SlideShare une entreprise Scribd logo
1  sur  53
200:1 - Do You Trust Your 
Mobile Security Odds? 
Jeff Forristal / CTO
Secure: 
Statement of current security posture 
Trustable: 
Holistic statement of intent; forward-looking 
& comprehensive
Secure 
Insecure 
Time 
0day / Vulnerability found 
Vendor pushes a patch 
Vendor support EOL
You trust a system 
will achieve & maintain 
your security needs
Remember these vulnerabilities? 
s λ 
goto fail; 
goto fail; 
Heartbleed 
Fake ID 
iOS jailbreaks 
Pangu 
TowelRoot 
Points in time where we know our mobile devices were insecure…
2014 Vulnerabilities Reported for iOS & Android 
168 
78 – Webkit/UIWebview 
4 – SSL 
5 – Kernel code exec 
10 – System code exec 
62 
38 – Lollipop changelog 
~ 16 are unconfirmed 
5 – Kernel code exec 
3 – Bootloader code exec 
~ 7 – System code exec 
3 – SSL 
20 – Chrome/webview 
Circa Nov 2014; Data from Apple security advisories IOS 7.0.6, 7.1, 7.1.1, 7.1.2, 8, 8.1; Android collected from multiple sources
What / who are 
we trusting? 
(and are they making good security choices on our behalf?)
With so many devices, how do you know which meets your risk 
management needs? 
Listen to the webinar recording: 
http://bit.ly/1xvjzlc 
Data from Google Play 11/11/2014 for API 10+; Apple developer portal
Over 7,200 active Android devices http://bit.ly/1xvjzlc 
running across the eco-system! 
42 
Listen to the webinar recording: 
Data from Google Play 11/11/2014 for API 10+; Apple developer portal
Who are the main third-parties we choose to put in our mobile circle of trust? 
Hardware Manufacturers Operating Systems Device Manufacturers Carriers
The effectiveness of mobile risk 
management is largely dependent on 
lottery results … 
Listen to the webinar recording: 
http://bit.ly/1xvjzlc
Case Study: Samsung Note3 on AT&T
Samsung Note3 on AT&T: Third-parties included in the “circle of trust” 
Listen to the webinar recording: 
http://bit.ly/1xvjzlc
Device specific apps that are uniquely installed based on the carrier 
…
Samsung Note3 comes with … 
312 
45 
151 
apps pre-installed 
are non-Samsung (3rd party) 
pre-installed roots of trust
54 
86 
1 
apps have system-level privileges 
apps have “dangerous” permissions 
hard-coded open wifi profile 
and…
Blackphone– how secure is it really? 
54 
86 
1 
apps have system-level privileges 
hard-coded open wifi profile
Samsung Note3: Inherent Circle of Trust
Circle of trust grows with third parties: over 200 entities driving & effecting our 
security and data on the device
Certificate authorities with Government/State 
interest: pre-installed on Android
Pre-installed root certificates for 
academic research: pre-installed on 
Android
Pre-installed root certificates on iOS 8 
…
iOS 8 includes… 
236 
pre-installed roots of trust 
(and no way to disable any of them)
Questioning the 
Chain of Trust 
Download whitepaper here: 
https://bluebox.com/blog/technical/
It’s not just about the device … 
don’t forget about the apps 
122 
shared libraries 
on apps
libremotedesktop_client.so 
122 
shared libraries 
on apps
189 
dylibs (including Swift) 
Internal testing on IOS 8.1 iPod Touch, using hybrid Swift app 
iOS 8 also includes…
“Attack 
Surface”
What version is your device 
running on?
Analysis of Samsung Note3 Patch Updates by Major Carriers 
4.4.4 
Google 4.4.2 4.4.3, 4.4.4 
4.3 4.3 4.3 4.3 4.4.2 4.4.2 4.4.2 4.4.2 
