Android Security
-
Upload
lars-jacobs -
Category
Technology
-
view
767 -
download
3
description
Transcript of Android Security
![Page 1: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/1.jpg)
ANDROID SECURITYRobin De Croon
Lars Jacobs
|H05D9a| Cryptografie en netwerkbeveiliging: hoorcollege
prof. dr. Ir. Bart Preneel
![Page 2: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/2.jpg)
Content
• Introduction
• System and Kernel Level Security
• User Security Features
• Android Application Security
• Recent Security Problems
• Demo
May 8, 2013 2
http://blog.thoughtpick.com/wp-content/uploads/2011/01/web_design_services.11-18.web_content.jpg
![Page 3: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/3.jpg)
INTRODUCTIONIntroduction
System and Kernel Level Security
User Security Features
Android Application Security
Recent Security Problems
Demo
May 8, 2013 3
![Page 4: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/4.jpg)
Introduction
• All data located on your smartphone• Passwords• Photos• (Text) messages• Medical records• …
• Smartphone cannot trust anyone
• Android secure?• Open Source Safer (Hoepman et al.)
May 8, 2013 4
![Page 5: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/5.jpg)
Distribution of mobile malware byplatform in 2012
May 8, 2013 5
![Page 6: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/6.jpg)
Mobile threats motivated by profitby year
May 8, 2013 6
![Page 7: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/7.jpg)
Android Versions
May 8, 2013 7
![Page 8: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/8.jpg)
Android Software Stack
May 8, 2013 8
![Page 9: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/9.jpg)
SYSTEM AND KERNEL LEVEL
SECURITYIntroduction
System and Kernel Level Security
User Security Features
Android Application Security
Recent Security Problems
Demo
May 8, 2013 9
![Page 10: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/10.jpg)
Apps & Processes
• Own Linux Process + user ID Sandbox!• Data is protected from other apps• Secure IPC
• API calls are authorized according to permissions
• Hardware access is authorized by Group Membership
• Java, Native, WebKit
May 8, 2013 10
![Page 11: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/11.jpg)
Bootloader
• Bootloader is locked by default
• Boot process
• Signature check
May 8, 2013 11
![Page 12: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/12.jpg)
Memory management
• A lot of memory corruption bugs
Attacker can control the program
• Improvements• No eXecute (NX) (since Android 2.3)• Address Space Layout Randomization (since Android
4.0)• Position Independent Executables
(since Android 4.1)• FORTIFY_SOURCE (since Android 4.2)
May 8, 2013 12
![Page 13: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/13.jpg)
Randomization in Android 2.3
May 8, 2013 13
![Page 14: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/14.jpg)
Randomization in Android 4.0
May 8, 2013 14
![Page 15: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/15.jpg)
Randomization in Android 4.1
May 8, 2013 15
![Page 16: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/16.jpg)
Rooting
•Default no root access
•Possible through ‘su’ binary
Bootloader unsafe
Root apps can do ANYTHING
Latest versions of AndroidMay 8, 2013 16
http://1.bp.blogspot.com/-_DBO12vjaWM/Tu-bRCULR-I/AAAAAAAAA74/fZc-hszZarE/s1600/thumbs-up.jpg
![Page 17: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/17.jpg)
USER SECURITY FEATURES
Introduction
System and Kernel Level Security
User Security Features
Android Application Security
Recent Security Problems
Demo
May 8, 2013 17
![Page 18: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/18.jpg)
Device protection
• Screen lock• Face unlock, Pattern, PIN, Passcode, …
• File Encryption• 128 AES with CBC and ESSIV:SHA256
• Master key encrypted with 128 bit AES via openssl library
May 8, 2013 18
![Page 19: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/19.jpg)
Passwords are hashed
•Salt saved on device• /data/data/com.android.providers.settings.databases
• /data/system/locksettings.db
•‘Easily’ brute forced with salt
•Keys are stored in software!
