SlideShare a Scribd company logo
1 of 45
Download to read offline
Android 
System 
Security 
C.K.Chen 
2014/09/02
Outline 
• Some 
news 
about 
android 
threat 
• Android 
Threat 
Model 
– AAack 
from 
Computer 
– AAack 
from 
Firmware 
– NFC 
Security 
– Bluetooth 
Security 
• Malicious 
APP 
• Summary
Vulnerability
Android 
Threat 
Model
AAack 
from 
Computer 
• Gaining 
root 
access 
– Official: 
simulate 
screen 
tap 
event 
to 
the 
oem 
unlock 
menu 
on 
selected 
devices. 
– Universal: 
linux 
local 
root 
exploit 
(CVE-­‐2009-­‐1185 
RLIMIT_NPROC 
exhausZon) 
send 
via 
USB 
• Insert 
malicious 
payload 
– Kernel: 
disassemble 
boot 
parZZon, 
replace 
kernel 
zimage 
with 
malicious 
• OpZonally 
unroot 
back 
to 
avoid 
detecZon
AAack 
from 
Computer 
• Kernel 
manipulaZon 
• NaZve 
ARM 
ELF 
binary, 
bypassed 
Android 
framework 
permission 
checking. 
• In 
sum, 
a 
complete 
phone 
provisioning 
process 
fully 
automated 
with 
evil 
payload.
AAack 
from 
Firmware 
• 
Customize 
firmware 
– Distributed 
by 
Network 
– Pay 
to 
manufacturers 
for 
including 
the 
malware 
– Some 
manufacturers 
used 
firmware 
image 
from 
internet
NFC 
Security 
• Near 
field 
communicaZon 
(NFC) 
is 
a 
set 
of 
standards 
– Smartphones 
and 
similar 
devices 
to 
establish 
radio 
communicaZon 
– By 
touching 
them 
together 
or 
bringing 
them 
into 
proximity, 
usually 
no 
more 
than 
a 
few 
cenZmeters.
NFC 
Security 
• No 
link 
level 
security 
(wireless 
not 
encrypted) 
– Eavesdropping 
(sniffing) 
– Man-­‐in-­‐the-­‐middle 
– Data: 
ModificaZon, 
CorrupZon, 
InserZon 
• Tamper 
with 
NFC/RFID 
tags 
– Modify 
original 
tag 
– Replace 
with 
malicious 
tag
Bluetooth 
Security 
• Bluetooth 
is 
a 
wireless 
technology 
standard 
for 
exchanging 
data 
over 
short 
distances
Bluetooth 
Security 
• General 
so`ware 
vulnerabiliZes 
• Eavesdropping 
– older 
Bluetooth 
devices 
use 
versions 
of 
the 
Bluetooth 
protocol 
that 
have 
more 
security 
holes 
• Denial 
of 
service 
• Bluetooth 
range 
is 
greater 
than 
you 
think 
– Bluetooth 
is 
designed 
to 
be 
a 
“personal 
area 
network.” 
– Hackers 
have 
been 
known 
to 
use 
direcZonal, 
high-­‐gain 
antennae 
to 
successfully 
communicate 
over 
much 
greater 
distances. 
– For 
example, 
security 
researcher 
Joshua 
Wright 
demonstrated 
the 
use 
of 
such 
an 
antenna 
to 
hack 
a 
Bluetooth 
device 
in 
a 
Starbucks 
from 
across 
the 
street.
AAack 
Webkit 
• WebKit 
is 
a 
layout 
engine 
so`ware 
component 
for 
rendering 
web 
pages 
in 
web 
browsers. 
• Basic 
of 
web-­‐based 
applicaZon
AAack 
Webkit 
• 
1. 
connect 
2. 
Send 
malicious 
content 
Malicious 
Website 
Do 
something 
bad
AAack 
Webkit 
• hAps://www.youtube.com/watch? 
v=czx_AKdj8ug
MMS 
• MulZmedia 
Messaging 
Service 
– A 
standard 
way 
to 
