looking forward: challenges in mobile security · alex aiken apac kickoff meeting 35. perspective:...

41
Looking Forward: Challenges in Mobile Security John Mitchell Stanford University

Upload: lamtu

Post on 10-Apr-2018

220 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Looking Forward: Challenges in Mobile Security

John MitchellStanford University

Page 2: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Outline

• Mobile platform security• SessionJuggler

– Using phone as authentication token• SelectiveAuth

– Protecting resources on the phone• Stamp Project

– Android malware project• Perspective

– Server side is also important for overall security

Page 3: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

3

Page 4: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

http://www.nytimes.com/2008/10/25/technology/internet/25phone.html

Attack through a malicious web site

Page 5: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

http://www.nytimes.com/2008/10/25/technology/internet/25phone.html

Android sandboxing limits consequences of attack

Possible web attacks compromise web partition on phone

Page 6: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform
Page 7: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Android: Experimental botnet demoTwo researchers at TippingPoint's Digital Vaccine Group have duped thousands of iPhone and Android smartphone users into joining a mobile botnet by spreading a seemingly innocuous weather application.

Page 8: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Trends• Two attack vectors: web browser, installed apps.

– Both are increasing in prevalence and sophistication• Android malware is increasing:

– Estimated 500,000 to 1 million users affected by Android malware in the first half of 2011 

– Approx 2.5x increase in second half od 2011– Three in ten will experience web‐based threat /year– Approx 80 apps infected with malware in Jan 2011 – Increased to over 400 apps cumulative in June 2011

• Attackers deploying increasingly sophisticated techniques to take control of the phone, personal data, and money 

source: https://www.mylookout.com/mobile‐threat‐report

Page 9: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Web‐based threats

• Phishing: mobile users more likely to fall to attack

• Drive‐by‐downloads: circumvent markets

• Direct exploitation• Mobile sites may lag in https, other security measures

source: https://www.mylookout.com/mobile‐threat‐report

Page 10: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Malware‐infected Apps

source: https://www.mylookout.com/mobile‐threat‐report

Leading categories: games, utilities, adult entertainment

Page 11: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Malicious App Creation

source: https://www.mylookout.com/mobile‐threat‐report

Page 12: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Research Sample:

Selective Authorization

Elie Bursztein, Jason Bau, Baptiste Goudin, John C. MitchellStanford University

Page 13: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Selective Authorization

Page 14: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Current Phone Threat Model

To prevent a singlephysical illegitimate accessa pin code is enforced for

every use

Page 15: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Protect Applications Selectively?

Page 16: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

User StudyBrowseInternet

Make a Call

Look at picture

Listen to a Song

Read Email

Send a SMS

Install an App

Access Social Profile

Take a Picture

Play a Game

NavigationFamilyFriendsStranger

Page 17: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Android Application Permissions

• Each application has its own space (uid)

• Application capabilities model (gid)

• Try to enforce a            “least privilege” idea

Page 18: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Alternative?

• Instead of asking at launch time do it at capability time

• Intercept and block/warm for specific phone permission access

Page 19: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Android Framework

Page 20: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Our “Selective Auth” Framework

Dalvik Virtual Machine

AndroidApplication FrameworkActivity Manager Service Cache

Database

PasswordSchemes

ConfigurationInterfaces

AlternativePass Schemes

AlternativeConfiguration

InterfacesAuthentication

Provider

Selective Authentication Framework Third Party Applications Android Framework

Specific Permission Needed

Page 21: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Configuration options

Wizard Start Usage Question Permissions Question

Page 22: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Research Sample:

Secure Web Login From an      Untrusted Terminal Using            Session HijackingElie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell

Stanford University

Page 23: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

SessionJuggler

Page 24: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

SessionJuggler

1. Facebook Login Screen

2. SessionJugglerStart Screen

3. SessionJugglerConfirmation Dialog

4. FacebookLogin Screen

5. FacebookProfile Page

6. FacebookProfile Page

Insecure Terminal

Mobile Device

Page 25: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Anti‐Hijacking Defenses

Anti‐hijacking defenses at the Alexa top 100 sites

DEFENSE % of Alexa100

Using HTTPS 83%

Using Secure Cookies 52%

Separating Mobile and Desktop Sessions 6%

Binding Session to IP Address 8%

Checking Local Time 1%

Binding Session to User‐Agent Header 0%

Binding Session to Local language 0%

Logout Over HTTPS 1%

Page 26: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Sites with Improper Logouthealth.google.com View and edit recordhealthvault.com View and edit health recordLinkedin Editing and saving profileYahoo Accessing and sending emailsHotmail/MSN Accessing and sending emailsblogger.com Posting a blog postEbay Bidding on an auctionFlicker Uploading photoswordpress.com Posting a blog postIMDB Editing and saving profileask.com Editing and saving profilecnn.com Editing and saving profileconduit.com Editing and saving profilemegaupload.com Uploading filesmediafire.com Uploading files4shared.com Uploading filescnet.com Editing and saving profileweather.com Editing and saving profileimageshack.com Uploading photosOpenMR Accessing, changing medical records

Page 27: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Research Sample:

Android malware certification

Alex Aiken, John C. Mitchell, Mayur Naik, Isil Dillig, Thomas DilligStanford, Georgia Tech, College of William and Mary

Page 28: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Idea #1

Alex Aiken APAC Kickoff Meeting28

STAMP’s static analysis will infer the spec from the app’s code

Page 29: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

An Example

• Consider a malicious barcode scanner that transmits phone's unique IMEI and IMSI numbers to a malicious server

• STAMP infers the specs:

Alex Aiken APAC Kickoff Meeting29

Page 30: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Idea #2

• Auditor inspects spec to decide if app is malware

Alex Aiken APAC Kickoff Meeting30

Page 31: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

31

Page 32: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

False Alarms

• There will be false alarms– Code that is OK, but STAMP cannot prove is OK

• This is a huge problem in practice– One of the major issues in using static analysis

Alex Aiken APAC Kickoff Meeting32

Page 33: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Idea #3

• Idea #3– Work with the auditor to refine specifications

Alex Aiken APAC Kickoff Meeting33

Page 34: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

34

Page 35: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Risks

• Are the semantics of Android well understood?

• Are source‐sink flows sufficient as specifications?

• Can we make developing specifications productive?

• Spending time trying to understand the programming model

• No.  But they are the first and perhaps most important class.

• Eat our dog food.  Build a prototype, verify apps, and find out what gets in the way.

Alex Aiken APAC Kickoff Meeting35

Page 36: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Perspective:

Why Mobile Application Security Risks Will Continue Growing for Enterprise and Consumer       Mobile Applications

Page 37: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Why Enterprise Mobile Apps

source: [x]cube Labs

Page 38: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Mobile Applications: Server Threats

• Concentration of risk on back‐end services –that’s where the data is

• Enterprises not checking services used by               mobile devices

• Threats are evolving even as mobile applications           are downloaded

• Lots of hype around endpoint protection and        source code scanning ‐ these solutions cannot detect– Privacy escalation– Boundary authentication

Page 39: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Mobile App Vulnerability Trends

0% 10% 20% 30% 40% 50% 60% 70% 80%

Infrastructure

Sensitive Information Disclosure

Session(Authentication,Authorization)

Input Validation

Vulnerability Category

Percentage of Apps

• Typical Web application security stats – 80% input validation injection attacks, 20% session authentication

• Mobile applications from large enterprises tested via managed service– 60% input validation attacks, 40% authentication related– 50 to 75% of apps had vulnerabilities that cannot be detected by endpoint analysis or source code analysis

source: Cenzic Application Security Intelligence: Mobile App Testing Results ‐ February 2012

Page 40: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform

Conclusions

• Mobile platform and apps widely used• Several threats

– Browser threats, malicious apps, back‐end services• Research progress

– Improving front‐end device security– Web defenses useful against browser attack– New malware characteristics and platforms– Enterprise apps widely used

• Need to protect both end point and apps that access backend systems

• Significant threats to back‐end services– bigger payoff– Auto update: app security important throughout lifecycle

• Likely continued job security for security professionals!

Page 41: Looking Forward: Challenges in Mobile Security · Alex Aiken APAC Kickoff Meeting 35. Perspective: ... Mobile App Testing Results ‐February 2012. Conclusions • Mobile platform