SlideShare une entreprise Scribd logo
1  sur  11
iOS Team
Yu Wang( Tommy )
Kunlakan (Jeen) Cherdchusilp
Introduction
Unauthorized cross-origin
DDoS
Origin Crossing
Intent
Web-accessing class
URL scheme
“youtube://watch?toke
n=xxx”
Solution
Morbs - origin based protection mechanism
Labels every message with its origin
Customize specific security policy
Security Techniques for MHS
What’s the major problem?
SEC
Major problem in healthcare:
Lack of ability from patient/physician for frequent health
monitoring
Smartphone and PDAs:
Overcome such a barrier due to its functionality
Strong impact on:
typical remote monitoring system
healthcare alerting system
clinical and administrative data collection
patient records maintain
Mobile Health Application
Development Limitation
1. Small Screen
2. Limited Storage Space & Slow Processing
3. Security Limitation
4. Inadequate Third Party Application Support
Without Jailbreak
1. Using AFC Protocol to
Retrieve Data Stored on
the Device
2. Retrieving Data From
Backups
With Jailbreak
1. Retrieving User
Password & Keychain
Content
2. Retrieving the 0x835
Key
Practical iOS Attacks
Defending iOS Application
Checking for Jailbreak:
Check for jailbreak files such as
“/Application/Cydia.app”,
“/bin/apt/”, “/usr/sbin/sshd/”…
Checking for shell which comes with
jailbreak. calling system(0)
nonzero → shell is available.
zero → shell is not available
Defending Technique:
1. Anti-Analysis 1
Use anti-debugging feature
2. Anti-Analysis 2
Silently wipe all confidential data
and encryption keys.
Future Work
Collaboration with school of IAS
Stress Evaluation App in summer

Contenu connexe

Tendances

Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating SystemMeghaj Mallick
 
Safeguarding Your Data
Safeguarding Your DataSafeguarding Your Data
Safeguarding Your Datatgturner05
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security ITSTEFFI_MEDINA
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand securityarun nalam
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18Philip_
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 

Tendances (19)

Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Data Protection
Data ProtectionData Protection
Data Protection
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
System security
System securitySystem security
System security
 
Computer securety
Computer securetyComputer securety
Computer securety
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
operating system
operating systemoperating system
operating system
 
Safeguarding Your Data
Safeguarding Your DataSafeguarding Your Data
Safeguarding Your Data
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Windows XP is going away
Windows XP is going awayWindows XP is going away
Windows XP is going away
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 
Slides
SlidesSlides
Slides
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 
Code protection
Code protectionCode protection
Code protection
 
Worm
WormWorm
Worm
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 

En vedette (6)

GrupoInvestigación
GrupoInvestigaciónGrupoInvestigación
GrupoInvestigación
 
Research group presentation model
Research group presentation model Research group presentation model
Research group presentation model
 
AudíGaudí
AudíGaudíAudíGaudí
AudíGaudí
 
POSTER
POSTERPOSTER
POSTER
 
GSI Research Group Presentation
GSI Research Group PresentationGSI Research Group Presentation
GSI Research Group Presentation
 
Presentation-1
Presentation-1Presentation-1
Presentation-1
 

Similaire à Research Group Presentation

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 
protection in general-purpose_OS.ppt
protection in general-purpose_OS.pptprotection in general-purpose_OS.ppt
protection in general-purpose_OS.pptMariam749277
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervChapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervEstelaJeffery653
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesJavier González
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxbagotjesusa
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 

Similaire à Research Group Presentation (20)

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Protection and security
Protection and securityProtection and security
Protection and security
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
protection in general-purpose_OS.ppt
protection in general-purpose_OS.pptprotection in general-purpose_OS.ppt
protection in general-purpose_OS.ppt
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervChapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Notacd02
Notacd02Notacd02
Notacd02
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Notacd02
Notacd02Notacd02
Notacd02
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 

