SlideShare une entreprise Scribd logo
1  sur  47
HP Fortify
Mobile Application
Security
Name
Title
Enterprise Security


© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The motivation




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Rise of the mobile machines
                             700,000
                                                                                                 Q4: Inflection Point
                                                                                         Smartphones + Tablets > PCs
                             600,000
     Global Shipments (MM)




                             500,000


                             400,000


                             300,000


                             200,000
                                       2005            2006               2007              2008              2009              2010   2011        2012E     2013E
                             100,000    Desktop PCs                        Notebook PCs                           Smartphones            Tablets


                                                                                                                                       Source: Morgan Stanley Research

3   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The smartphones as pocket PCs


                                              81%                             77%                              68%                     48%
                                           Browsed the                      Used a                                Used                 Watch
                                             internet                    search engine                           an app                videos



                                              Smartphone activities within past week (excluding calls)

         Desktop                                                                                                                                Pocket PCs



                                                                  Source: The Mobile Movement Study, Google, April 2011

4   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The Swiss army knife of computing

                                                                                              Rolodex                Game console
                                                                   Camera




                                                  Television                                                                           Calculator




                                                                                                                                        Laptop
                                                     Email




                                                                       Book                                              Internet

                                                                                                  GPS
5   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The evolution of the modern enterprise




                                                    1990s                                              2000s                           2010s
                                                    Webpage era                                        Ecommerce era                   Mobile era




6   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mobile represents a huge business opportunity
Please select the most important benefit that your organization ultimately expects to gain from current or
future mobile solutions deployments (whether or not you are currently receiving those benefits)

                                       Improve/enhance worker productivity
                                                    Increased sales/revenue
                                        Improve field service response time
                             Improve competitive advantage/market share
                                         Provide ease of information access
                                                   Improve customer service
                                                             Decreased costs
                                             Offer employees more flexibility
                   Enhance portability within the office or work environment
                                                         Eliminate paperwork
                                                    Speed the sales process
                           Provide perception of an advanced company to…

                                                                                                  0            5           10          15   20   25   30



N = 600, Source: IDC’s mobile enterprise software survey, 2011
7   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
But security is a huge concern
Which of the following technologies have resulted in an increase in IT security management spending at
your organization within past 12 months?
                         Mobility

                  Virtualization

           Social Networking

                             VoIP

    Unified Communications

                       Green IT


                                    0%                   10%                  20%                   30%                  40%              50%             60%            70%



      IDC Web Conference, 12 April 2012
                                                                                                                                  Source: IDC Security as a Service Survey n-47

8     © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
A treasure trove of private information

Your smartphone knows
you better than you know
yourself                                                                                                                        … and cyber attackers are
•   Pins & passwords
                                                                                                                                after your personal records
•   Contacts
•   Call history
•   Messages
•   Social networking
•   Visited web sites
•   Mobile banking
•   Personal videos
•   Family photos
                                                                                                        $
•   Documents
9   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Threats at all points




     Client                                                                 Network                                                     Server
     • Insecure storage of                                                  • Insecure data transfer                                    •   Authentication
       credentials                                                            during installation or                                    •   Session Management
     • Improper use of                                                        execution of the                                          •   Cross-site Scripting
       configuration files                                                    application
                                                                                                                                        •   SQL Injection
     • Use of insecure                                                      • Insecure transmission of
                                                                              data across the network.                                  •   Command Injection
       development libraries

10   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Types of mobile threats




                                                                                    Data Communication                        Exploitation and
Malware                                   Loss and Theft                                                                                               Direct Attacks
                                                                                    Interception                              Misconduct
Spyware, viruses,                         Data lost due to                          Eavesdropping on                          The inappropriate use    Short message
trojans, and worms                        misplaced or stolen                       communications,                           of a mobile device for   service (SMS) and
                                          mobile devices                            including emails, texts,                  personal amusement       browser exploits
                                                                                    voice calls, etc.,                        or monetary gain
                                                                                    originating from or
                                                                                    being sent to a mobile
                                                                                    device



11   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The solution




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What is mobile?




                 Devices                                                        Connection                                              Servers

13   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Same old client server model




              Client



                                                                                      Network                                           Server
         browser
14   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mobile application concerns




     Does it work?                                                       Does it perform?                                                Is it secure?
     • Does the application function                                     • Will the application perform for                              • Is the application securely
      as the business intends?                                              all users?                                                    coded?
     • Are all features there and                                        • Does it meet SLAs in                                          • Has the application been
      working?                                                              production?                                                   assessed for known threats?




15    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What you need to be concerned about

                      Know where you are using credentials

                      Know what sensitive data is in play

                      Track these through the device, network, and backend server

                      Test all those components




16   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Fortify mobile application security



       End to end mobile security: from the device, to the network to the backend
Features:               Benefits:
                                         server.             Why it matters:
• Secure the entire mobile                               • Ensure your Android and Apple iOS mobile devices                             • The mobile market is huge; global
  stack, from the mobile device to                         are always safe and secure                                                     mobile data traffic will increase 26-fold
  the server to the communications                       • Protect Android and iOS applications from                                      between 2010 and 2015, and over 50%
  between the two                                          advanced attacks by removing security                                          of all Americans currently have a
• Pinpoint with line of code precision                     vulnerabilities at the source, from software on the                            mobile phone (Arc Worldwide)
  the root cause of potential                              mobile device or backend server                                              • Mobile applications are in their infancy
  vulnerabilities for any application                    • Increase development productivity by enabling                                  in terms of security awareness
  developed for Apple iOS and                              security to be built into mobile applications, rather                        • Mobile payments will reach $240 Billion
  Google Android                                                                                                                          this year. Fraud becomes a concern if
                                                           than added on after it is deployed into production
• Complete static language support                                                                                                        Mobile Security is not addressed
                                                         • Spend valuable development resources and time
  for Objective C (any Apple mobile                                                                                                     • In Q4 2011, iOS has 43% of the mobile
                                                           innovating, instead of firefighting, troubleshooting,
  device, such as the iPhone or the                                                                                                       market share, second to Android at
  iPad) and Java, the programming                          and fixing vulnerabilities                                                     47% (NPD)
  language of Android
17   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mobile product support


                                                                  Comprehensive mobile support
                                                                     • Four mobile platforms and operating systems
                                                                     • Mobile assessment services for the
                                                                       device, network and server
                                                                     • Mobile security research group to stay abreast
                                                                       of the latest mobile security threats




18   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mobile assessments

 Type                                         What’s Included:                                                                          Why Use
 Full                                         • Server – All, Auto/Manual/Source                                                        Initial releases and
 (Hybrid Assessment)                          • Client – All, Auto/Manual/Source                                                        annual/periodic/compliance
                                              • Network – All, Auto/Manual                                                              assessments.
 Mini Hybrid                                  • Client – Filesystem Analysis, no source code analysis,                                  Minor releases. Supplemental to
 (1 Day Assessment)                             no malware analysis                                                                     previous full assessment.
                                              • Network – Basic Traffic Analysis, no data obfuscation
                                                analysis
                                              • Server – Basic Automated Scan, no source code
                                                review, no logic testing, no advanced injection
 Malware Assessment                           Malware Only Assessment – Check for malicious code on                                     Internal commercial applications
                                              client-side as well as for suspicious network traffic, e.g.                               developed by third-parties outside
                                              data transmitting to unknown hosts                                                        corporate control. E.g. Pandora,
                                                                                                                                        WSJ




19   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Process integration
Integrating security into your established SDLC process

                                    Security Foundations – Mobile Applications
                                                                         Architecture
     Plan                             Requirements                                                         Build                          Test                     Production
                                                                         & Design



     Mobile Security                 Application Specific Threat Modeling and                            Mobile Secure                   Mobile Application Security Assessment
     Development                     Analysis                                                            Coding Training                 (Static, Dynamic, Server, Network, Client)
     Standards
                                     Threat Modeling CBT for Developers                                  Mobile Secure                                            Mobile Firewall
 Mobile Application                                                                                      Coding Standards
 Security Process                                                                                        Wiki
                                     Mobile Risk Dictionary
 Design
                                                                                                         Static Analysis
     Mobile Security
     Policies



20    © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Summary: mobile application security
Comprehensive mobile application security solutions

                    That proactively identifies and eliminates risk in any mobile
      1             application, built for any platform or operating system: Apple
                    iOS, Google Android, Microsoft Windows Phone and RIM Blackberry

      2             To ensure that all mobile applications are trustworthy, in compliance with
                    any security mandates and safe for consumers and enterprises to use
                    Securing the whole mobile technology stack: from the user and device
      3             to the network communications to the backend servers

      4             Available on-premise or on-demand, and with professional services


21   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
7 Ways to Hang Yourself with
Android




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities

     1       Intent hijacking
     2       Intent spoofing

     3       Sticky broadcast tampering
     4       Insecure storage

     5       Insecure network communication

     6       SQL injection

     7       Promiscuous privileges


23   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Malicious app intercepts an intent bound for another app, which can
             compromise data or alter behavior
          Cause: Implicit intents (do not require strong permissions to receive)
                   Fix: Explicit intents and require special receiver permissions




  24   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                     Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network         SQL injection
                                                                                                 storage                                                      privileges
                                                                tampering                                                communication




                   IMDb App

                                                 Showtime                                                                         Handles Actions:
                                                                                       Results UI
                                                  Search                                                                          willUpdateShowtimes,
                                                                                                                                  showtimesNoLocationError


                                            Implicit Intent
                                            Action: willUpdateShowtimes




 25   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication




 26   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                     Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network         SQL injection
                                                                                                 storage                                                      privileges
                                                                tampering                                                communication

                   IMDb App
                                                 Showtime                                                                         Handles Actions:
                                                                                       Results UI
                                                  Search                                                                          willUpdateShowtimes,
                                                                                                                                  showtimesNoLocationError


                                            Implicit Intent
                                            Action: willUpdateShowtimes

                   Eavesdropping App
                                                                                       Malicious
                                                                                                                                  Handles Actions:
                                                                                       Receiver
                                                                                                                                  willUpdateShowtimes,
                                                                                                                                  showtimesNoLocationError


 27   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Malicious app spoofs a legitimate intent, which can inject data or alter
behavior
           Cause: Public components (necessary to receive implicit intents)
                   Fix: Use explicit intents and receiver permissions
                        Only perform sensitive operations in private components




  28   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                     Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network         SQL injection
                                                                                                 storage                                                      privileges
                                                                tampering                                                communication



                   Spoofing App
                                                                                                                                              Results UI
                                                                        Action: showtimesNoLocationError




                   IMDb App
                                               Showtime                             Results UI                                    Handles Actions:
                                                Search                                                                            willUpdateShowtimes,
                                                                                                                                  showtimesNoLocationError


 29   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication




 30   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Persistent intents used by legitimate apps can be accessed and removed
             by malicious apps
           Cause: BROADCAST_STICKY allows to full access to any sticky broadcasts
                   Fix: Use explicit, non-sticky broadcasts protected by receiver
                        permissions




  31   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                     Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network          SQL injection
                                                                                                 storage                                                      privileges
                                                                tampering                                                communication




         Sticky broadcasts                                                                                       Malicious App
         (intents):                                                                                              Requests
              SB                                                                                                 BROADCAST_STIC
              1                                                                                                  KY Permission
                    SB
                    2
                                    ?                                                                            Victim App
                                                                                                                                          Receiver
                                                                                                                                         (expects SB2)
                    SB
                    3


 32   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Local storage is accessible to attackers, which can compromise sensitive
data
           Cause: Local files are world-readable and persist
                   Fix: SQLite or internal storage for private data
                                 Encrypt the data (keep keys off the SD)



  33   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication


 Kindle app saves e-books (.mbp and .prc) in a folder on the SD card
 • Depending on DRM, accessible to other apps
 • Saves covers of books (privacy violation)
 • Folder is retained after uninstall of app




 34   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Data sent over unencrypted channels can be intercepted by attackers
             sniffing network
           Cause: Non-HTTPS WebView connections
                   Fix: Ensure sensitive data only sent over encrypted channels




  35   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication


  Twitter: Tweets are sent in the clear




                                             https://freedom-to-tinker.com/blog/dwallach/things-overheard-wifi-my-android-smartphone


 36   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication


 Facebook: Despite ‘fully encrypted’ option on the Web, mobile app sends
 in the clear




 37   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Allows malicious users to alter or view (query string injection) database
             records
           Cause: Untrusted data used to construct a SQL query or clause
                   Fix: Parameterized queries




  38   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication

 c = invoicesDB.query(
    Uri.parse(invoices),
    columns,
    "productCategory = '" +
        productCategory + "' and
        customerID = '" + customerID + "'",
    null, null, null,
    "'" + sortColumn + "'",
    null
 );

 39   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication

 productCategory = Fax Machines
 customerID = 12345678
 sortColumn = price

           Select              * from invoices
           where               productCategory = ‘ Fax Machines'
             and               customerID = '12345678'
         order by              'price'




 40   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication

 productCategory = Fax Machines' or productCategory = "
 customerID = 12345678
 sortColumn = " order by ‘price

          select               * from invoices
         where                 productCategory = 'Fax Machines'
              or               productCategory = “ ‘
            and                customerID = ‘ 12345678 ' order by ‘ "
       order by                'price'



 41   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication

 c = invoicesDB.query(
    Uri.parse(invoices),
    columns,
    "productCategory = ? and customerID = ?",
    {productCategory, customerID},
    null,
    null,
    "sortColumn = ?",
    sortColumn
 );

 42   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                   Sticky                                                    Insecure
                                                                                                 Insecure                                                 Promiscuous
 Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                  storage                                                  privileges
                                                                 tampering                                                communication




Description: Requesting unneeded permits privilege escalation attacks and
             desensitize users
           Cause: Deputies,
                  Artifacts from testing,
                  Confusion (inaccurate/incomplete resources)
                   Fix: Identify unnecessary permissions



  43   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                      Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network           SQL injection
                                                                                                 storage                                                       privileges
                                                                tampering                                                communication


                      User App                                                                                         Camera App

                      Does NOT need CAMERA                                                                             Needs CAMERA
                      permission                                                                                       permission
                                                                                                                                         Takes
                                         Wants Picture                                                                                   Picture




                            Implicit Intent                                                                                   Handles Action:
                            Action:                                                                                           IMAGE_CAPTURE
                            IMAGE_CAPTURE
 44   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Google Android Vulnerabilities
                                                                  Sticky                                                    Insecure
                                                                                                Insecure                                                 Promiscuous
Intent hijacking             Intent spoofing                    broadcast                                                   network      SQL injection
                                                                                                 storage                                                  privileges
                                                                tampering                                                communication

 Third hit on Google search




                                                       Not true for android.net.wifi.STATE_CHANGE
                               http://stackoverflow.com/questions/2676044/broadcast-intent-when-network-state-has-changend

 45   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Empirical Results: DEFCON ‘11

     Vulnerability Type                                                                                                                 % of apps with > 1

     1. Intent Hijacking                                                                                                                      50%

     2. Intent Spoofing                                                                                                                       40%

     3. Sticky Broadcast Tampering                                                                                                             6%

     4. Insecure Storage                                                                                                                      28%

     5. Insecure Communication                                                                                                                 N/A

     6. SQL Injection                                                                                                                         17%

     7. Promiscuous Privileges                                                                                                                31%



46   © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank You




© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Contenu connexe

Tendances

Sentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri
 
HP Open Stack Keynote 4 18_2012 final
HP Open Stack Keynote 4 18_2012 finalHP Open Stack Keynote 4 18_2012 final
HP Open Stack Keynote 4 18_2012 finallaurabeckcahoon
 
Intel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesIntel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesUmair Mohsin
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-actionMountaha
 
DDS in a Nutshell
DDS in a NutshellDDS in a Nutshell
DDS in a NutshellRick Warren
 
Cellution presentation july 2012
Cellution presentation july 2012Cellution presentation july 2012
Cellution presentation july 2012chuckserapilio
 
Sap Bi OnDemand Overview
Sap Bi OnDemand OverviewSap Bi OnDemand Overview
Sap Bi OnDemand OverviewJohnMeadows_SAP
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Novell
 
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...itnewsafrica
 
Real insights real_results-steve_robinson
Real insights real_results-steve_robinsonReal insights real_results-steve_robinson
Real insights real_results-steve_robinsonIBM
 
Overivew Of Microsoft Office 2010 For It Professionals
Overivew Of Microsoft Office 2010 For It ProfessionalsOverivew Of Microsoft Office 2010 For It Professionals
Overivew Of Microsoft Office 2010 For It Professionalswinwithneeraj
 
SAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemandSAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemandPierre Leroux
 
Dell Healthcare ISV EMEA Alliance Program
Dell Healthcare ISV EMEA Alliance ProgramDell Healthcare ISV EMEA Alliance Program
Dell Healthcare ISV EMEA Alliance ProgramEric Van 't Hoff
 
Frozen digit Company Profile
Frozen digit Company ProfileFrozen digit Company Profile
Frozen digit Company ProfileHardy Thomas
 
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...Vincent Kwon
 

Tendances (19)

Dragonsden 2012
Dragonsden 2012Dragonsden 2012
Dragonsden 2012
 
Sentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud WebinarSentri's Microsoft Cloud Webinar
Sentri's Microsoft Cloud Webinar
 
Enable flexible working
Enable flexible workingEnable flexible working
Enable flexible working
 
HP Open Stack Keynote 4 18_2012 final
HP Open Stack Keynote 4 18_2012 finalHP Open Stack Keynote 4 18_2012 final
HP Open Stack Keynote 4 18_2012 final
 
Intel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability IssuesIntel Social Computing & Sustainability Issues
Intel Social Computing & Sustainability Issues
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
 
DDS in a Nutshell
DDS in a NutshellDDS in a Nutshell
DDS in a Nutshell
 
Cellution presentation july 2012
Cellution presentation july 2012Cellution presentation july 2012
Cellution presentation july 2012
 
XEN App
XEN AppXEN App
XEN App
 
Sap Bi OnDemand Overview
Sap Bi OnDemand OverviewSap Bi OnDemand Overview
Sap Bi OnDemand Overview
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
 
L01 Introduction to Enterprise Software
L01 Introduction to Enterprise SoftwareL01 Introduction to Enterprise Software
L01 Introduction to Enterprise Software
 
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
BYOD: Built for business, designed for end users (Feb 27, 2013 Innovation Din...
 
Real insights real_results-steve_robinson
Real insights real_results-steve_robinsonReal insights real_results-steve_robinson
Real insights real_results-steve_robinson
 
Overivew Of Microsoft Office 2010 For It Professionals
Overivew Of Microsoft Office 2010 For It ProfessionalsOverivew Of Microsoft Office 2010 For It Professionals
Overivew Of Microsoft Office 2010 For It Professionals
 
SAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemandSAP BusinessObjects BI OnDemand
SAP BusinessObjects BI OnDemand
 
Dell Healthcare ISV EMEA Alliance Program
Dell Healthcare ISV EMEA Alliance ProgramDell Healthcare ISV EMEA Alliance Program
Dell Healthcare ISV EMEA Alliance Program
 
Frozen digit Company Profile
Frozen digit Company ProfileFrozen digit Company Profile
Frozen digit Company Profile
 
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
IBM Smart Business Desktop Cloud - How to optimise the ROI from your desktop ...
 

En vedette

Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Nagaraju Repala
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Mobile application in the marketplace research paper
Mobile application in the marketplace research paperMobile application in the marketplace research paper
Mobile application in the marketplace research paperBUEntrepreneurship
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Business Plan - Mobile Application Development
Business Plan - Mobile Application DevelopmentBusiness Plan - Mobile Application Development
Business Plan - Mobile Application DevelopmentSarabjeet Singh Dua
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 

En vedette (10)

Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Mobile application in the marketplace research paper
Mobile application in the marketplace research paperMobile application in the marketplace research paper
Mobile application in the marketplace research paper
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Business Plan - Mobile Application Development
Business Plan - Mobile Application DevelopmentBusiness Plan - Mobile Application Development
Business Plan - Mobile Application Development
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 

Similaire à Hp Fortify Mobile Application Security

Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012nerb13
 
IBM Rational Solution for mobile
IBM Rational Solution for mobileIBM Rational Solution for mobile
IBM Rational Solution for mobileEric Cattoir
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Hitachi Data Systems France
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
Insync 10 session jd edwards strategy and roadmap anz (a4) - final
Insync 10 session   jd edwards strategy and roadmap anz (a4) - finalInsync 10 session   jd edwards strategy and roadmap anz (a4) - final
Insync 10 session jd edwards strategy and roadmap anz (a4) - finalInSync Conference
 
E2 lennertdewaal
E2 lennertdewaalE2 lennertdewaal
E2 lennertdewaalStrategy
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes MobileConnected-Blog
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationYugan Sikri
 
ActuateOne for Utility Analytics
ActuateOne for Utility AnalyticsActuateOne for Utility Analytics
ActuateOne for Utility Analyticskatsoulis
 
APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteMasha Geller
 
AN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - KeynoteAN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - KeynoteAPPNATION
 
Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Ideaca
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
Ug apm - ca executive insight customer presentation v2.2 english
Ug  apm - ca executive insight customer presentation v2.2 englishUg  apm - ca executive insight customer presentation v2.2 english
Ug apm - ca executive insight customer presentation v2.2 englishCA Technologies Italia
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
The Big Five IT Mega Trends
The Big Five IT Mega TrendsThe Big Five IT Mega Trends
The Big Five IT Mega TrendsPaul Hofmann
 
IBM Worklight Slides
IBM Worklight SlidesIBM Worklight Slides
IBM Worklight SlidesJim Porter
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 

Similaire à Hp Fortify Mobile Application Security (20)

Mobile BI from SAP
Mobile BI from SAPMobile BI from SAP
Mobile BI from SAP
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
IBM Rational Solution for mobile
IBM Rational Solution for mobileIBM Rational Solution for mobile
IBM Rational Solution for mobile
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
Insync 10 session jd edwards strategy and roadmap anz (a4) - final
Insync 10 session   jd edwards strategy and roadmap anz (a4) - finalInsync 10 session   jd edwards strategy and roadmap anz (a4) - final
Insync 10 session jd edwards strategy and roadmap anz (a4) - final
 
E2 lennertdewaal
E2 lennertdewaalE2 lennertdewaal
E2 lennertdewaal
 
The Enterprise Goes Mobile
The Enterprise Goes MobileThe Enterprise Goes Mobile
The Enterprise Goes Mobile
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, Implementation
 
ActuateOne for Utility Analytics
ActuateOne for Utility AnalyticsActuateOne for Utility Analytics
ActuateOne for Utility Analytics
 
APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen Keynote
 
AN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - KeynoteAN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - Keynote
 
Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012Waterloo Ideaca Mobility Presentation: May 2012
Waterloo Ideaca Mobility Presentation: May 2012
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Ug apm - ca executive insight customer presentation v2.2 english
Ug  apm - ca executive insight customer presentation v2.2 englishUg  apm - ca executive insight customer presentation v2.2 english
Ug apm - ca executive insight customer presentation v2.2 english
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
The Big Five IT Mega Trends
The Big Five IT Mega TrendsThe Big Five IT Mega Trends
The Big Five IT Mega Trends
 
IBM Worklight Slides
IBM Worklight SlidesIBM Worklight Slides
IBM Worklight Slides
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 

Hp Fortify Mobile Application Security

  • 1. HP Fortify Mobile Application Security Name Title Enterprise Security © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. The motivation © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 3. Rise of the mobile machines 700,000 Q4: Inflection Point Smartphones + Tablets > PCs 600,000 Global Shipments (MM) 500,000 400,000 300,000 200,000 2005 2006 2007 2008 2009 2010 2011 2012E 2013E 100,000 Desktop PCs Notebook PCs Smartphones Tablets Source: Morgan Stanley Research 3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 4. The smartphones as pocket PCs 81% 77% 68% 48% Browsed the Used a Used Watch internet search engine an app videos Smartphone activities within past week (excluding calls) Desktop Pocket PCs Source: The Mobile Movement Study, Google, April 2011 4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 5. The Swiss army knife of computing Rolodex Game console Camera Television Calculator Laptop Email Book Internet GPS 5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 6. The evolution of the modern enterprise 1990s 2000s 2010s Webpage era Ecommerce era Mobile era 6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 7. Mobile represents a huge business opportunity Please select the most important benefit that your organization ultimately expects to gain from current or future mobile solutions deployments (whether or not you are currently receiving those benefits) Improve/enhance worker productivity Increased sales/revenue Improve field service response time Improve competitive advantage/market share Provide ease of information access Improve customer service Decreased costs Offer employees more flexibility Enhance portability within the office or work environment Eliminate paperwork Speed the sales process Provide perception of an advanced company to… 0 5 10 15 20 25 30 N = 600, Source: IDC’s mobile enterprise software survey, 2011 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 8. But security is a huge concern Which of the following technologies have resulted in an increase in IT security management spending at your organization within past 12 months? Mobility Virtualization Social Networking VoIP Unified Communications Green IT 0% 10% 20% 30% 40% 50% 60% 70% IDC Web Conference, 12 April 2012 Source: IDC Security as a Service Survey n-47 8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 9. A treasure trove of private information Your smartphone knows you better than you know yourself … and cyber attackers are • Pins & passwords after your personal records • Contacts • Call history • Messages • Social networking • Visited web sites • Mobile banking • Personal videos • Family photos $ • Documents 9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 10. Threats at all points Client Network Server • Insecure storage of • Insecure data transfer • Authentication credentials during installation or • Session Management • Improper use of execution of the • Cross-site Scripting configuration files application • SQL Injection • Use of insecure • Insecure transmission of data across the network. • Command Injection development libraries 10 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 11. Types of mobile threats Data Communication Exploitation and Malware Loss and Theft Direct Attacks Interception Misconduct Spyware, viruses, Data lost due to Eavesdropping on The inappropriate use Short message trojans, and worms misplaced or stolen communications, of a mobile device for service (SMS) and mobile devices including emails, texts, personal amusement browser exploits voice calls, etc., or monetary gain originating from or being sent to a mobile device 11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 12. The solution © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 13. What is mobile? Devices Connection Servers 13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 14. Same old client server model Client Network Server browser 14 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 15. Mobile application concerns Does it work? Does it perform? Is it secure? • Does the application function • Will the application perform for • Is the application securely as the business intends? all users? coded? • Are all features there and • Does it meet SLAs in • Has the application been working? production? assessed for known threats? 15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 16. What you need to be concerned about Know where you are using credentials Know what sensitive data is in play Track these through the device, network, and backend server Test all those components 16 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 17. HP Fortify mobile application security End to end mobile security: from the device, to the network to the backend Features: Benefits: server. Why it matters: • Secure the entire mobile • Ensure your Android and Apple iOS mobile devices • The mobile market is huge; global stack, from the mobile device to are always safe and secure mobile data traffic will increase 26-fold the server to the communications • Protect Android and iOS applications from between 2010 and 2015, and over 50% between the two advanced attacks by removing security of all Americans currently have a • Pinpoint with line of code precision vulnerabilities at the source, from software on the mobile phone (Arc Worldwide) the root cause of potential mobile device or backend server • Mobile applications are in their infancy vulnerabilities for any application • Increase development productivity by enabling in terms of security awareness developed for Apple iOS and security to be built into mobile applications, rather • Mobile payments will reach $240 Billion Google Android this year. Fraud becomes a concern if than added on after it is deployed into production • Complete static language support Mobile Security is not addressed • Spend valuable development resources and time for Objective C (any Apple mobile • In Q4 2011, iOS has 43% of the mobile innovating, instead of firefighting, troubleshooting, device, such as the iPhone or the market share, second to Android at iPad) and Java, the programming and fixing vulnerabilities 47% (NPD) language of Android 17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. Mobile product support Comprehensive mobile support • Four mobile platforms and operating systems • Mobile assessment services for the device, network and server • Mobile security research group to stay abreast of the latest mobile security threats 18 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 19. Mobile assessments Type What’s Included: Why Use Full • Server – All, Auto/Manual/Source Initial releases and (Hybrid Assessment) • Client – All, Auto/Manual/Source annual/periodic/compliance • Network – All, Auto/Manual assessments. Mini Hybrid • Client – Filesystem Analysis, no source code analysis, Minor releases. Supplemental to (1 Day Assessment) no malware analysis previous full assessment. • Network – Basic Traffic Analysis, no data obfuscation analysis • Server – Basic Automated Scan, no source code review, no logic testing, no advanced injection Malware Assessment Malware Only Assessment – Check for malicious code on Internal commercial applications client-side as well as for suspicious network traffic, e.g. developed by third-parties outside data transmitting to unknown hosts corporate control. E.g. Pandora, WSJ 19 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 20. Process integration Integrating security into your established SDLC process Security Foundations – Mobile Applications Architecture Plan Requirements Build Test Production & Design Mobile Security Application Specific Threat Modeling and Mobile Secure Mobile Application Security Assessment Development Analysis Coding Training (Static, Dynamic, Server, Network, Client) Standards Threat Modeling CBT for Developers Mobile Secure Mobile Firewall Mobile Application Coding Standards Security Process Wiki Mobile Risk Dictionary Design Static Analysis Mobile Security Policies 20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 21. Summary: mobile application security Comprehensive mobile application security solutions That proactively identifies and eliminates risk in any mobile 1 application, built for any platform or operating system: Apple iOS, Google Android, Microsoft Windows Phone and RIM Blackberry 2 To ensure that all mobile applications are trustworthy, in compliance with any security mandates and safe for consumers and enterprises to use Securing the whole mobile technology stack: from the user and device 3 to the network communications to the backend servers 4 Available on-premise or on-demand, and with professional services 21 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 22. 