send 
messages 
that 
include 
mulZmedia 
content 
to 
and 
from 
mobile 
phones 
– It 
extends 
the 
core 
SMS 
(Short 
Message 
Service) 
capability 
that 
allowed 
exchange 
of 
text 
messages
MMS 
Flow 
(Intra-­‐carrier) 
•
MMS 
AAack 
Vectors 
• MMS 
AAack 
Vectors 
– Message 
Headers 
– MMS 
uses 
many 
types 
of 
messages 
SMS, 
WAP, 
WSP 
• Message 
contents 
– SMIL 
• Markup 
language 
to 
describe 
content 
– 
Rich 
content 
– Images 
– Audio/Video
MMS 
Security 
• Mobile 
phone 
messaging 
is 
unique 
aAack 
surface 
– Always 
on 
• FuncZonality 
becoming 
more 
feature 
rich 
– Ringtones 
– Videos 
– Pictures 
• Technical 
hurdles 
for 
aAackers 
are 
dropping 
– Easily 
modified 
phones 
• FuncZonality 
at 
higher 
layers
ImplementaZon 
Vulnerability 
• Android 
flaw 
in 
parsing 
UDH 
for 
concatenated 
messages 
– Concatenated 
messages 
have 
a 
sequence 
number. 
Valid 
range 
is 
01-­‐FF. 
• Selng 
sequence 
to 
00 
triggers 
an 
unhandled 
invalid 
array 
excepZon. 
• Impact: 
Crashed 
com.android.phone 
process 
on 
Android 
G1 
– Disables 
all 
radio 
acZvity 
on 
the 
phone.
MMS 
AAack 
•
Malicious 
APP 
• Many 
aAack 
method 
must 
though 
malicious 
APP
APP 
Permission 
• Malicious 
app 
o`en 
declare 
more 
permissions 
android.permission.SEND_SMS 
/ 
RECEIVE_SMS 
android.permission.SYSTEM_ALERT_WINDOW 
android.permission.READ_CONTACTS 
/ 
WRITE_CONTACTS 
android. 
permission.READ_CALENDAR 
/ 
WRITE_CALENDAR 
android.permission.CALL_PHONE 
android.permission.READ_LOGS 
android.permission.ACCESS_FINE_LOCATION 
android.permission.GET_TASKS 
android.permission.RECEIVE_BOOT_COMPLETED 
android.permission.CHANGE_WIFI_STATE 
com.android.browser.permission.READ_HISTORY_BOOKMARKS 
/ 
WRITE_HISTORY_BOOKMARKS
Confused 
Deputy 
AAack
Repackage 
APK 
• Fake 
app 
which 
clone 
the 
code 
from 
the 
original 
one 
– And 
add 
some 
malicious 
code 
– Change 
the 
ad 
library
Repackage 
APK
Privilege 
EscalaZon 
• 
Two 
or 
more 
malicious 
app 
– Has 
less 
permission 
and 
seem 
not 
harmful 
– With 
communicate 
though 
intent, 
these 
apps 
achieve 
malicious 
behaviors 
which 
require 
higher 
permission
MiZgate 
the 
Threat 
• For 
the 
user 
– Update 
to 
the 
newest 
version 
• Android 
• APP 
– Close 
unused 
service 
– Install 
APP 
that 
you 
trust
MiZgate 
the 
Threat 
• For 
the 
Developer 
– Basic 
Security 
Concept 
– Code 
Review 
– PenetraZon 
Test 
– Keep 
up 
to 
the 
newest 
aAack
Summary 
• First, 
we 
share 
some 
security 
new 
in 
android 
• With 
so 
many 
interface 
for 
communicaZon, 
the 
aAack 
vector 
is 
become 
more 
wide 
• The 
threat 
model 
of 
android 
is 
discuss 
• Numerous 
aAack 
method 
is 
introduced 
• Some 
easy 
guideline 
is 
proposed 
for 
user 
and 
developer
Q&A
The 
New 
AAack 
• While 
we 
already 
talk 
about 
some 
