SlideShare ist ein Scribd-Unternehmen logo
1 von 18
NOWSECURE
PROJECT
Collins,
Stacey D
Defersha,
Endale A
Jacobson,
Rhiannon
N
Peterka,
Joseph D
Spring 2022
WHAT TYPE OF PATTERN OF
SECURITY RISK OR MALWARE
DID YOU ATTEMPT TO FIND?
SUMMARY IN REVIEW
• 1007 distinct apps associated to 79 distinct countries.
• 207 (20.6%) of apps have key size vulnerabilities.
• There was no significant difference in key size vulnerabilities based on geographic
region from which the app originated.
BACKGROUND
Use of a digital signature is important for users of applications to know the data
being transferred is coming from the correct users.
Appropriate key sizes, as well as other cryptographic based security measures,
are necessary in protecting information, specifically for apps that deal with
sensitive information.
In the NowSecure provided data, Apps that have a key size vulnerability have a
keysize_check variable value equal to True.
If keysize_check is True, then the app uses a weak key size which could lead to
forged digital signatures, and if False then no such vulnerability was found.
Please note that a True value does not indicate that a digital signature has been forged, but simply that the
vulnerability exists within the application that could lead to a forgery
SECURITY ISSUES RELATED TO
THE KEY SIZE
dependent variable:
• keysize_check
Independent variables:
• secure_random_check
• change_cipher_spec_check
• certificate_validity_check
• sqlcipher_key_leakage_check
HOW DID YOU GO ABOUT
FINDING THIS SECURITY RISK
ACROSS ALL
THE NOWSECURE APPS?
APPROACH
• Conducted two phases of Experiments
 Model 1) Using 2 of the proposed independent variables
• secure_random_check
• sqlcipher_key_leakage_check
 two were removed because they didn't vary - all values were false
• change_cipher_spec_check
• certificate_validity_check
 Model 2) Including all variables with chi-sq p-value <0.25
CHI-SQ TABLE
Variable Name Chi-Sq p-value DF
secure_random_check 4.59 0.032 1
sends_sms_check 2.58 0.109 1
dirtycow_check 1.99 0.158 1
javascript_interface_check 1.87 0.171 1
allow_backup_check 1.81 0.179 1
decode_apk_check 1.65 0.199 1
publisher_global_location 3.85 0.427 4
auto_generated_screenshots_check 0.41 0.520 1
application_overprivileged_check 0.26 0.611 1
sqlcipher_key_leakage_check 0.26 0.612 1
decompile_apk_check 0.22 0.640 1
get_reflection_code 0.07 0.787 1
obfuscation_check 0.07 0.787 1
okhttp_vuln_check 0.01 0.905 1
dynamic_code_loading_check 0.00 0.979 1
certificate_validity_check 0.00 1.000 0
change_cipher_spec_check 0.00 1.000 0
debug_flag_check 0.00 1.000 0
extract_lib_info 0.00 1.000 0
get_native_methods 0.00 1.000 0
heartbleed_check 0.00 1.000 0
master_key_check 0.00 1.000 0
STEPS
looked at the odds ratios of the vulnerabilities in the independent variables to quantify the size of the relationship
between the independent vulnerabilities and the key size vulnerability
Is vulnerability in one independent variable significantly
more likely to experience a key size vulnerability?
The odds ratios will allow us to quantify the size of that
likelihood
examined the output of the model to determine which independent variables are significant in relation to the dependent
variable, and which, if any, are not
created a logistic regression model to examine relationship between our dependent and independent variables
Results from Experiment 1
Results from Experiment 2
ODDS RATIOS COMPARISON
MODEL 1
Variable Name OR (CI)
secure_random_check 1.68 (1.07, 2.66) *
sqlcipher_key_leakage_check 0.68 (0.23, 1.98)
* = odds ratio significantly different from 1
MODEL 2
Variable Name OR (CI)
dirtycow_check 1.50 (0.90, 2.51)
sends_sms_check 1.64 (0.87, 3.10)
decode_apk_check 0.30 (0.06, 1.50)
allow_backup_check 0.78 (0.57, 1.07)
secure_random_check 1.82 (1.14, 2.90) *
javascript_interface_check 1.34 (0.89, 2.03)
* = odds ratio significantly different from 1
WHAT DID YOU FIND? DO YOU HAVE A
LIST OF INSECURE APPS? OR PATTERNS
OF INSECURE LIBRARIES OR OTHER
ASPECTS OF APPS?
FINDINGS
• Only secure_random_check was significant
• Model1
• odds ratio of 1.68 (95% CI 1.07 - 2.66)
• Model 2
• odds ratio of 1.82 (95% CI 1.14 - 2.90)
• Country Association
• 1007 applications – representing 48 categories and developed across 79 distinct countries
• 57 apps were unable to be logically associated to a country of origin
• A unique trend by location was found to be insignificant
Total Apps Vulnerable Keysize %
Africa 15 1 6.7%
Americas 333 63 18.9%
Asia 386 85 22.0%
Europe 163 48 29.4%
Oceania 13 3 23.1%
DO YOU THINK THERE ARE ANY
IMPLICATIONS OF WHAT YOU’VE FOUND? IS
IT NOVEL? IS IT WORTH OTHERS CHECKING
ON THE APPS OR OTHER FINDINGS YOU
HAVE?
IMPLICATIONS
• Model1:odds ratio of 1.68 (95% CI 1.07 - 2.66)
• apps that have a secure_random_check vulnerability
are 1.68 times as likely to also have a keysize_check
vulnerability than those apps that do not have a
secure_random_check vulnerability
• Model 2 : odds ratio of 1.80 (95% CI 1.14 - 2.90)
• apps that have
a secure_random_check vulnerability are 1.80 times as
likely to also have a keysize_check vulnerability than
those apps that do not have
a secure_random_check vulnerability
• Country Attribution
• Associating Apps to Country of Origin
• Global Associations
THE END