Sep Nov 2014 Mar May Jul Sep 
AT&T 
Sprint 
Verizon 
T-Mobile 
US 
Cellular 
2013 
4.3 
4.3 
4.3 4.3 
4.3 
4.3 
4.4.2 4.4.2 
4.3 4.4.2 
4.4.2 4.4.2 4.4.2 4.4.2 4.4.2 
4.4.2 
4.3 
4.4.4 
4.4.2 
4.4.2 
4.4.2 
Int’l/UK et al. 4.4.2 
Data from sammobile.com, for SM-N900A/SM-N900P/SM-N900R4/SM-N900T/SM-N900V/SM-N9005, circa Oct 1 2014
So… are we really making 
the best trust 
choices?
With so many choices, how do 
we pick the most trustable 
device?
Can we measure something 
as a basis for trust?
Quantify the trust of a device with “Trustable 
by Bluebox” for Android
How users affect security and trust scores (you can improve!): Motorola example 
Motorola out of the box Motorola w/ proactive security
Trustable by 
Bluebox 
Methodology and details available 
as downloadable whitepaper 
https://bluebox.com/trustable-by-bluebox/
Samsung Note3 Trust Score
Call to Action: Mobile Risk Management
Recognize the realities 
(shortcomings) of 
mobile security
Secure 
Vulnerable 
Secure 
Vulnerable 
Industry-wide security vulnerabilities 
Secure 
Vulnerable 
Vendor patching variables with industry-wide security vulnerabilities… 
some devices live in a mostly in-secure state!
Bluebox Labs Research - 
How long it took vendors to 
patch Master Key and Fake 
ID vulnerabilities: 
~3 attempts and 9 months 
to patch all vulnerabilities! 
Data from Bluebox Security Scanner, since public release; 250k installs 
MK = Master Key
2013 Sep Nov 2014 Mar May Jul Sep 
iOS Releases 
7.0 7.0.3 7.0.4 7.0.6 7.1 7.1.1 7.1.2 8.0 8.1 
evasi0n7 
7.1 jailbreak 
reports 
Pangu (IOS7) 
Nov 
Pangu8 
Secure 
Vulnerable 
iOS Jailbreaks
A note about 
rooting/jailbreaking…
1. Exploit one or more vulnerabilities to escape the security 
model & execute code in a system-privileged state 
2. Make one or more modifications to the system to 
generically persist control of the system-privileged state 
3. Install user-convenience standard jailbreak utilities 
(Substrate, Cydia, SuperSU, etc.)
Manage risk in 
a hostile environment
Device security guides 
https://bluebox.com/android-user-security-guide/ 
https://bluebox.com/ios-user-security-guide/
Device specific security 
posture analysis is necessary for 
Android 
OS version (4.4.2 vs 4.4.3 vs. 4.4.4) may not be relevant 
Example: Android Fake ID patch back-ported to 4.1.x, 4.2.x, 
4.3.x, 4.4.x and released to ODMs 
Example 2: Linux kernel futex vulnerability patched by ODMs 
without changing the Android version
Go beyond traditional 
rooting/jailbreak detection 
System-level (non-root) compromises are still game-over 
Malware can favor non-persistent roots/breaks
Consider the total circle of 
trust 
Trojan keyboards, trojan VPN clients, untrusted system CA 
certs, accessibility agents, untrusted app extensions can 
undermine device & app security operations
Look inwards into the app’s 
sandbox 
App anti-tampering & fortification to survive a 
vulnerable/hostile device environment 
Not just data-at-rest, etc.  process space integrity 
Keep apps & their transactions secure during the inevitable 
periods of device insecurity
& App 
Device 
Integrity
jeff@bluebox.com 
Questions? 
https://bluebox.com/trustable-by-bluebox/ 
https://bluebox.com/blog/ 
https://bluebox.com/ios-user-security-guide/ 
https://bluebox.com/android-user-security-guide/ 
https://play.google.com/store/apps/details?id=com.bluebox.trust