general 
aAack 
– But 
aAacker’s 
methods 
change 
with 
Zme, 
more 
special 
and 
more 
sophisZcated 
– Current, 
numerous 
android 
security 
flaws 
are 
proposed 
in 
security 
conference
UI 
State 
Inference 
AAack 
• AAacker 
can 
guest 
what 
AcZvity 
is 
current 
viewed 
by 
user 
– Try 
to 
hijack 
the 
AcZvity 
– Do 
something 
bad 
• Demo 
video
Recognizing 
Speech 
From 
Gyroscope 
Signals 
• Gyroscope 
is 
the 
device 
is 
a 
device 
for 
measuring 
or 
maintaining 
orientaZon
Recognizing 
Speech 
From 
Gyroscope 
Signals 
• Gyroscope 
is 
low 
level 
permission 
for 
app 
– User 
may 
ignore 
it 
• While 
speech 
record 
is 
dangerous 
permission 
• Researchers 
show 
that 
it 
is 
possible 
to 
recover 
the 
speech 
from 
Gyroscope 
informaZon
Exploit 
Update 
Mechanism 
• New 
OS 
version 
presumably 
fixes 
security 
loopholes 
and 
enhances 
the 
system’s 
security 
protecZon 
• AutomaZcally 
acquire 
significant 
capabiliZes 
without 
users’ 
consent 
once 
they 
upgrade 
to 
newer 
versions! 
– automaZcally 
obtaining 
all 
new 
permissions 
added 
by 
the 
newer 
version 
OS 
– replacing 
system-­‐level 
apps 
with 
malicious 
ones 
– injecZng 
malicious 
scripts 
into 
arbitrary 
webpages
Exploit 
Update 
Mechanism 
• It 
exploits 
the 
flaws 
in 
the 
updaZng 
mechanism 
of 
the 
“future” 
OS, 
which 
the 
current 
system 
will 
be 
upgraded 
to 
• Demo 
video
Security 
Risks 
in 
CustomizaZons 
• For 
each 
new 
Android 
version, 
Google 
first 
releases 
it 
to 
mobile 
phone 
vendors, 
allowing 
them 
to 
add 
their 
apps, 
device 
drivers 
and 
other 
new 
features 
to 
their 
corresponding 
Android 
branches. 
• Recent 
studies 
show 
that 
many 
pre-­‐loaded 
apps 
on 
those 
images 
are 
vulnerable, 
leaking 
system 
capabiliZes 
or 
sensiZve 
user 
informaZon 
to 
unauthorized 
parZes. 
2014/5/19 
42
Security 
Risks 
in 
CustomizaZons 
• The 
security 
risks 
here, 
however, 
go 
much 
deeper 
than 
those 
on 
the 
app 
layer. 
• ParZcularly, 
they 
almost 
always 
need 
to 
modify 
a 
few 
device 
drivers 
(e.g., 
for 
camera, 
audio, 
etc.) 
and 
related 
system 
selngs 
to 
support 
their 
hardware. 
2014/5/19 
43
Security 
Risks 
in 
CustomizaZons 
• Device 
drivers 
work 
on 
the 
Linux 
layer 
and 
communicate 
with 
Android 
users 
through 
framework 
services. 
• Therefore, 
any 
customizaZon 
on 
an 
Android 
device 
needs 
to 
make 
sure 
that 
it 
remains 
well 
protected 
at 
both 
the 
Linux 
and 
framework 
layers. 
• However, 
vendors 
usually 
doesn't 
have 
the 
Zme 
to 
properly 
address 
such 
problems. 
2014/5/19 
44
The 
Peril 
of 
FragmentaZon 
• Android 
devices 
contain 
a 
large 
piece 
which 
is 
customize 
by 
vender 
– Kernel 
– Firmware 
• For 
ease 
of 
programming, 
some 
security 
policies 
are 
broken 
• DEMO 
Video

More Related Content

What's hot

Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaYogesh Ojha
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and SecurityKelwin Yang
 
Malware collection and analysis
Malware collection and analysisMalware collection and analysis
Malware collection and analysisChong-Kuan Chen
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applicationsh4oxer
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)Justin Hoang
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00srini0x00
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamMohammed Adam
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and OPietro F. Maggi
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecDroidConTLV
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLiphonepentest
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsBlrDroid
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depthSander Alberink
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security WorkshopOWASP
 

What's hot (20)

Android Security
Android SecurityAndroid Security
Android Security
 
Android security
Android securityAndroid security
Android security
 
Android Security
Android SecurityAndroid Security
Android Security
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and Security
 
Malware collection and analysis
Malware collection and analysisMalware collection and analysis
Malware collection and analysis
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Whats different in android L, M, N and O
Whats different in android L, M, N and OWhats different in android L, M, N and O
Whats different in android L, M, N and O
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
 
Android security
Android securityAndroid security
Android security
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depth
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 

Viewers also liked

Android Application Security
Android Application SecurityAndroid Application Security
Android Application SecurityChong-Kuan Chen
 
Android security model
Android security modelAndroid security model
Android security modelrrand1
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
Firebase analytics for_android _ i_os
Firebase analytics for_android _ i_osFirebase analytics for_android _ i_os
Firebase analytics for_android _ i_osbaroqueworksdev
 
Security in Android Application, Александр Смирнов, RedMadRobot, Москва
 Security in Android Application, Александр Смирнов, RedMadRobot, Москва  Security in Android Application, Александр Смирнов, RedMadRobot, Москва
Security in Android Application, Александр Смирнов, RedMadRobot, Москва it-people
 
Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basicsOWASPKerala
 
System two social networking affecting retailer payments - final
System two   social networking affecting retailer payments - finalSystem two   social networking affecting retailer payments - final
System two social networking affecting retailer payments - finalSystem Two ltd
 
Intro. to static analysis
Intro. to static analysisIntro. to static analysis
Intro. to static analysisChong-Kuan Chen
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysisChong-Kuan Chen
 
Oram And Secure Computation
Oram And Secure ComputationOram And Secure Computation
Oram And Secure ComputationChong-Kuan Chen
 
Introduction, Examples - Firebase
Introduction, Examples - Firebase Introduction, Examples - Firebase
Introduction, Examples - Firebase Eueung Mulyana
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisChong-Kuan Chen
 

Viewers also liked (20)

Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 
Android security model
Android security modelAndroid security model
Android security model
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Firebase analytics for_android _ i_os
Firebase analytics for_android _ i_osFirebase analytics for_android _ i_os
Firebase analytics for_android _ i_os
 
Security in Android Application, Александр Смирнов, RedMadRobot, Москва
 Security in Android Application, Александр Смирнов, RedMadRobot, Москва  Security in Android Application, Александр Смирнов, RedMadRobot, Москва
Security in Android Application, Александр Смирнов, RedMadRobot, Москва
 
Firebase
FirebaseFirebase
Firebase
 
Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basics
 
System two social networking affecting retailer payments - final
System two   social networking affecting retailer payments - finalSystem two   social networking affecting retailer payments - final
System two social networking affecting retailer payments - final
 
Firebase Android
Firebase AndroidFirebase Android
Firebase Android
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
Intro. to static analysis
Intro. to static analysisIntro. to static analysis
Intro. to static analysis
 
Addios!
Addios!Addios!
Addios!
 
Mobile security
Mobile securityMobile security
Mobile security
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysis
 
Mem forensic
Mem forensicMem forensic
Mem forensic
 
Oram And Secure Computation
Oram And Secure ComputationOram And Secure Computation
Oram And Secure Computation
 
Introduction, Examples - Firebase
Introduction, Examples - Firebase Introduction, Examples - Firebase
Introduction, Examples - Firebase
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
 

Similar to Android System Security Threats and Mitigation Strategies

AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applicationseightbit
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackGeekPwn Keen
 
Virtualization for users
Virtualization for usersVirtualization for users
Virtualization for usersVijender Yadav
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security ModelMichael Rushanan
 
Securely Deploying Android Device - ISSA (Ireland)
 Securely Deploying Android Device - ISSA (Ireland) Securely Deploying Android Device - ISSA (Ireland)
Securely Deploying Android Device - ISSA (Ireland)Angelill0
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability studySri Harsha Pamu
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1Nikhil Kulkarni
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Gridgueste0b5fe
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidSam Bowne
 

Similar to Android System Security Threats and Mitigation Strategies (20)

Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
Securing Android
Securing AndroidSecuring Android
Securing Android
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
Virtualization for users
Virtualization for usersVirtualization for users
Virtualization for users
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model
 
128-ch4.pptx
128-ch4.pptx128-ch4.pptx
128-ch4.pptx
 
Android Rooting
Android RootingAndroid Rooting
Android Rooting
 
Securely Deploying Android Device - ISSA (Ireland)
 Securely Deploying Android Device - ISSA (Ireland) Securely Deploying Android Device - ISSA (Ireland)
Securely Deploying Android Device - ISSA (Ireland)
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
OTT for Mobile Devices
OTT for Mobile DevicesOTT for Mobile Devices
OTT for Mobile Devices
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability study
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Android architechture
Android architechtureAndroid architechture
Android architechture
 
SmartTV Security
SmartTV SecuritySmartTV Security
SmartTV Security
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 

