Towards a Unified Framework for Mobile Device Security Wayne A. - - PowerPoint PPT Presentation

towards a unified framework for mobile device security
SMART_READER_LITE
LIVE PREVIEW

Towards a Unified Framework for Mobile Device Security Wayne A. - - PowerPoint PPT Presentation

Towards a Unified Framework for Mobile Device Security Wayne A. Jansen, NIST Mobile Device Background* Mobile Device Background* Mobile Device Background* Mobile Device Background* Inexpensive, ubiquitous, wireless, networked,


slide-1
SLIDE 1

Towards a Unified Framework for Mobile Device Security

Wayne A. Jansen, NIST

slide-2
SLIDE 2

Mobile Security Project

Mobile Device Background* Mobile Device Background* Mobile Device Background* Mobile Device Background*

  • Inexpensive, ubiquitous, wireless, networked, expandable
  • Increasingly hold sensitive information or the means to

access sensitive information

  • At the fringe of corporate influence and control
  • Physical security exposure to theft or loss
  • Limited computing power, display size, battery life
  • Intermittent connectivity
  • Many devices per user
  • Many operating systems – Palm OS, Pocket PC, Linux
  • Users unaware of security implications
  • Lack of adequate security mechanisms

*Commercial products and trade names are identified in this presentation to illustrate technical concepts; it does not imply recommendation or endorsement by NIST

slide-3
SLIDE 3

Mobile Security Project

Security Enhancements

User Authentication Content Encryption Firewall/IDS Anti-Virus VPN Framework Components Network Authentication Policy Controls

slide-4
SLIDE 4

Mobile Security Project

Framew ork Components

  • Piecemeal add-on security solutions often present

problems in software integration, usability, and administration.

  • As an alternative, we have developed a unified framework

that incorporates the following core security components:

– User Authentication – Strong user authentication is the first line of

defense for an unattended, lost, or stolen device. Multiple modes of authentication increase the work factor for an attacker; however, very few devices support more than one mode, usually password-based authentication

– Content Encryption – With sufficient time and effort an

authentication mechanism can be compromised. Content encryption is the second line of defense for protecting sensitive information

– Policy Controls – When a device is active, various attacks can

  • ccur. Policy rules, enforced for all programs regardless of

associated privileges, protect critical components from modification and limit access to security-related information

slide-5
SLIDE 5

Mobile Security Project

Framew ork Schema

Level 0 Level 3 Level 2 Level 1 Effective Policy Required Authentication Cryptographic Repository

None – default at power on and boot up Most Restrictive Policy A Policy B Policy C Yes/No Yes/No Yes/No Zero or More Zero or More Zero or More Unavailable

Multi-mode Authentication Policy Controls Content Encryption

  • M

i n

slide-6
SLIDE 6

Mobile Security Project

Example Configuration

L0 - Locked L2 - Medium L1 - Low Effective Policy Required Authentication Cryptographic Repository

None – default at power on and boot up Most Restrictive All PIMS, but no communications Unavailable Available Password Token Unavailable All PIMS & wireless with socket restrictions

slide-7
SLIDE 7

Mobile Security Project

Example Configuration (cont.)

L0 - Locked L3 - High L2 - Medium L1 - Low Effective Policy Required Authentication Cryptographic Repository

None – default at power on and boot up Most Restrictive A few basic PIMS, IrDA, Bluetooth Available Available Unavailable Password, Biometric None – user choice Token Unavailable All PIMS & wireless with socket restrictions All PIMS with no wireless socket restrictions

slide-8
SLIDE 8

Mobile Security Project

1p 1p 1 1B

Conceptual Operation

2 3 1A Pass Fail Fail Pass Delay Auto Tran 1 Man Tran 1 Man Tran 2 3A Man Tran 1 Auto/Man Tran 3 3p Pass Delay Fail Man Tran 0 Auto/Man Tran 2

Conventions: # -- echelon level # #p – pre-handler for level # #p – post-handler for level # #α – authentication mechanism α at level #

3p Man Tran 0 Man Tran 0 Power On Auto/Man Tran 3

slide-9
SLIDE 9

Mobile Security Project

Level Selector

  • An echelon selector GUI is

used to navigate among echelon levels as needed

  • The buttons at the center are

used to change levels

  • A change in level may trigger

the execution of one or more authentication modules

  • The button for the current

echelon level is highlighted

  • A slider at the left sets the

maximum level to which the device can transition automatically

  • An icon is used to display the

current echelon level and launch the Level Selector

slide-10
SLIDE 10

Mobile Security Project

Authentication Modules

  • We are developing authentication modules for the

framework that include visual authentication and novel forms of smart cards

  • The traditional means for user authentication is an

alphanumeric password, but a number of drawbacks exist for handheld devices, such as the lack of a full keyboard

