s mv h unter large scale automated detection of ssl tls
play

S MV -H UNTER : Large Scale, Automated Detection of SSL/TLS - PowerPoint PPT Presentation

S MV -H UNTER : Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps David Sounthiraraj Justin Sahs Garret Greenwood Zhiqiang Lin Latifur Khan University of Texas at Dallas February 26, 2014


  1. S MV -H UNTER : Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps David Sounthiraraj Justin Sahs Garret Greenwood Zhiqiang Lin Latifur Khan University of Texas at Dallas February 26, 2014

  2. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Problem Statement ◮ Many Android apps use SSL/TLS to transmit sensitive data ◮ Android allows developers to override the built-in validation ◮ Used to connect to servers whose certificates come from non-standard Certificate Authorities (CAs) ◮ Used to avoid purchasing certificates for testing or user acceptance environment ◮ Can lead to SSL Man-in-the-Middle Vulnerabilities (SMVs)

  3. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion SSL/TLS In SSL/TLS, a server’s identity is verified by a certificate chain. A chain is valid if: ◮ Each certificate has not expired ◮ The root certificate of the chain is from a CA present in the keystore ◮ Each certificate has a valid cryptographic signature from the CA immediately after it in the chain Additionally, the certificate chain’s hostname must match the domain name being connected to (possibly with wildcards).

  4. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Example Vulnerability A famous example is the Chase Banking App (CVE-2012-5810): 1 public final void checkServerTrusted(X509Certificate[] paramArrayOfX509Certficate, String paramString) 2 3 { if ((paramArrayOfX509Certficate != null ) && ( 4 paramArrayOfX509Certficate.length == 1)) 5 paramArrayOfX509Certficate[0].checkValidity(); 6 while ( true ) 7 { 8 return; 9 this .a.checkServerTrusted( 10 paramArrayOfX509Certficate,paramString); 11 } 12 13 } (from (Georgiev et al. , 2012))

  5. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Example Vulnerability A famous example is the Chase Banking App (CVE-2012-5810): 1 public final void checkServerTrusted(X509Certificate[] paramArrayOfX509Certficate, String paramString) 2 3 { if ((paramArrayOfX509Certficate != null ) && ( 4 paramArrayOfX509Certficate.length == 1)) 5 paramArrayOfX509Certficate[0].checkValidity(); 6 while ( true ) 7 { 8 return; 9 this .a.checkServerTrusted( 10 paramArrayOfX509Certficate,paramString); 11 } 12 13 } (from (Georgiev et al. , 2012))

  6. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Approach ◮ Purely static analysis unreliable ◮ Purely dynamic analysis infeasible ◮ enumerate all possible UI interaction paths ◮ text input ◮ We propose a hybrid approach ◮ use static analysis to prune the search space for and provide valid text to dynamic analysis

  7. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  8. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  9. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  10. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  11. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  12. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  13. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  14. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion System Overview Static Analysis Dynamic Analysis HTTP Traffic Disassembly Internet Smali Files Device & UI HTTPS MITM HTTPS Proxy Automation Vulnerable Traffic Traffic Vulnerability Smart Input Apps Detection Apps Generation Method Names Correlative Analysis Results Entry Point Identification

  15. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Static Analysis Disassembly Smali Files Vulnerable Vulnerability ... Smart Input Apps Detection Apps Generation Method Names Entry Point Identification

  16. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Disassembly ◮ apktool to disassemble the packaged compiled code into a human-readable format Disassembly called Smali . Smali Files Vulnerable ◮ Significantly faster and ... Vulnerability Smart Input Apps Detection Generation more reliable than Method Names decompilation, especially Entry Point Identification when the code has been obfuscated

  17. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Static SMV Detection ◮ Simply check whether the X509TrustManager or HostNameVerifier interfaces have been Disassembly overridden Smali Files Vulnerable ◮ Apps that do not override ... Vulnerability Smart Input Apps Detection Generation these either do not use SSL Method Names or use the built-in SSL Entry Point Identification support without modification

  18. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Vulnerable Entry Point Identification ◮ Each app can be started at a number of entry points (called activities ) ◮ Many entry points will not Disassembly trigger secure connections Smali Files Vulnerable ... Vulnerability Smart Input ◮ Trace backwards through Apps Detection Generation method calls to identify Method Names entry points that might Entry Point Identification trigger potential vulnerabilities

  19. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Smart Input Generation ◮ Apps often perform validation on text input or convert text to other datatypes (e.g. integers) Disassembly ◮ Intelligently provide input Smali Files based on: Vulnerable ... Vulnerability Smart Input Apps Detection Generation ◮ Input type annotations Method Names ◮ Type cast operations in Entry Point the code Identification

  20. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Dynamic Analysis HTTP Traffic Internet Device & UI HTTPS MITM HTTPS Proxy Automation Traffic Traffic ... Correlative Analysis Results

  21. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Device Management For completeness and scalability, our system must: ◮ Manage multiple emulators in parallel, ◮ Handle emulator crashes and other errors, ◮ Schedule and distribute app testing across running emulators, and ◮ Collect and manage log data including installation and uninstallation details and network traffic.

  22. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Device Management The device management component has two threads: ◮ Emulator Management ◮ App Scheduling

  23. Introduction System Overview Static Analysis Dynamic Analysis Experiments Discussion Device Management The device management component has two threads: ◮ Emulator Management ◮ Maintains a pool of active and free emulators ◮ Monitors the state of each emulator, restarting ones that go “offline” or crash ◮ App Scheduling

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend