SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Raimund Genes - CTO
Security under Android
Copyright 2013 Trend Micro Inc.
Android has been
designed with security in
mind!
Security in Mind?
Android is a privilege-separated
operating system. Each application
runs through a unique Linux user ID.
No application has permission to
impact other applications.
Applications can‘t access the network
without prior consent
Security in Mind?
When installing an
application, the
user is requested
by the app
package installer
to grant
permission(s)
But!
Then, before or while running the
application, it is never checked again
by the user. If the permission was
granted, the app can then use the
desired features without prompting the
user – forever!
So
With clever social engineering the bad
guys convince the users to install a
„useful“ application, the user willingly
gives permission, and bingo – device
could be misused
Industry	
  Trends	
  
Malware	
  increasing	
  on	
  “App	
  Stores”	
  
Android Malware
•  10K: Middle of 2012!
•  100K: End of 2012!
http://blog.trendmicro.com/how-big-will-the-android-malware-threat-be-in-2012/
Chris Di Bona from Google, November 2011:
”virus companies are playing on your fears to try to sell you bs protection
software for Android, RIM and IOS. They are charlatans and scammers. IF
you work for a company selling virus protection for android, rim or IOS
you should be ashamed of yourself.”
“The barriers to spreading such a program from phone to phone are large
and difficult enough to traverse when you have legitimate access to the
phone, but this isn’t independence day, a virus that might work on one
device won’t magically spread to the other.”
All the major vendors have app markets, and all the major vendors have
apps that do bad things, are discovered, and are dropped from the
markets.
Industry	
  Trends	
  
Google’s	
  Bouncer	
  
Google Bouncer: “Gone to the Gym”
Slide	
  13	
  -­‐	
  TREND	
  MICRO	
  CONFIDENTIAL	
  
Extended Network: The App Markets
Use Case: Personal data exfiltration via an Android Market
App Market
Infiltration	
 Exfiltration &
Exploits
Android Malware
120,000 300,000+
ANDROIDOS_JIGENSHA.A
Impact Scope:
760,000 users' data leaked online in Japan	
Malicious Behavior:
The malware collect User's contact list
includes phone number and names, then
sends them to a remote server.
Your phone as your wallet
Samsung’s Knox software
Types of Threats
Spying Tools
Track user data like GPS
and send to a 3rd party
Rooter
Hacks phone to take
control
Premium Service
Secretly subscribes
user to paid services
Data Stealer
Steals personal
information
Malicious
Downloader
Downloads new apps
without user consent
Click Fraud
Triggers pay-per-click
activity on the device
 
Viruses	
  for	
  Android	
  
	
  
Where’s the problem?
That’s why don‘t we see this under
IOS
Mobile App Reputation
•  Mobile App Reputation is a cloud-based
technology that automatically identifies
mobile threats based on app behavior
–  Crawl & collect huge number of Android apps
from various Android Markets
–  Identifies existing and brand new mobile
malware
–  Identifies apps that may abuse privacy / device
resources
–  World’s first automatic mobile app evaluation
service
	
  	
  	
  	
  	
  	
  	
  	
  	
  •  Malware?
•  Privacy Risk?
•  High Resource
Consumption?
Mobile	
  App	
  
Reputa<on	
  
Apps	
  
No	
  Issues	
  
Issue	
  
Iden<fied	
  
Mobile App Reputation
Generates
reputation
scores and
detailed report
Collects Apps and
scans them in the
cloud
1.
Static Analysis:
Dissects app code
and private data
access.
2.
Correlates web
queries with Smart
Protection Network
3.
Dynamic Analysis:
Activates app to
analyze actual
behaviour
4.
Mobile Application Reputation Architecture	
	
  
	
  
	
  
	
  
	
  
Data	
  Bus	
  /	
  Control	
  Bus
MSR	
  
(Mobile	
  
Sourcing)
MPAFI	
  
(Mobile	
  PAFI)
MSA	
  
(Mobile	
  StaDc	
  	
  
Analyzer)
MDA	
  
(Mobile	
  Dynamic	
  
Analyzer)
MSE	
  
(Mobile	
  Scoring	
  
Engine)
MDS	
  
(Mobile	
  Data	
  
Store)	
  
