Using Sensitive Information
- n Android Based Smartphone
Using Sensitive Information on Android Based Smartphone Romkevan - - PowerPoint PPT Presentation
Using Sensitive Information on Android Based Smartphone Romkevan Dijk Android 6: To what extent is sensitive information protected? RQ2 & RQ3 RQ1 Androids security features Requirements Methodology RQ4 Sensitive information
RQ2 & RQ3
Android’s security features
RQ1
Requirements
RQ4
Sensitive information sufficiently protected?
RQ5
Improvements
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: Government Security Classifications by CESG (2011)
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
investigative journalist competent individual hacker the majority of criminal
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: Cyber Threats to Mobile Phones by US-Cert
Stolen Device Exploits Malicious apps Eavesdropping
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Based on: “End user device strategy: security framework and controls” by CESG (2013) “Guidelines on cell phone and PDA security” by NIST (2011)
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Based on: “End user device strategy: security framework and controls” by CESG (2013) “Guidelines on cell phone and PDA security” by NIST (2011)
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Secure World Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
prevention)
Based on: “End user device strategy: security framework and controls” by CESG (2013) “Guidelines on cell phone and PDA security” by NIST (2011)
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: End User Devices Security Guidance: Android 6 by CESG (2016)
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3860
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: http://source.android.com/compatibility/android-cdd.html
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: “Quantifying the security of graphical passwords: The case of android unlock patterns” by Sebastian Uellenbeck et al.
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: Google I/O 2016 Security Update
Artificial gummy fingers Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
What is stronger: fingerprint or 5 Digit PIN? “MUST have a false acceptance rate not higher than 0.002%.”
Source: http://source.android.com/compatibility/android-cdd.html
𝑙" = 1 𝐺𝑁𝑆 = 1 0,00002 = 50000 𝑙" = effective keyspace of biometric authentication 105 = 100000
Introduction | Stolen device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Device theft | Malicious Applications | Exploits | Eavesdropping | Conclusion
ANDROIDOS_GODLESS.HRX aka Godless
Source: Trendmicro(2016) “‘GODLESS’ Mobile Malware Uses Multiple Exploits to Root Devices”
Introduction | Device theft | Malicious Applications | Exploits | Eavesdropping | Conclusion
Source: https://www.wired.com/2015/08/google-samsung-lg-roll-regular-android-security-updates/ Introduction | Device theft | Malicious Applications | Exploits | Eavesdropping | Conclusion
Based on: “End user device strategy: security framework and controls” by CESG (2013) “Guidelines on cell phone and PDA security” by NIST (2011)
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Device theft | Malicious Applications | Exploits | Eavesdropping | Conclusion
Introduction | Device theft | Malicious Applications | Exploits | Eavesdropping | Conclusion
Based on: “End user device strategy: security framework and controls” by CESG (2013) “Guidelines on cell phone and PDA security” by NIST (2011)
Introduction | Stolen Device | Malicious Applications | Exploits | Eavesdropping | Conclusion
Conclusion
Introduction | Device theft | Malicious Applications | Exploits | Eavesdropping | Conclusion
(https://www.flickr.com/photos/gordon_mckinlay/)
Eavesdropper: https://www.flickr.com/photos/smoovey/
Passcode Key Device key Class Key File Metadata
File Key
Data File System Key
TEE
Trusted Execution Environment
DEK
Disk Encryption Key
KEK
Key Encryption Key
User’s passcode HBK
Hardware-bound private key Encrypts
Class Key FEK
File Encryption Key
Data KEK
Key Encryption Key
User’s passcode HBK
Hardware-bound private Key Defines Defines Encrypts Encrypts Encrypts
HBEK
Hardware-bound Encryption Key Encrypts