More from Chong-Kuan Chen

DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
DARPA CGC and DEFCON CTF: Automatic Attack and Defense TechniqueDARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
DARPA CGC and DEFCON CTF: Automatic Attack and Defense TechniqueChong-Kuan Chen
 
Compilation and Execution
Compilation and ExecutionCompilation and Execution
Compilation and ExecutionChong-Kuan Chen
 
HITCON CTF 2014 BambooFox 解題心得分享
HITCON CTF 2014 BambooFox 解題心得分享HITCON CTF 2014 BambooFox 解題心得分享
HITCON CTF 2014 BambooFox 解題心得分享Chong-Kuan Chen
 
Become A Security Master
Become A Security MasterBecome A Security Master
Become A Security MasterChong-Kuan Chen
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveChong-Kuan Chen
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detectionChong-Kuan Chen
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1Chong-Kuan Chen
 

More from Chong-Kuan Chen (8)

Cgc2
Cgc2Cgc2
Cgc2
 
DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
DARPA CGC and DEFCON CTF: Automatic Attack and Defense TechniqueDARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
DARPA CGC and DEFCON CTF: Automatic Attack and Defense Technique
 
Compilation and Execution
Compilation and ExecutionCompilation and Execution
Compilation and Execution
 
HITCON CTF 2014 BambooFox 解題心得分享
HITCON CTF 2014 BambooFox 解題心得分享HITCON CTF 2014 BambooFox 解題心得分享
HITCON CTF 2014 BambooFox 解題心得分享
 
Become A Security Master
Become A Security MasterBecome A Security Master
Become A Security Master
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
 

Recently uploaded

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Android System Security Threats and Mitigation Strategies

