PORSCHA PORSCHA : POLICY ORIENTED SECURE CONTENT HANDLING IN ANDROID Machigar Ongtang, Kevin Butler, Patrick McDaniel Dhurakij Pundit University, University.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Internet Protocol Security (IP Sec)
GSM Security and Encryption
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Encryption Methods By: Michael A. Scott
ASYMMETRIC CIPHERS.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Electronic Mail Security
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
Cryptography, Authentication and Digital Signatures
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Network Security David Lazăr.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Pretty Good Privacy (PGP) Security for Electronic .
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
DIGITAL SIGNATURE.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Network Security Celia Li Computer Science and Engineering York University.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Crypto in information security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
e-Health Platform End 2 End encryption
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Public Key Infrastructure
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
Lecture 4 - Cryptography
Presentation transcript:

PORSCHA PORSCHA : POLICY ORIENTED SECURE CONTENT HANDLING IN ANDROID Machigar Ongtang, Kevin Butler, Patrick McDaniel Dhurakij Pundit University, University of Oregon, Pennsylvania State University ACSAC(2010)

Agenda  Introduction  Content on Smart Phone  About Android  Architecture  Evaluation  Discussion  Conclusion

 Android provide few direct protections for the content placed on the phone  DRM(Digital Right Management) DRM(Digital Right Management)  Porscha:  content should only be accessible by explicitly authorized phones  content should only be accessed by provider endorsed applications  content should be subject to contextual constraints  Two phases of Porscha:  in transit  on platform Introduction

Content on Smart Phone  Personal and Business Documents  Service-specific data  spy camera  Mydroid  Financial Information

Content on Smart Phone  DRM Policy Requirements  Binding content to the phone  Binding content to endorsed applications  Constraining continuing use of the content

About Android  Four types of components  Two groups of applications  Documents in transit & on-platform access

About Android  On-platform access  Initial Document Recipients  Documents at Rest  Document Sharing

Architecture  Constraints on Devices - binding to specific devices identified by the users' International Mobile Subscriber Identity (IMSI) or WAP Identify Module (WIM).International Mobile Subscriber Identity (IMSI)  Constraints on Applications - be restricted to applications with a given code fingerprint (hash of the application image)  Constraints on Use - support not only the regulation of simple accesses, but also differentiation of simple access from read, modify and delete rights

Architecture - in transit  Identity-Based Encryption (IBE):enables the senders to construct the public keys of the recipients from known identities, and contains a trusted Private Key Generator(PKG).  Encryption : inputting the message (data), public key string, and cryptosystem parameters  Decryption : inputting the ciphertext and private key to the decryption algorithm

Architecture - in transit  sender(content source) : S  receiver(phone) : R  identity for participant s : I s  public/private key of a : K a + /K a -  content : m  police for m : p m   Delivery of SMS/MMS:

Architecture - in transit  Delivery of  one-time 128-bit AES symmetric key : k e

Architecture - on platform  Policy Enforcement on Initial Recipients

Architecture - on platform  traffic is opaque to Android  Use the Apache Mime4j library to parse the message streams in plain RFC-882 and MIME formatsApache Mime4j

Architecture - on platform  Policy Enforcement on Documents at Rest  add an extra policy field to the structure of each Content Provider record  The Porscha mediator inserts the policy into this field

Architecture - on platform  Enforcement on Indirect Receivers

EVALUATION

Discussion  Recipients Without Porscha  store all modifications such as decrypted s and those with information removed, locally on the phone, and only reflect back to the IMAP server the original  Application and Platform Trust  Alternative Application Enforcement Infrastructures  Digital Rights Management  Porscha is lightweight and designed with mobile solutions in mind; by contrast, many advanced DRM protocols are heavyweight and not transparent to applications.

Conclusion  Porscha can protect SMS, MMS, document.  Porscha secures content delivery using identity- based encryption and mediates on-platform content handling to ensure conformance with content policy

 Thank you for listening