1
Mobile Security: how smart are mobile phones today?
- Prof. Alessio Merlo
Mobile Security: how smart are mobile phones today? Prof. Alessio - - PowerPoint PPT Presentation
Mobile Security: how smart are mobile phones today? Prof. Alessio Merlo DIBRIS University of Genoa 1 Before starting . Take you time to answer these question, w.r.t. your everyday use of smartphones and tablets: 1. How long do you
1
2
3
efforts.
it (attack).
4
sophisticated (and hence complex)
hesitation
health, mobile banking, …)
come from official stores
We focus on Android in this talk but no… ioS is not more secure than Android Let’s start with some (very) basics on Android Security.
6
9
BUT:
10
11
Each application (and its resources) is confined in a single Linux process. Each application owns a private data folder. The sandbox specifies which system resources the application is allowed to access and how can interact with other applications.
12
13
DVM Sandbox is not a security boundary!
code
14
15
interfaces
16
17
required permissions ( now “at runtime”)
proper permission
18
Are the previous security mechanisms enough? Android is the most used operating system in mobile devices HOWEVER It is the most targeted by malwares
19 Fonte: http://www.zdnet.com/
20 Fonte: http://www.zdnet.com/
21 Fonte: http://www.zdnet.com/
22 Fonte: http://www.zdnet.com/
23 Fonte: http://www.zdnet.com/
24 Fonte: http://www.zdnet.com/
25
26
29
30
Android verifies only the first file with the same name.
installs the second file in the list! The vulnerability is due to the use of two different libraries for verification and installation.
31
32
Jeff Forristal Android Master Key Exploit – Uncovering Android Master Key That Makes 99% of Devices Vulnerable https://bluebox.com/technical/uncovering-android- master-key-that-makes-99-of-devices-vulnerable/
33
attacks
34
BUT A ROOT USER CAN: 1. Inherently holds all privileges 2. Can silently install new apps 3. Has full storage access 4. Can execute low-level security sensitive operations
35
setUID of newly created process by Zygote.
root privileges.
cause its code to run with all privileges.
36
37
is fooled into misusing its privilege on behalf of a malicious unprivileged app.
38
permissions you’re looking for.” http://dtors.files.wordpress.com/2010/08/blackhat-2010-slides.pdf, 2010. DefCon 18.
39
permission.” http://www.quarkslab.com/dl/Android-OEM-applications-insecurity-and-backdoors- without-permission.pdf.
40
permissions.
41
phone calls.
this number and sends it to an external server.
transmission.
“Soundcomber: A stealthy and context-aware sound trojan for smartphones,” in Proc. 18th Annual Network and Distributed System Security Symposium (NDSS ’11), The Internet Society, 2011
42
43
44
45
46
47
48
Some research discovers new channels to trigger malware:
In their experiments they are able to activate a malware from 55 meters away in a crowded Starbucks using music. Hasan, Ragib, et al. "Sensing-enabled channels for hard-to- detect command and control of mobile devices." Proceedings of the 8th ACM SIGSAC symposium
ACM, 2013.
49
AREN’T WE MORE SECURE NOW?
disappear RIGHT
ALSO MORE SECURE THAN PREVIOUS ONE?
Why? Usability vs. Security dilemma.
50
in the name of convenience («Usability»):
Do they streghten the reliability of Android? Can they be abused? Considerations: The Autofill Framework in some ways violates sandboxing Instant Apps mechanism allows to execute remote code
52
53
54
55
56
57
58
59
Overprivileged or misconfigured apps Evaluates similarity against a large dataset of malware families (6000+ samples)
Permission Risk Vulnerability Risk Malware Risk
70+ known code vulnerability patterns Vulnerabilities are categorized into four danger levels (info, notice, warning, critical) 30+ anti-malware engines Risk calculated as a weighted sum on the number of malware occurrences
Overall Risk
60
#1 Security App Monitoring at Poste Italiane CERT #2 Preliminary Analysis of two popular apps Major Bank #3 In-depth Risk Analysis of Banking App Major Automotive Company
62
APPROVER reports:
certificates checking
illegal SSL certificates
“Critical vulnerability that allows attackers to mount MITM attacks”
63
Home Banking Apps APPROVER Report
64
65
Low Medium High Likelihood Level Low Medium High
High Priority
Impact Level
Low Priority
= High = Medium = Low = Critical
01 02 05 04 06 07 08 11 14 19 18 20 21 22 01 02 04 05 06 07 08 11 12 13 14 16 18 19 20 21 22
M5 - Insufficient Cryptography M8 - Code Tampering M3 - Insecure Communication M10 - Extraneous Functionality M10 - Extraneous Functionality M9 - Reverse Engineering M8 - Code Tampering M4 - Insecure Authentication M9 - Reverse Engineering M1 - Improper Platform Usage M8 - Code Tampering M2 - Insecure Data Storage M2 - Insecure Data Storage M2 - Insecure Data Storage M3 - Insecure Communication M5 - Insufficient Cryptography M2 - Insecure Data Storage M1 - Improper Platform Usage M1 - Improper Platform Usage M1 - Improper Platform Usage M7 - Client Code Quality M5 - Insufficient Cryptography
17 09 09 16 12 13 17 03 03 10 15 15 10
66
Spin-off of the University of Genova
67
68
Recent work: we analyzed the top 50 online trading apps and they suffers from the same issues. Some considerations:
problem, a plethora of new ones come up.