Research Group Presentation

  • 1. iOS Team Yu Wang( Tommy ) Kunlakan (Jeen) Cherdchusilp
  • 3. Origin Crossing Intent Web-accessing class URL scheme “youtube://watch?toke n=xxx”
  • 4. Solution Morbs - origin based protection mechanism Labels every message with its origin Customize specific security policy
  • 5. Security Techniques for MHS What’s the major problem?
  • 6. SEC
  • 7. Major problem in healthcare: Lack of ability from patient/physician for frequent health monitoring Smartphone and PDAs: Overcome such a barrier due to its functionality Strong impact on: typical remote monitoring system healthcare alerting system clinical and administrative data collection patient records maintain
  • 8. Mobile Health Application Development Limitation 1. Small Screen 2. Limited Storage Space & Slow Processing 3. Security Limitation 4. Inadequate Third Party Application Support
  • 9. Without Jailbreak 1. Using AFC Protocol to Retrieve Data Stored on the Device 2. Retrieving Data From Backups With Jailbreak 1. Retrieving User Password & Keychain Content 2. Retrieving the 0x835 Key Practical iOS Attacks
  • 10. Defending iOS Application Checking for Jailbreak: Check for jailbreak files such as “/Application/Cydia.app”, “/bin/apt/”, “/usr/sbin/sshd/”… Checking for shell which comes with jailbreak. calling system(0) nonzero → shell is available. zero → shell is not available Defending Technique: 1. Anti-Analysis 1 Use anti-debugging feature 2. Anti-Analysis 2 Silently wipe all confidential data and encryption keys.
  • 11. Future Work Collaboration with school of IAS Stress Evaluation App in summer

Notes de l'éditeur

  1. focusing on not only construction and development of ios application on health perspective, but also trying to introduce our own security mechanism into our research project. In order to achieve this goal and gain this domain-specific knowledge, our group have kept researching in this quarter by reviewing published papers to broaden our overall insight on this specific topic. me: security problem on mobile computing and the solutions Jeen: why we need to use mobile devices in health service; some of practical attacks and the mitigations
  2. in papers i have reviewed, researchers discovered security problems, two of them
  3. unlike the traditional web browser, today’s mobile os do not have a comparable security mechanism such as SOP, which prevents the the resource of one domain directly accessing the resource from different domain, as a result, those resource could be exposed to the harms from a malicious origin on the mobile device. three ways to communicate intent: it’s an inter-process msg delivered through an IPC, only available on android provided several utility class for apps to communicate with the web scheme allows an app or web service to use a URL to invoke another app on ios, when such a call is invoked, the os will launch the target app with this URL as input example: health care provider’s device, app launched by an URL from malicious origin to overdose to a patient.
  4. so that the devs could build protections based on such information like devs could specify their intentions such as creating the form of whitelist of origins can get msg from and send the msg to
  5. DDos as one of major threats in current internet and the challenges when it comes to dealing with the attacks on mobile device because of their limited resource.
  6. some of researchers introduced techniques for contracting denial of service on mobile devices that being used in provision of mobile health services. Their model makes use of IPSec protocol for traceback and prevention of attack traffic at upstream nodes As shown in Figure 1, the information captured by different body sensors is forwarded to user’s mobile device using wireless technologies such as Bluetooth, and WLAN. And since the body sensor information has to be accessed by the HSPs, this could incur high overhead on the mobile devices for storing the keys required for secure communication, establishing secure channels and transferring the body sensor information. In addition, the mobile devices are also used for other purposes such as accessing internet, social networks and playing online games, so they are easily vulnerable to DoS attacks in Current Scenario. Figure 2 shows the proposed model for securing the mobile healthcare services. They consider that all users’ traffic that need to be protected from DoS attacks passed through a Security Enforcement Component ( SEC ). SEC can be implemented on an existing router or can be realized as add on module to existing routers. So in this model, the attacks can be prevented at the upstream nodes which co-operate with the SEC.
  7. Major problem in healthcare is the lack of ability from patient/physician for frequent health monitoring, especially for patient who live in remote rural area or travel constantly are still inaccessible to receive health monitoring or treatment. Smartphone and personal digital assistants (PDAs) has several technologies – such as Wi-Fi, 3G/GSM, GPS receiver, and processing and storage capability – that make a strong impact on health-care models such as typical remote monitoring system, healthcare alerting system, clinical and administrative data collection, patient records maintain, healthcare delivery program, and detection and prevention system.
  8. Small Screen Minimize text-based data entry Limited Storage Space & Slow Processing Data should be store on file other than database on mobile application Complicated tasks and storage function should be mostly on the desktop application Choose a device that supports Compact Framework. Security Limitation & Inadequate Third Party Application Support Select the device and implementation platform that supports those developments.