think like a hacker
play

Think like a Hacker Not So Smart Phone security Introduction - PowerPoint PPT Presentation

Partners in Information Security Think like a Hacker Not So Smart Phone security Introduction Peter Rietveld Liviu Rombaut Traxion Smartphones will never be secure Since security is not a simple notion What & Whom


  1. Partners in Information Security Think like a Hacker Not So Smart Phone security

  2. Introduction  Peter Rietveld  Liviu Rombaut  Traxion

  3. Smartphones will never be secure  Since security is not a simple notion  What & Whom are you protecting?  Since it is a very complex device  Comparable to a PC in 2003  Since it depends on many environmentals

  4. Whom to secure?  Vendor  You must buy a new phone every 2 years  Stop updates  Result: orphaned phones  Promise new features every day  Rushed production  Result: bad software

  5. App builder  Quick results  Promise the world  Skip ‘difficult stuff’  Security is not a focus  Result: broken software

  6. User  Usability  Not pay for software  Install all kinds of stuff  Let everyone use the device  Result: broken systems

  7. User’s company  ‘ BYOD ’ or company device  Install software  Block certain Updates ‘for compatibility’  Result: broken system

  8. Governments  Surveillance requirements  Result: broken standards

  9. Provider  Add own software  Block Updates (for compatibility)  Retain customer (SIM only)  Old phones stay

  10. And that is the easy part  Now for something more technical

  11. A smartphone is a crypto device  Trusted Platform  Code Signing  Theoretically good  Jail Breaking  Yet  An open platform  Result Appstore = First Line of Defence  And the only one

  12. ‘Trusted’ Platform  Depends on PKI Ecosystem  Designed mid-80s  Adopted in early 90s  Neglected since  Many well documented flaws  Better known to attackers since Flame and Stuxnet  Under reconstruction since 2010  Long way to go

  13. Dependencies  Trusts ‘any’ network  Public and private  WiFi Onion  Money comes from adware  Adware networks are trusted – prime attack vector  Certificate names based on DNS names  Certificates depend on online validation  Slow and easily fooled  Updates depend on DNS  DNS issues  DNSSec?

  14. Other challenges  Massive ecosystem  Exploding codebase  Every app in the appstore must be scanned  And rescanned when vulnerabilities emerge

  15. Beat the Statistics  Mudge@BlackHat: 1 exploitable error per 1000 lines of code  Grey Hat Hacking Handbook: 5-50 errors per 1000 lines of code  "Code Complete" (Steve McConnell)  Industry avarage : 15 - 50 errors per 1000 lines of code  Microsoft : 0.5 errors per 1000 lines of code in released code  Harlan Mills 'cleanroom development', 0.1 defect per 1000 regels code in released product  Space-shuttle software - 0 errors in 500,000 lines of code

  16. Codebase Android SLOC Drupal Average iPhone App Wordpress Ruby on Rails Joomla! Plone Space shuttle F22 Raptor Chrome Firefox Facebook Windows NT4 Android Linux 2.6 kernel Boeing 787 RHEL 7 Windows 7 Windows XP Debian 2.2 Potato OS-X 10.4 Tiger 0 20000000 40000000 60000000 80000000 100000000

  17. Concluding  Smartphones are just computers  In consumer space  And they are just as (in)secure

  18. Thank You

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend