Vulnerabilities in Android

13
Vulnerabilities in Android By : BIRJU TANK(141060753017) M.E 3 rd Sem WiMC GTU PG School, BISAG-CDAC, Gandhinagar [email protected]

Transcript of Vulnerabilities in Android

Page 1: Vulnerabilities in Android

[email protected]

Vulnerabilities in Android

By : BIRJU TANK(141060753017)M.E 3rd Sem WiMC

GTU PG School, BISAG-CDAC, Gandhinagar

Page 2: Vulnerabilities in Android

[email protected]

Introduction

• Growth of the Smartphones increases rapidly

• Android and iOS Smartphones claimed above 90%

• Universal awareness of Privacy should require

• Many Malicious codes are reported

• Causes Security flaw, financial loss, private information leakage

Page 3: Vulnerabilities in Android

[email protected]

What is Vulnerability..?

• Weakness

• Soft Spot

Page 4: Vulnerabilities in Android

[email protected]

Tools to measure Vulnerability

• Nessus

• IWH tool

Page 5: Vulnerabilities in Android

[email protected]

Types of vulnerabilities

• Invalidated inputs

• Broken Access Control

• Cross-site scripting

• Buffer overflow

• SQL Injection

• Http Header Injection

• FTP Bounce attack

Page 6: Vulnerabilities in Android

[email protected]

Android Security

• File system is encrypted against any theft or loss of device

• The Sandbox concept is adopted to isolate apps data and codes from other apps

• Concept of Content Provider and Permission

Page 7: Vulnerabilities in Android

[email protected]

Content Provider and Permission

Page 8: Vulnerabilities in Android

[email protected]

Current Safety Status of Mobile Devices• Extract an application's signature and then compare it with the

signatures in the malicious application signature database

• But this is time consuming • Solution to this is Cloud Antivirus

Page 9: Vulnerabilities in Android

[email protected]

Security Problems faced by mobile devices• Malicious applications

• Unsafe websites

• Data security of mobile devices

• Network data security of the mobile devices

Page 10: Vulnerabilities in Android

[email protected]

Conclusion

• Android relies on the Sandbox to protect codes and data of an app from other apps, whilst it offers the ContentProviders to share databases as necessary.• Assigning permissions to control accesses is not mandatory, which

leads to security loopholes.

Page 11: Vulnerabilities in Android

[email protected]

Future Work

• Security module of any object is very huge area b’coz

100% Security is Myth

Page 12: Vulnerabilities in Android

[email protected]

References1. P. D. Meshram, Dr. R.C. Thool – “A paper on Vulnerabilities in Android and

Security of Android Devices”, 2014 IEEE Global Conference on Wireless Computing and Networking (GCWCN), 978-1-4799-6298-3/14/$31.00 © 2014 IEEE

2. Jingzheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Yongji Wang – “Vulnerability Detection in Android system”, 2013 IEEE Sixth International Conference on Cloud Computing - 978-0-7695-5028-2/13 $26.00 © 2013 IEEE

3. Xiali Hei, Xiaojiang Du and Shan Lin – “Two Vulnerabilities in Android Kernel” IEEE ICC 2013 - Wireless Networking Symposium- 978-1-4673-3122-7/13/$31.00 ©2013 IEEE

4. AndroidManifest, http://developer.android.com/guide/topics/ manifest/ manifestt-intro.html

5. Android Security, http://developer.android.com/training / articles/security-tips.html