May 8, 2013 20
![Page 20: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/20.jpg)
Android source code
May 8, 2013 21
![Page 21: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/21.jpg)
ANDROID APPLICATION
SECURITYIntroduction
System and Kernel Level Security
User Security Features
Android Application Security
Recent Security Problems
Demo
May 8, 2013 22
![Page 22: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/22.jpg)
Android Permissions
• Accessing protected APIs•Location (GPS), Camera, Bluetooth, Telephony,
SMS/MMS, Network/data
• Defined in AndroidManifest.xml
May 8, 2013 23
![Page 23: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/23.jpg)
Play Store security
• App is self signed
• Bouncer• Online version• Local version (since Android 4.2)
• App encryption• Introduced in Android 4.1• Shutdown due to bugs
May 8, 2013 24
![Page 24: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/24.jpg)
Cryptographic APIs
• Primitives• AES, DSA, RSA, SHA
• Higher level • SSL, HTTPS
• Virtual Private Network• IPsec
May 8, 2013 25
![Page 25: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/25.jpg)
RECENT SECURITY PROBLEMS
Introduction
System and Kernel Level Security
User Security Features
Android Application Security
Recent Security Problems
Demo
May 8, 2013 26
![Page 26: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/26.jpg)
SMS problems
• Smishing• http://www.youtube.com/watch?v=baWeMbGatfs
• SMS to premium services• F-secure Mobile Threat Report Q4 2012
• Kaspersky Security Bulletin 2012
May 8, 2013 27
![Page 27: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/27.jpg)
Exynos Exploit
• Exynos 4210 and 4412 processor• Sprint Galaxy S II, Galaxy S II, Galaxy S3, Galaxy Note, Galaxy
Note 2, Galaxy Tab 2, Galaxy Note 10.1, Galaxy Camera
•Kernel: /dev/exynos-mem R/W by all users access to all physical memory
• ExynosAbuse.apk
May 8, 2013 28
![Page 28: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/28.jpg)
DEMOIntroduction
System and Kernel Level Security
User Security Features
Android Application Security
Recent Security Problems
Demo
May 8, 2013 29
![Page 29: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/29.jpg)
References (I)
• F-secure Mobile Threat Report Q4 2012, http://www.f-secure.com/static/doc/labs_global/Research/Mobile%20Threat%20Report%20Q4%202012.pdf
• Google, “Android Platform Versions.”, http://developer.android.com/about/dashboards/index.html#Platform
• Google, “Android Security Overview”, http://source.android.com/tech/security/#android-application-security
• S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, and B. Freisleben, “Why eve and mallory love android,” in Proceedings of the 2012 ACM conference on Computer and communications security - CCS ’12, (New York, New York,USA), p. 50, ACM Press, 2012.
May 8, 2013 30
![Page 30: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/30.jpg)
References (II)
• J.-H. Hoepman and B. Jacobs, “Increased security through open source”, Communications of the ACM, vol. 50, pp. 79–83, Jan. 2007.
• Matthias Lange, “State of the Union: Android security overview – Is Android the new XP?, http://de.droidcon.com/2013/sessnio/state-union-android-security-overview-android-new-xp
• Xuxian Jiang, “Smishing Vulnerability in Multiple Android Platforms”, http://www.cs.ncsu.edu/faculty/jiang/smishing.html
• A. Shabtai, “Google Android: A Comprehensive Security Assessment”, Security & Privacy, IEEE, vol. 8, pp. 35-44, March-April 2010
May 8, 2013 31
![Page 31: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/31.jpg)
References (III)
• A. Barresi and P. Somogyvari, “Android Security – An Introduction”, www.youtube.com/watch?v=OOFzu2J3EBY
• Kaspersky Security Bulletin 2012, https://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012
May 8, 2013 32
![Page 32: Android Security](https://reader033.fdocuments.us/reader033/viewer/2022052821/554a25f7b4c9051b578b48b9/html5/thumbnails/32.jpg)
http://2.bp.blogspot.com/-gZjNR3XVULs/T_ZOVgE-5lI/AAAAAAAAAg8/6YVmd5Q064o/s1600/questions11.jpg
May 8, 2013 33