Contenu connexe

Tendances

Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systemsBirju Tank
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...Consulthinkspa
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00srini0x00
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaYogesh Ojha
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and OPietro F. Maggi
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
Android Hacking
Android HackingAndroid Hacking
Android Hackingantitree
 
My Null Android Penetration Session
My Null  Android Penetration Session My Null  Android Penetration Session
My Null Android Penetration Session Avinash Sinha
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013drewz lin
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Anant Shrivastava
 

Tendances (20)

Android system security
Android system securityAndroid system security
Android system security
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and O
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
My Null Android Penetration Session
My Null  Android Penetration Session My Null  Android Penetration Session
My Null Android Penetration Session
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8
 
Android rooting
Android rooting Android rooting
Android rooting
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
 

En vedette

BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...
BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...
BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...Jurie Schoeman
 
Incremental Innovation by Jan Fransen
Incremental Innovation by Jan FransenIncremental Innovation by Jan Fransen
Incremental Innovation by Jan Fransenppibelanda
 
Business Set-up and Structuring Workshop
Business Set-up  and Structuring WorkshopBusiness Set-up  and Structuring Workshop
Business Set-up and Structuring WorkshopChris Gray
 
Value creation through technological spin outs
Value creation through technological spin outsValue creation through technological spin outs
Value creation through technological spin outsAlain Meller
 
Transfer the risk what is the best
Transfer the risk what is the bestTransfer the risk what is the best
Transfer the risk what is the bestFERMA
 
The Age of Opportunity: The New Era of Innovation for Business, Technology, a...
The Age of Opportunity: The New Era of Innovation for Business, Technology, a...The Age of Opportunity: The New Era of Innovation for Business, Technology, a...
The Age of Opportunity: The New Era of Innovation for Business, Technology, a...Frank W. Spencer IV
 
Innovation Opportunity_PGS
Innovation Opportunity_PGSInnovation Opportunity_PGS
Innovation Opportunity_PGSAdam Thorsfeldt
 
Thailand Innovation System Talk KK 2016-12-15
Thailand Innovation System Talk KK 2016-12-15Thailand Innovation System Talk KK 2016-12-15
Thailand Innovation System Talk KK 2016-12-15Pun-Arj Chairatana
 
Inspiring Route - Startup & The New Entrepreneurs
Inspiring Route - Startup & The New EntrepreneursInspiring Route - Startup & The New Entrepreneurs
Inspiring Route - Startup & The New EntrepreneursMarket Revolution
 
Samsung halts note 7 production
Samsung halts note 7 productionSamsung halts note 7 production
Samsung halts note 7 productionKetan Deshmukh
 
Android Vulnerability: Fake ID
Android Vulnerability: Fake ID Android Vulnerability: Fake ID
Android Vulnerability: Fake ID Blueboxer2014
 
New_Product_Development_Process, A_seminar_by_Mohan_Kumar_G
New_Product_Development_Process, A_seminar_by_Mohan_Kumar_GNew_Product_Development_Process, A_seminar_by_Mohan_Kumar_G
New_Product_Development_Process, A_seminar_by_Mohan_Kumar_GMohan Kumar G
 
Spins on Corporate Venture Capital
Spins on Corporate Venture CapitalSpins on Corporate Venture Capital
Spins on Corporate Venture CapitalNew York University
 
Omni-Channel (R)etail Evolution
Omni-Channel (R)etail EvolutionOmni-Channel (R)etail Evolution
Omni-Channel (R)etail EvolutionArchana Nilaver
 
AIMIA Innovation Case Study 2Vouch
AIMIA Innovation Case Study 2VouchAIMIA Innovation Case Study 2Vouch
AIMIA Innovation Case Study 2Vouch2vouch
 
Innovation & Opportunity
Innovation & OpportunityInnovation & Opportunity
Innovation & OpportunityNur Agustinus
 
entrepreneurship and small business management unit iv
entrepreneurship and small business management unit iventrepreneurship and small business management unit iv
entrepreneurship and small business management unit ivPENDYSINGH
 

En vedette (19)

BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...
BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...
BSG: A case study in Innovation. Presented by Jurie Schoeman at the TCI Futur...
 
Incremental Innovation by Jan Fransen
Incremental Innovation by Jan FransenIncremental Innovation by Jan Fransen
Incremental Innovation by Jan Fransen
 
Business Set-up and Structuring Workshop
Business Set-up  and Structuring WorkshopBusiness Set-up  and Structuring Workshop
Business Set-up and Structuring Workshop
 
Value creation through technological spin outs
Value creation through technological spin outsValue creation through technological spin outs
Value creation through technological spin outs
 
Transfer the risk what is the best
Transfer the risk what is the bestTransfer the risk what is the best
Transfer the risk what is the best
 
New set up services
New set up servicesNew set up services
New set up services
 
The Age of Opportunity: The New Era of Innovation for Business, Technology, a...
The Age of Opportunity: The New Era of Innovation for Business, Technology, a...The Age of Opportunity: The New Era of Innovation for Business, Technology, a...
The Age of Opportunity: The New Era of Innovation for Business, Technology, a...
 
Innovation Opportunity_PGS
Innovation Opportunity_PGSInnovation Opportunity_PGS
Innovation Opportunity_PGS
 
Guidelines
GuidelinesGuidelines
Guidelines
 
Thailand Innovation System Talk KK 2016-12-15
Thailand Innovation System Talk KK 2016-12-15Thailand Innovation System Talk KK 2016-12-15
Thailand Innovation System Talk KK 2016-12-15
 
Inspiring Route - Startup & The New Entrepreneurs
Inspiring Route - Startup & The New EntrepreneursInspiring Route - Startup & The New Entrepreneurs
Inspiring Route - Startup & The New Entrepreneurs
 
Samsung halts note 7 production
Samsung halts note 7 productionSamsung halts note 7 production
Samsung halts note 7 production
 
Android Vulnerability: Fake ID
Android Vulnerability: Fake ID Android Vulnerability: Fake ID
Android Vulnerability: Fake ID
 
New_Product_Development_Process, A_seminar_by_Mohan_Kumar_G
New_Product_Development_Process, A_seminar_by_Mohan_Kumar_GNew_Product_Development_Process, A_seminar_by_Mohan_Kumar_G
New_Product_Development_Process, A_seminar_by_Mohan_Kumar_G
 
Spins on Corporate Venture Capital
Spins on Corporate Venture CapitalSpins on Corporate Venture Capital
Spins on Corporate Venture Capital
 
Omni-Channel (R)etail Evolution
Omni-Channel (R)etail EvolutionOmni-Channel (R)etail Evolution
Omni-Channel (R)etail Evolution
 
AIMIA Innovation Case Study 2Vouch
AIMIA Innovation Case Study 2VouchAIMIA Innovation Case Study 2Vouch
AIMIA Innovation Case Study 2Vouch
 
Innovation & Opportunity
Innovation & OpportunityInnovation & Opportunity
Innovation & Opportunity
 
entrepreneurship and small business management unit iv
entrepreneurship and small business management unit iventrepreneurship and small business management unit iv
entrepreneurship and small business management unit iv
 

Similaire à 200:1 - Do You Trust Your Mobile Security Odds?

Android security - an enterprise perspective
Android security -  an enterprise perspectiveAndroid security -  an enterprise perspective
Android security - an enterprise perspectivePietro F. Maggi
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelledlosalamos
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - armchiportal
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersITExamAnswers.net
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSalesforce Developers
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsshehab najjar
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]RootedCON
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systemsDivya Raval
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutmentoresd
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And SecurityJames Wernicke
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetBrent Muir
 

Similaire à 200:1 - Do You Trust Your Mobile Security Odds? (20)

Android security - an enterprise perspective
Android security -  an enterprise perspectiveAndroid security -  an enterprise perspective
Android security - an enterprise perspective
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applications
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Information security questions
Information security questions Information security questions
Information security questions
 
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
Raul Siles - iOS: Regreso al futuro [Rooted CON 2014]
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Mobile security
Mobile securityMobile security
Mobile security
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 

Dernier

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 

Dernier (8)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 

200:1 - Do You Trust Your Mobile Security Odds?