7 Ways to Hang Yourself with Android © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 23. Google Android Vulnerabilities 1 Intent hijacking 2 Intent spoofing 3 Sticky broadcast tampering 4 Insecure storage 5 Insecure network communication 6 SQL injection 7 Promiscuous privileges 23 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 24. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Malicious app intercepts an intent bound for another app, which can compromise data or alter behavior Cause: Implicit intents (do not require strong permissions to receive) Fix: Explicit intents and require special receiver permissions 24 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 25. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication IMDb App Showtime Handles Actions: Results UI Search willUpdateShowtimes, showtimesNoLocationError Implicit Intent Action: willUpdateShowtimes 25 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 26. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication 26 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 27. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication IMDb App Showtime Handles Actions: Results UI Search willUpdateShowtimes, showtimesNoLocationError Implicit Intent Action: willUpdateShowtimes Eavesdropping App Malicious Handles Actions: Receiver willUpdateShowtimes, showtimesNoLocationError 27 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 28. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Malicious app spoofs a legitimate intent, which can inject data or alter behavior Cause: Public components (necessary to receive implicit intents) Fix: Use explicit intents and receiver permissions Only perform sensitive operations in private components 28 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 29. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Spoofing App Results UI Action: showtimesNoLocationError IMDb App Showtime Results UI Handles Actions: Search willUpdateShowtimes, showtimesNoLocationError 29 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 30. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication 30 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 31. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Persistent intents used by legitimate apps can be accessed and removed by malicious apps Cause: BROADCAST_STICKY allows to full access to any sticky broadcasts Fix: Use explicit, non-sticky broadcasts protected by receiver permissions 31 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 32. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Sticky broadcasts Malicious App (intents): Requests SB BROADCAST_STIC 1 KY Permission SB 2 ? Victim App Receiver (expects SB2) SB 3 32 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 33. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Local storage is accessible to attackers, which can compromise sensitive data Cause: Local files are world-readable and persist Fix: SQLite or internal storage for private data Encrypt the data (keep keys off the SD) 33 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 34. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Kindle app saves e-books (.mbp and .prc) in a folder on the SD card • Depending on DRM, accessible to other apps • Saves covers of books (privacy violation) • Folder is retained after uninstall of app 34 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 35. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Data sent over unencrypted channels can be intercepted by attackers sniffing network Cause: Non-HTTPS WebView connections Fix: Ensure sensitive data only sent over encrypted channels 35 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 36. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Twitter: Tweets are sent in the clear https://freedom-to-tinker.com/blog/dwallach/things-overheard-wifi-my-android-smartphone 36 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 37. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Facebook: Despite ‘fully encrypted’ option on the Web, mobile app sends in the clear 37 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 38. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Allows malicious users to alter or view (query string injection) database records Cause: Untrusted data used to construct a SQL query or clause Fix: Parameterized queries 38 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 39. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication c = invoicesDB.query( Uri.parse(invoices), columns, "productCategory = '" + productCategory + "' and customerID = '" + customerID + "'", null, null, null, "'" + sortColumn + "'", null ); 39 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 40. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication productCategory = Fax Machines customerID = 12345678 sortColumn = price Select * from invoices where productCategory = ‘ Fax Machines' and customerID = '12345678' order by 'price' 40 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 41. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication productCategory = Fax Machines' or productCategory = " customerID = 12345678 sortColumn = " order by ‘price select * from invoices where productCategory = 'Fax Machines' or productCategory = “ ‘ and customerID = ‘ 12345678 ' order by ‘ " order by 'price' 41 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 42. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication c = invoicesDB.query( Uri.parse(invoices), columns, "productCategory = ? and customerID = ?", {productCategory, customerID}, null, null, "sortColumn = ?", sortColumn ); 42 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 43. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Description: Requesting unneeded permits privilege escalation attacks and desensitize users Cause: Deputies, Artifacts from testing, Confusion (inaccurate/incomplete resources) Fix: Identify unnecessary permissions 43 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 44. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication User App Camera App Does NOT need CAMERA Needs CAMERA permission permission Takes Wants Picture Picture Implicit Intent Handles Action: Action: IMAGE_CAPTURE IMAGE_CAPTURE 44 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 45. Google Android Vulnerabilities Sticky Insecure Insecure Promiscuous Intent hijacking Intent spoofing broadcast network SQL injection storage privileges tampering communication Third hit on Google search Not true for android.net.wifi.STATE_CHANGE http://stackoverflow.com/questions/2676044/broadcast-intent-when-network-state-has-changend 45 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 46. Empirical Results: DEFCON ‘11 Vulnerability Type % of apps with > 1 1. Intent Hijacking 50% 2. Intent Spoofing 40% 3. Sticky Broadcast Tampering 6% 4. Insecure Storage 28% 5. Insecure Communication N/A 6. SQL Injection 17% 7. Promiscuous Privileges 31% 46 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 47. Thank You © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Notes de l'éditeur