  • Moreover, translating existing desktop solutions to

handheld devices can be problematic:

– Obstacles include computational speed, network connectivity, battery capacity, and supported hardware interfaces – Any inconvenience due to a cumbersome peripheral attachment, lengthy authentication process, or error-prone interaction discourages use – Handheld devices have features (e.g., power-on/off behavior) that need addressing

slide-11
SLIDE 11

Mobile Security Project

Picture Passw ord

  • During enrollment, the user

selects a sequence of images, which must be entered for any subsequent login attempt

  • The software supports

several different themes and user-defined images/themes

  • Two selection methods are

provided: single (single tap) and paired (tap-and-hold, tap)

  • The password generated from

the image sequence is used to authenticate the user

  • Reenrolling the same image

sequence results in a different password value

  • Shuffling images between

authentications is an option

slide-12
SLIDE 12

Mobile Security Project

Smart MultiMedia Card

  • The mechanism relies on a

smart card chip packaged in a multimedia card format

  • The authentication mechanism

adjusts the echelon level on insertion or removal of a valid card and entry of its PIN

  • In addition to its smart card

capabilities, the card functions as a memory device

  • This technology eliminates the

need for an expansion sleeve, smart card reader, and full sized smart card that would

  • therwise be needed
slide-13
SLIDE 13

Mobile Security Project

Proximity Token

  • Instead of bringing a token into

physical contact with a PDA, use a short distance wireless interface

  • A challenge-response protocol

periodically verifies the presence of the device

  • If verification or

communications between the token and the device fail, the PDA shuts down

  • The proximity token has its
  • wn battery and been

prototyped using both Bluetooth and near-field magnetic communications

Conceptual Illustration of the Solution in a Key Fob Form Factor LED Indicators Power Switch

slide-14
SLIDE 14

Mobile Security Project

1 2 3 4 5 6 7 8 9 C E

Bluetooth Smart Card

  • Rather than bringing a smart

card into physical contact with a PDA, use a wireless interface instead

  • Bluetooth is present on most

handheld devices – no specialized smart card reader is needed by the PDA or another computer

  • Unlike wireless smart cards,

which draw power directly from the PDA, the Bluetooth smart card token has its own battery

  • The device also houses a

smart card and Bluetooth radio – it could be a cell phone

Conceptual Illustration of the Solution in a Key Fob Form Factor LED Indicators Power Switch LCD Screen Control Keys

slide-15
SLIDE 15

Mobile Security Project

Implementation

Picture Password UI Other UI Other Handler Picture Password Handler

Opie UI Plug-in

Socket Multiplexer User Space Kernel Space

Linux Kernel

Socket Power on Event Authentication Information

Level Selector

Policy Enforcement Multi-Mode Authentication 1 3 Secure Repository

  • • •
slide-16
SLIDE 16

Mobile Security Project

Policy Expression

  • Policy is represented by a set of policy entries
  • The policy language follows a grant-style specification by

which all actions are denied unless enabled by a policy entry

  • Policy entries are a triple of action, source, and target

values

– Action refers to operations performed at the PDA, such as enabling an interface or accessing a file – Source refers to objects (resources or services) on the PDA, such as interfaces for PC cards, the serial port, or connections via Bluetooth, 802.11, etc. – Target refers to external points of interface or reference needed to complete the semantics of the operation – Web access example: action="socket" source="out:inet:*:129.6.0.0/16:80" target="*"

slide-17
SLIDE 17

Mobile Security Project

Policy Representation

  • X.509-formatted certificate:

<policyEntry action="socket" source="out:inet:*:129.6.0.0/16:80" target="*" />

Certificate Serial Number Attributes Owner Extensions Issuer Unique ID Validity Period Issuer Signature Algorithm ID Version Issuer Signature PDA Policy Rules Represented In XML

slide-18
SLIDE 18

Mobile Security Project

Framew ork Recap

  • Generic multi-policy level framework for centrally

assigning and administering security policies on handheld devices

– Externally represented security policy, with an extensible policy language and format – Multi-mode authentication and content encryption at any policy level – Policies can be conveyed within certificates and handled as part of a policy management infrastructure – Simple policy perspective for users – Easy to navigate among echelon levels – Several suitable authentication mechanisms including visual login and novel forms of smart cards

slide-19
SLIDE 19

Mobile Security Project

Further Information

  • Wayne Jansen – Wayne.Jansen@NIST.Gov
  • Project Website –

http://csrc.nist.gov/mobilesecurity/publications.html