  • 1. Android System Security C.K.Chen 2014/09/02
  • 2. Outline • Some news about android threat • Android Threat Model – AAack from Computer – AAack from Firmware – NFC Security – Bluetooth Security • Malicious APP • Summary
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 10. AAack from Computer • Gaining root access – Official: simulate screen tap event to the oem unlock menu on selected devices. – Universal: linux local root exploit (CVE-­‐2009-­‐1185 RLIMIT_NPROC exhausZon) send via USB • Insert malicious payload – Kernel: disassemble boot parZZon, replace kernel zimage with malicious • OpZonally unroot back to avoid detecZon
  • 11. AAack from Computer • Kernel manipulaZon • NaZve ARM ELF binary, bypassed Android framework permission checking. • In sum, a complete phone provisioning process fully automated with evil payload.
  • 12. AAack from Firmware • Customize firmware – Distributed by Network – Pay to manufacturers for including the malware – Some manufacturers used firmware image from internet
  • 13. NFC Security • Near field communicaZon (NFC) is a set of standards – Smartphones and similar devices to establish radio communicaZon – By touching them together or bringing them into proximity, usually no more than a few cenZmeters.
  • 14. NFC Security • No link level security (wireless not encrypted) – Eavesdropping (sniffing) – Man-­‐in-­‐the-­‐middle – Data: ModificaZon, CorrupZon, InserZon • Tamper with NFC/RFID tags – Modify original tag – Replace with malicious tag
  • 15. Bluetooth Security • Bluetooth is a wireless technology standard for exchanging data over short distances
  • 16. Bluetooth Security • General so`ware vulnerabiliZes • Eavesdropping – older Bluetooth devices use versions of the Bluetooth protocol that have more security holes • Denial of service • Bluetooth range is greater than you think – Bluetooth is designed to be a “personal area network.” – Hackers have been known to use direcZonal, high-­‐gain antennae to successfully communicate over much greater distances. – For example, security researcher Joshua Wright demonstrated the use of such an antenna to hack a Bluetooth device in a Starbucks from across the street.
  • 17. AAack Webkit • WebKit is a layout engine so`ware component for rendering web pages in web browsers. • Basic of web-­‐based applicaZon
  • 18. AAack Webkit • 1. connect 2. Send malicious content Malicious Website Do something bad
  • 19. AAack Webkit • hAps://www.youtube.com/watch? v=czx_AKdj8ug
  • 20. MMS • MulZmedia Messaging Service – A standard way to send messages that include mulZmedia content to and from mobile phones – It extends the core SMS (Short Message Service) capability that allowed exchange of text messages
  • 22. MMS AAack Vectors • MMS AAack Vectors – Message Headers – MMS uses many types of messages SMS, WAP, WSP • Message contents – SMIL • Markup language to describe content – Rich content – Images – Audio/Video
  • 23. MMS Security • Mobile phone messaging is unique aAack surface – Always on • FuncZonality becoming more feature rich – Ringtones – Videos – Pictures • Technical hurdles for aAackers are dropping – Easily modified phones • FuncZonality at higher layers
  • 24. ImplementaZon Vulnerability • Android flaw in parsing UDH for concatenated messages – Concatenated messages have a sequence number. Valid range is 01-­‐FF. • Selng sequence to 00 triggers an unhandled invalid array excepZon. • Impact: Crashed com.android.phone process on Android G1 – Disables all radio acZvity on the phone.
  • 26. Malicious APP • Many aAack method must though malicious APP
  • 27. APP Permission • Malicious app o`en declare more permissions android.permission.SEND_SMS / RECEIVE_SMS android.permission.SYSTEM_ALERT_WINDOW android.permission.READ_CONTACTS / WRITE_CONTACTS android. permission.READ_CALENDAR / WRITE_CALENDAR android.permission.CALL_PHONE android.permission.READ_LOGS android.permission.ACCESS_FINE_LOCATION android.permission.GET_TASKS android.permission.RECEIVE_BOOT_COMPLETED android.permission.CHANGE_WIFI_STATE com.android.browser.permission.READ_HISTORY_BOOKMARKS / WRITE_HISTORY_BOOKMARKS
  • 29. Repackage APK • Fake app which clone the code from the original one – And add some malicious code – Change the ad library
  • 31. Privilege EscalaZon • Two or more malicious app – Has less permission and seem not harmful – With communicate though intent, these apps achieve malicious behaviors which require higher permission
  • 32. MiZgate the Threat • For the user – Update to the newest version • Android • APP – Close unused service – Install APP that you trust
  • 33. MiZgate the Threat • For the Developer – Basic Security Concept – Code Review – PenetraZon Test – Keep up to the newest aAack
  • 34. Summary • First, we share some security new in android • With so many interface for communicaZon, the aAack vector is become more wide • The threat model of android is discuss • Numerous aAack method is introduced • Some easy guideline is proposed for user and developer
  • 35. Q&A
  • 36. The New AAack • While we already talk about some general aAack – But aAacker’s methods change with Zme, more special and more sophisZcated – Current, numerous android security flaws are proposed in security conference
  • 37. UI State Inference AAack • AAacker can guest what AcZvity is current viewed by user – Try to hijack the AcZvity – Do something bad • Demo video
  • 38. Recognizing Speech From Gyroscope Signals • Gyroscope is the device is a device for measuring or maintaining orientaZon
  • 39. Recognizing Speech From Gyroscope Signals • Gyroscope is low level permission for app – User may ignore it • While speech record is dangerous permission • Researchers show that it is possible to recover the speech from Gyroscope informaZon
  • 40. Exploit Update Mechanism • New OS version presumably fixes security loopholes and enhances the system’s security protecZon • AutomaZcally acquire significant capabiliZes without users’ consent once they upgrade to newer versions! – automaZcally obtaining all new permissions added by the newer version OS – replacing system-­‐level apps with malicious ones – injecZng malicious scripts into arbitrary webpages
  • 41. Exploit Update Mechanism • It exploits the flaws in the updaZng mechanism of the “future” OS, which the current system will be upgraded to • Demo video
  • 42. Security Risks in CustomizaZons • For each new Android version, Google first releases it to mobile phone vendors, allowing them to add their apps, device drivers and other new features to their corresponding Android branches. • Recent studies show that many pre-­‐loaded apps on those images are vulnerable, leaking system capabiliZes or sensiZve user informaZon to unauthorized parZes. 2014/5/19 42
  • 43. Security Risks in CustomizaZons • The security risks here, however, go much deeper than those on the app layer. • ParZcularly, they almost always need to modify a few device drivers (e.g., for camera, audio, etc.) and related system selngs to support their hardware. 2014/5/19 43
  • 44. Security Risks in CustomizaZons • Device drivers work on the Linux layer and communicate with Android users through framework services. • Therefore, any customizaZon on an Android device needs to make sure that it remains well protected at both the Linux and framework layers. • However, vendors usually doesn't have the Zme to properly address such problems. 2014/5/19 44
  • 45. The Peril of FragmentaZon • Android devices contain a large piece which is customize by vender – Kernel – Firmware • For ease of programming, some security policies are broken • DEMO Video