SPN	
  (Smart	
  Protec<on	
  Network)	
  WRS/FRS	
  Correlate	
  Services	
  
PAFI:	
  Pre-­‐Analysis	
  File	
  Interscan	
  
The Service
Appstore
submits
new apps
FTP
Crawler
Web
Upload
Apps are
scanned
Report is
provided
HTML
XML
EMAIL
Appstore removes
bad apps and
adds detailed
info to app listings
Information provided by MARS
MARS Sample Report
Developers!	
•  Ensure what public libraries do, before you use them!
•  Corporate customers are very sensitive regarding Data
Leakage!
•  CPU load and Battery impact plays a bigger and bigger
role in App selection!
•  Quick and Dirty might not be the way to go for a
sustainable business!
•  If you write Apps for a 3rd party, expect that the App will
be tested not only for functionality but also for potential
risks, negative impacts
Mid of May	
mars.trendmicro.com
to check the rating of your App
Droidcon2013 security genes_trendmicro

Contenu connexe

Tendances

How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeJai Mehta
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges Atchison Frazer
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...IJNSA Journal
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESijmnct
 

Tendances (20)

How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security Knowledge
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 

En vedette

Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015Ingram Micro Cloud
 
защита мобильных устройств
защита мобильных устройствзащита мобильных устройств
защита мобильных устройствВалерий Коржов
 
Droidcon2012 berlin (2) droidway
Droidcon2012 berlin (2) droidwayDroidcon2012 berlin (2) droidway
Droidcon2012 berlin (2) droidwayDroidcon Berlin
 
Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google castDroidcon Berlin
 

En vedette (8)

Cyber attacks 2015
Cyber attacks 2015Cyber attacks 2015
Cyber attacks 2015
 
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
 
защита мобильных устройств
защита мобильных устройствзащита мобильных устройств
защита мобильных устройств
 
blue via
blue via blue via
blue via
 
Droidcon2012 berlin (2) droidway
Droidcon2012 berlin (2) droidwayDroidcon2012 berlin (2) droidway
Droidcon2012 berlin (2) droidway
 
Lounge multiplayer
Lounge multiplayerLounge multiplayer
Lounge multiplayer
 
Droidcon moscow
Droidcon moscowDroidcon moscow
Droidcon moscow
 
Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
 

Similaire à Droidcon2013 security genes_trendmicro

I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OSPranav Saini
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfvenkatprasadvadla1
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniquescsandit
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSubho Halder
 

Similaire à Droidcon2013 security genes_trendmicro (20)

HinDroid
HinDroidHinDroid
HinDroid
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 

Plus de Droidcon Berlin

Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limitsDroidcon Berlin
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility Droidcon Berlin
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_backDroidcon Berlin
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86Droidcon Berlin
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building AndroidDroidcon Berlin
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentationDroidcon Berlin
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Droidcon Berlin
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkraussDroidcon Berlin
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014Droidcon Berlin
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Droidcon Berlin
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidconDroidcon Berlin
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devicesDroidcon Berlin
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradioDroidcon Berlin
 
Droidcon2013 commercialsuccess rannenberg
Droidcon2013 commercialsuccess rannenbergDroidcon2013 commercialsuccess rannenberg
Droidcon2013 commercialsuccess rannenbergDroidcon Berlin
 
Droidcon2013 bootstrap luedeke
Droidcon2013 bootstrap luedekeDroidcon2013 bootstrap luedeke
Droidcon2013 bootstrap luedekeDroidcon Berlin
 

Plus de Droidcon Berlin (20)

Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
 
crashing in style
crashing in stylecrashing in style
crashing in style
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in ux
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
 
droidparts
droidpartsdroidparts
droidparts
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetization
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkrauss
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
 
Droidcon2013 commercialsuccess rannenberg
Droidcon2013 commercialsuccess rannenbergDroidcon2013 commercialsuccess rannenberg
Droidcon2013 commercialsuccess rannenberg
 
Droidcon2013 bootstrap luedeke
Droidcon2013 bootstrap luedekeDroidcon2013 bootstrap luedeke
Droidcon2013 bootstrap luedeke
 