  • 1. 200:1 - Do You Trust Your Mobile Security Odds? Jeff Forristal / CTO
  • 2.
  • 3. Secure: Statement of current security posture Trustable: Holistic statement of intent; forward-looking & comprehensive
  • 4. Secure Insecure Time 0day / Vulnerability found Vendor pushes a patch Vendor support EOL
  • 5. You trust a system will achieve & maintain your security needs
  • 6. Remember these vulnerabilities? s λ goto fail; goto fail; Heartbleed Fake ID iOS jailbreaks Pangu TowelRoot Points in time where we know our mobile devices were insecure…
  • 7. 2014 Vulnerabilities Reported for iOS & Android 168 78 – Webkit/UIWebview 4 – SSL 5 – Kernel code exec 10 – System code exec 62 38 – Lollipop changelog ~ 16 are unconfirmed 5 – Kernel code exec 3 – Bootloader code exec ~ 7 – System code exec 3 – SSL 20 – Chrome/webview Circa Nov 2014; Data from Apple security advisories IOS 7.0.6, 7.1, 7.1.1, 7.1.2, 8, 8.1; Android collected from multiple sources
  • 8. What / who are we trusting? (and are they making good security choices on our behalf?)
  • 9. With so many devices, how do you know which meets your risk management needs? Listen to the webinar recording: http://bit.ly/1xvjzlc Data from Google Play 11/11/2014 for API 10+; Apple developer portal
  • 10. Over 7,200 active Android devices http://bit.ly/1xvjzlc running across the eco-system! 42 Listen to the webinar recording: Data from Google Play 11/11/2014 for API 10+; Apple developer portal
  • 11. Who are the main third-parties we choose to put in our mobile circle of trust? Hardware Manufacturers Operating Systems Device Manufacturers Carriers
  • 12. The effectiveness of mobile risk management is largely dependent on lottery results … Listen to the webinar recording: http://bit.ly/1xvjzlc
  • 13. Case Study: Samsung Note3 on AT&T
  • 14. Samsung Note3 on AT&T: Third-parties included in the “circle of trust” Listen to the webinar recording: http://bit.ly/1xvjzlc
  • 15. Device specific apps that are uniquely installed based on the carrier …
  • 16. Samsung Note3 comes with … 312 45 151 apps pre-installed are non-Samsung (3rd party) pre-installed roots of trust
  • 17. 54 86 1 apps have system-level privileges apps have “dangerous” permissions hard-coded open wifi profile and…
  • 18. Blackphone– how secure is it really? 54 86 1 apps have system-level privileges hard-coded open wifi profile
  • 19. Samsung Note3: Inherent Circle of Trust
  • 20. Circle of trust grows with third parties: over 200 entities driving & effecting our security and data on the device
  • 21. Certificate authorities with Government/State interest: pre-installed on Android
  • 22. Pre-installed root certificates for academic research: pre-installed on Android
  • 24. iOS 8 includes… 236 pre-installed roots of trust (and no way to disable any of them)
  • 25. Questioning the Chain of Trust Download whitepaper here: https://bluebox.com/blog/technical/
  • 26. It’s not just about the device … don’t forget about the apps 122 shared libraries on apps
  • 28. 189 dylibs (including Swift) Internal testing on IOS 8.1 iPod Touch, using hybrid Swift app iOS 8 also includes…
  • 30. What version is your device running on?
  • 31. Analysis of Samsung Note3 Patch Updates by Major Carriers 4.4.4 Google 4.4.2 4.4.3, 4.4.4 4.3 4.3 4.3 4.3 4.4.2 4.4.2 4.4.2 4.4.2 Sep Nov 2014 Mar May Jul Sep AT&T Sprint Verizon T-Mobile US Cellular 2013 4.3 4.3 4.3 4.3 4.3 4.3 4.4.2 4.4.2 4.3 4.4.2 4.4.2 4.4.2 4.4.2 4.4.2 4.4.2 4.4.2 4.3 4.4.4 4.4.2 4.4.2 4.4.2 Int’l/UK et al. 4.4.2 Data from sammobile.com, for SM-N900A/SM-N900P/SM-N900R4/SM-N900T/SM-N900V/SM-N9005, circa Oct 1 2014
  • 32. So… are we really making the best trust choices?
  • 33. With so many choices, how do we pick the most trustable device?
  • 34. Can we measure something as a basis for trust?
  • 35. Quantify the trust of a device with “Trustable by Bluebox” for Android
