enrollment, the server sends a code via SMS. Code is entered into app for conformation. The server then answers with either “OK” or “ERROR. We can hijack by modifying this message from “ERROR” to “OK”. EASY TALK

Application requests user’s telephone number and sends an authentication request to the server. Server sends code through SMS message to the clients telephone or call from viber. Code is entered in the app. Server believes the customer easily and there is no validation. VIBER

SMS-Conformation registration. Enters telephone number into the application. Server creates an irregular conformation code and sends through SMS. Wow Talk

No conformation required. During the setup process the client needs to choose his or her own cellphone number from the address book. This gadget is then connected to the picked number without check. HEY TELL

SENDER ID SPOOFYING SENDER ID SPOOFING VOYPI FORFONE There is no validation needed to send message, hence id spoof IMSI, UDID are utilized for authentication so spoofing is tough

UNREQUESTED SMS/PHONE CALLS SMS messages or even telephone calls are used during telephone number verification process. A malicious client could utilize another client's number in the setup procedure to create irritating messages or telephone calls on victims telephone without uncovering his character.

ENUMERATION Another security part is their capacity to automatically import the client's contacts and compare the numbers to effectively enrolled numbers on the server. The server gives back a subset of the client's contact list that are registered. A possible threat resulting from a user account enumeration is the identification of active phone numbers. DEFINITION A large range of the numbers in San Diego zone code 619 is divided into chunks of 5000 numbers each and made a standard address book transfer as performed by WhatsApp. The whole process completed in under 2.5 hours. EXAMPLE

MODIFYING STATUS MESSAGES We analyzed the protocol for setting the status message and explore possible vulnerabilities that could result in unauthorized modification of status messages. Privacy-related design error. It shows the owner of a given phone number who installed the messenger application, but also the status message of a user is visible to people that have stored this user in their address book.

TABULAR VIEW ON ATTACKS

Broken authentication mechanism are vulnerable to account hijacking attacks. Most applications also suffer from account enumeration because of software design and implementation errors. Extreme effect on the privacy of clients.

content/uploads/publications/ndss2012_final.pdf content/uploads/publications/ndss2012_final.pdf messaging/7c79afdc-9a8f-4488-aea1-84fd0d7975b2 messaging/7c79afdc-9a8f-4488-aea1-84fd0d7975b2 with-fast-trending-security-app/ with-fast-trending-security-app/ play.com/app/gp3e1e50h1f5i0/Ironchat,%20Secure%20Messaging. html play.com/app/gp3e1e50h1f5i0/Ironchat,%20Secure%20Messaging. html REFERENCES

THANK YOU