Droidcon2013 security genes_trendmicro

  • 1. Raimund Genes - CTO Security under Android Copyright 2013 Trend Micro Inc.
  • 2. Android has been designed with security in mind!
  • 3. Security in Mind? Android is a privilege-separated operating system. Each application runs through a unique Linux user ID. No application has permission to impact other applications. Applications can‘t access the network without prior consent
  • 4. Security in Mind? When installing an application, the user is requested by the app package installer to grant permission(s)
  • 5. But! Then, before or while running the application, it is never checked again by the user. If the permission was granted, the app can then use the desired features without prompting the user – forever!
  • 6. So With clever social engineering the bad guys convince the users to install a „useful“ application, the user willingly gives permission, and bingo – device could be misused
  • 7. Industry  Trends   Malware  increasing  on  “App  Stores”  
  • 8. Android Malware •  10K: Middle of 2012! •  100K: End of 2012! http://blog.trendmicro.com/how-big-will-the-android-malware-threat-be-in-2012/
  • 9.
  • 10. Chris Di Bona from Google, November 2011: ”virus companies are playing on your fears to try to sell you bs protection software for Android, RIM and IOS. They are charlatans and scammers. IF you work for a company selling virus protection for android, rim or IOS you should be ashamed of yourself.” “The barriers to spreading such a program from phone to phone are large and difficult enough to traverse when you have legitimate access to the phone, but this isn’t independence day, a virus that might work on one device won’t magically spread to the other.” All the major vendors have app markets, and all the major vendors have apps that do bad things, are discovered, and are dropped from the markets.
  • 11.
  • 13. Google Bouncer: “Gone to the Gym” Slide  13  -­‐  TREND  MICRO  CONFIDENTIAL  
  • 14. Extended Network: The App Markets Use Case: Personal data exfiltration via an Android Market App Market Infiltration Exfiltration & Exploits
  • 16. ANDROIDOS_JIGENSHA.A Impact Scope: 760,000 users' data leaked online in Japan Malicious Behavior: The malware collect User's contact list includes phone number and names, then sends them to a remote server.
  • 17. Your phone as your wallet
  • 18.
  • 20.
  • 21. Types of Threats Spying Tools Track user data like GPS and send to a 3rd party Rooter Hacks phone to take control Premium Service Secretly subscribes user to paid services Data Stealer Steals personal information Malicious Downloader Downloads new apps without user consent Click Fraud Triggers pay-per-click activity on the device
  • 24. That’s why don‘t we see this under IOS
  • 25. Mobile App Reputation •  Mobile App Reputation is a cloud-based technology that automatically identifies mobile threats based on app behavior –  Crawl & collect huge number of Android apps from various Android Markets –  Identifies existing and brand new mobile malware –  Identifies apps that may abuse privacy / device resources –  World’s first automatic mobile app evaluation service                  •  Malware? •  Privacy Risk? •  High Resource Consumption? Mobile  App   Reputa<on   Apps   No  Issues   Issue   Iden<fied  
  • 26. Mobile App Reputation Generates reputation scores and detailed report Collects Apps and scans them in the cloud 1. Static Analysis: Dissects app code and private data access. 2. Correlates web queries with Smart Protection Network 3. Dynamic Analysis: Activates app to analyze actual behaviour 4.
  • 27. Mobile Application Reputation Architecture           Data  Bus  /  Control  Bus MSR   (Mobile   Sourcing) MPAFI   (Mobile  PAFI) MSA   (Mobile  StaDc     Analyzer) MDA   (Mobile  Dynamic   Analyzer) MSE   (Mobile  Scoring   Engine) MDS   (Mobile  Data   Store)   SPN  (Smart  Protec<on  Network)  WRS/FRS  Correlate  Services   PAFI:  Pre-­‐Analysis  File  Interscan  
  • 28. The Service Appstore submits new apps FTP Crawler Web Upload Apps are scanned Report is provided HTML XML EMAIL Appstore removes bad apps and adds detailed info to app listings
  • 29.
  • 30. Information provided by MARS MARS Sample Report
  • 31.
  • 32. Developers! •  Ensure what public libraries do, before you use them! •  Corporate customers are very sensitive regarding Data Leakage! •  CPU load and Battery impact plays a bigger and bigger role in App selection! •  Quick and Dirty might not be the way to go for a sustainable business! •  If you write Apps for a 3rd party, expect that the App will be tested not only for functionality but also for potential risks, negative impacts
  • 33. Mid of May mars.trendmicro.com to check the rating of your App