  • 36. How users affect security and trust scores (you can improve!): Motorola example Motorola out of the box Motorola w/ proactive security
  • 37. Trustable by Bluebox Methodology and details available as downloadable whitepaper https://bluebox.com/trustable-by-bluebox/
  • 39. Call to Action: Mobile Risk Management
  • 40. Recognize the realities (shortcomings) of mobile security
  • 41. Secure Vulnerable Secure Vulnerable Industry-wide security vulnerabilities Secure Vulnerable Vendor patching variables with industry-wide security vulnerabilities… some devices live in a mostly in-secure state!
  • 42. Bluebox Labs Research - How long it took vendors to patch Master Key and Fake ID vulnerabilities: ~3 attempts and 9 months to patch all vulnerabilities! Data from Bluebox Security Scanner, since public release; 250k installs MK = Master Key
  • 43. 2013 Sep Nov 2014 Mar May Jul Sep iOS Releases 7.0 7.0.3 7.0.4 7.0.6 7.1 7.1.1 7.1.2 8.0 8.1 evasi0n7 7.1 jailbreak reports Pangu (IOS7) Nov Pangu8 Secure Vulnerable iOS Jailbreaks
  • 44. A note about rooting/jailbreaking…
  • 45. 1. Exploit one or more vulnerabilities to escape the security model & execute code in a system-privileged state 2. Make one or more modifications to the system to generically persist control of the system-privileged state 3. Install user-convenience standard jailbreak utilities (Substrate, Cydia, SuperSU, etc.)
  • 46. Manage risk in a hostile environment
  • 47. Device security guides https://bluebox.com/android-user-security-guide/ https://bluebox.com/ios-user-security-guide/
  • 48. Device specific security posture analysis is necessary for Android OS version (4.4.2 vs 4.4.3 vs. 4.4.4) may not be relevant Example: Android Fake ID patch back-ported to 4.1.x, 4.2.x, 4.3.x, 4.4.x and released to ODMs Example 2: Linux kernel futex vulnerability patched by ODMs without changing the Android version
  • 49. Go beyond traditional rooting/jailbreak detection System-level (non-root) compromises are still game-over Malware can favor non-persistent roots/breaks
  • 50. Consider the total circle of trust Trojan keyboards, trojan VPN clients, untrusted system CA certs, accessibility agents, untrusted app extensions can undermine device & app security operations
  • 51. Look inwards into the app’s sandbox App anti-tampering & fortification to survive a vulnerable/hostile device environment Not just data-at-rest, etc.  process space integrity Keep apps & their transactions secure during the inevitable periods of device insecurity
  • 52. & App Device Integrity
  • 53. jeff@bluebox.com Questions? https://bluebox.com/trustable-by-bluebox/ https://bluebox.com/blog/ https://bluebox.com/ios-user-security-guide/ https://bluebox.com/android-user-security-guide/ https://play.google.com/store/apps/details?id=com.bluebox.trust

Notes de l'éditeur

  1. It’s secure, until the next 0day surfaces – very point in time. Trustable is a more holistic concept that incorporates what it was, is, and will be, irrespective of any point in time insecurity faults. Since risk management programs look at risk over periods of time, the notion of trust is more appropriate to how we actually manage risk, rather than security.
  2. Did you throw away your devices because they were secure?
  3. Not all trusts are equal…
  4. Not all trusts are equal…
  5. So what winds up happening is the effectiveness of your mobile risk management strategy is largely dependent upon lottery results
  6. An interesting failure in security & trust….
  7. Note3 patch timelines, for US carriers (and an international model representation); data from SamMobile
  8. MotoG; stock, then user changes to proactively have better security
  9. An interesting failure in security & trust….
  10. Note3 patch timelines, for US carriers (and an international model representation); data from SamMobile