  1. Smartphones as pocket PCs and extend the desktop experienceThe desktop has migrated to the smartphone. Everyday desktop activities such as browsing, searching and consuming entertainment is now done on smartphones.Almost 70% use applications to extend their phone’s functionality
  2. Smartphones have become the go-to computing device for both productivity and entertainment alike.Smart phones have become a combination of a Rolodex, PDA, camera, photo album, wallet, game controller, pager, camcorder, television, barcode scanner, GPS device, PC, FM radio, MP3 player, newspaper, book, calculator … in addition to your communication device.
  3. It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an eCommerce presence: you had to offer an interactive and engaging customer experience (see Web 2.0).  Now the standard has shifted once again: in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them.
  4. Step one for addressing quality is focusing on application fundamentals. For every IT project, every new application rollout, application change or upgrade, you and your customer need to answer some basic questions: Will the application work in production? Will it scale and perform well under load? And will it be secure? To mitigate business risk, the answer to all three questions has to be “Yes.” HP quality, performance and security testing solutions make it easy to manage the quality management process from start to finish by providing the right tools to verify functionality from the end-user perspective, optimize performance by testing and diagnosing issues under emulated production loads and validate security.
  5. Mobile applications rely on all of these elements. We have a server a client device a full time internet connection a custom operating system as well as a local database. These elements comprise a mobile system. Some of them are similar to the challenges of the past and some of them present new challenges unique to mobile
  6. The client server model is nothing new. Mobile apps are an extension of RIA applications, in general we are dealing with highly customized UI’s for input of data. The general attack surface of this model is the same as always, the server. The server is likely a legacy web application that surfaced new APIs or used existing APIs to serve the new client. There is nothing fundamentally different about this
  7. Step one for addressing quality is focusing on application fundamentals. For every IT project, every new application rollout, application change or upgrade, you and your customer need to answer some basic questions: Will the application work in production? Will it scale and perform well under load? And will it be secure? To mitigate business risk, the answer to all three questions has to be “Yes.” HP quality, performance and security testing solutions make it easy to manage the quality management process from start to finish by providing the right tools to verify functionality from the end-user perspective, optimize performance by testing and diagnosing issues under emulated production loads and validate security.
  8. I’ll talk about the first 4 vulnerabilities: 3 Communications related vulns. And Insecure storageAnd Katrina will discuss insecure network communication, SQL injection, and overprivileged apps
  9. Let’s take the IMDb app for example. This app has a feature where the user can get the showtimes for movies in the area. To do this, the app has a component, Showtime Search, that sends information and requests to the component, Results UI, which then updates the user’s screen. <click> The display will either update with the latest showtimes or return that there are no shows available.
  10. This is an example of what the user might see when the message is sent. The user sees a list of the movie showtimes in the area.
  11. The problem is that the IMDb is sending an Implicit intent to be resolved by the system - which means it can potentially be seen by any application. All a malicious app needs to do is declare that it can handle the same action as the Intent and it may receive the Intent.In the case of the IMDb app, the attacker can find that the user is 1) using the IMDb app and 2) looking for showtimes. If the Intent contains any additional data, the attacker can also steal that.Sidenote: Another example is a bus application that gives the user information on where the bus is and when it will arrive. In that app, an attacker can eavesdrop on the bus request and determine the user’s location. This is a clear privacy violation.
  12. This attack exploits a vulnerability on the receiving side. The problem is that the developer is publically exposing the receiving component. To be able to receive the implicit Intent, the receiver component is also made public to all applications. This means that any application can send messages to the component either explicitly or implicitly. And thus it is vulnerable to an intent spoofing attack.In the IMDb example, a malicious app could inject an Intent into the results UI by sending an implicit or explicit Intent. If the malicious application sends the NoLocationError action, the receiver would report that no showtimes were found.
  13. Instead of seeing a display like the one on the left (the showtimes of movies in the error), the user would see no information (on the right), resulting in a denial of service.Bus app: Going back to the bus application, an attacker can inject fake bus information into a vulnerable bus component, potentially making the user wait for a bus that never arrives.
  14. Like the typical unauthorized intent receipt problem- malicious receipt could leak sensitive databut special in two ways Can be sent to all receivers -> can’t be limited by permissions -> accessible to any receiver, including malicious receivers Persists. And is expected to persist, but can be removed by malicious app
  15. Like the typical unauthorized intent receipt problem- malicious receipt could leak sensitive databut special in two ways Can be sent to all receivers -> can’t be limited by permissions -> accessible to any receiver, including malicious receivers Persists. And is expected to persist, but can be removed by malicious app
  16. 3. Even if new owner (or old owner) does a factory reset, it does not wipe the SC card.
  17. Using wireshark, we sniffed http packets coming from the phone. We can see text and location in this example. BAD.
  18. Using wireshark, we sniffed http packets coming from the phone. We can see text and location in this example. BAD.
  19. Especially alarming because in a regular web app you can set a preference to use https, but in mobile app, you can’t.
  20. Warning: SQL Lite methods vulnerable to full SQL injection include delete, execSQL, rawQuery, update, updateWithNoConflict
  21. They may request a permission that sounds relevant to what they are doing. (When registering for an “android.net.wifi.STATE_CHANGE” Intent, they may unnecessarily request the ACCESS_WIFI_STATE permission. Will have an example later.)They may leave a permission in for testing and forget to delete it. (Or change the design to no longer require that permission and forget to delete it)They may confuse using a protected service with invoking another application to use that service (example later)Due to lack of specificity in Android documentation, some turn to message codes or code snippets. Unfortunately, we have seen some of these incorrectly assert that a permission is required.In a class with getters and setters, it may be that only the setters need permissions. However, we have seen developers add permission when only using the getters.
  22. An application sends an Intent to the Camera application asking it to take a pictureA developer may mistakenly add the “android.permission.CAMERA” permissionIt is the Camera application that this permission not the calling applicationIn this exampleApp1 is sending an Intent to ask the Camera app to take a picture. It is the camera application that needs the permission, not App1.