Weitere ähnliche Inhalte

Ähnlich wie NS-Presentation-v2.pptx

Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?Black Duck by Synopsys
 
Software engineering
Software engineeringSoftware engineering
Software engineeringGuruAbirami2
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Denim Group
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Cenzic
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceTieu Luu
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security MetricsCigital
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Ann Marie Neufelder
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Krisshhna Daasaarii
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedAshley Zupkus
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareTyler Shields
 
J034057065
J034057065J034057065
J034057065ijceronline
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
One login enemy at the gates
One login enemy at the gatesOne login enemy at the gates
One login enemy at the gatesEoin Keary
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 

Ähnlich wie NS-Presentation-v2.pptx (20)

Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Software testing
Software testingSoftware testing
Software testing
 
Cost effective cyber security
Cost effective cyber securityCost effective cyber security
Cost effective cyber security
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
Application Security Assessments by the Numbers - A Whole-istic View - OWASP ...
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber Intelligence
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...
 
Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...Four things that are almost guaranteed to reduce the reliability of a softwa...
Four things that are almost guaranteed to reduce the reliability of a softwa...
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
J034057065
J034057065J034057065
J034057065
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
One login enemy at the gates
One login enemy at the gatesOne login enemy at the gates
One login enemy at the gates
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 

KĂźrzlich hochgeladen

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfEr. Suman Jyoti
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 

KĂźrzlich hochgeladen (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 

NS-Presentation-v2.pptx

  • 2. WHAT TYPE OF PATTERN OF SECURITY RISK OR MALWARE DID YOU ATTEMPT TO FIND?
  • 3. SUMMARY IN REVIEW • 1007 distinct apps associated to 79 distinct countries. • 207 (20.6%) of apps have key size vulnerabilities. • There was no significant difference in key size vulnerabilities based on geographic region from which the app originated.
  • 4. BACKGROUND Use of a digital signature is important for users of applications to know the data being transferred is coming from the correct users. Appropriate key sizes, as well as other cryptographic based security measures, are necessary in protecting information, specifically for apps that deal with sensitive information. In the NowSecure provided data, Apps that have a key size vulnerability have a keysize_check variable value equal to True. If keysize_check is True, then the app uses a weak key size which could lead to forged digital signatures, and if False then no such vulnerability was found. Please note that a True value does not indicate that a digital signature has been forged, but simply that the vulnerability exists within the application that could lead to a forgery
  • 5. SECURITY ISSUES RELATED TO THE KEY SIZE dependent variable: • keysize_check Independent variables: • secure_random_check • change_cipher_spec_check • certificate_validity_check • sqlcipher_key_leakage_check
  • 6. HOW DID YOU GO ABOUT FINDING THIS SECURITY RISK ACROSS ALL THE NOWSECURE APPS?
  • 7. APPROACH • Conducted two phases of Experiments  Model 1) Using 2 of the proposed independent variables • secure_random_check • sqlcipher_key_leakage_check  two were removed because they didn't vary - all values were false • change_cipher_spec_check • certificate_validity_check  Model 2) Including all variables with chi-sq p-value <0.25
  • 8. CHI-SQ TABLE Variable Name Chi-Sq p-value DF secure_random_check 4.59 0.032 1 sends_sms_check 2.58 0.109 1 dirtycow_check 1.99 0.158 1 javascript_interface_check 1.87 0.171 1 allow_backup_check 1.81 0.179 1 decode_apk_check 1.65 0.199 1 publisher_global_location 3.85 0.427 4 auto_generated_screenshots_check 0.41 0.520 1 application_overprivileged_check 0.26 0.611 1 sqlcipher_key_leakage_check 0.26 0.612 1 decompile_apk_check 0.22 0.640 1 get_reflection_code 0.07 0.787 1 obfuscation_check 0.07 0.787 1 okhttp_vuln_check 0.01 0.905 1 dynamic_code_loading_check 0.00 0.979 1 certificate_validity_check 0.00 1.000 0 change_cipher_spec_check 0.00 1.000 0 debug_flag_check 0.00 1.000 0 extract_lib_info 0.00 1.000 0 get_native_methods 0.00 1.000 0 heartbleed_check 0.00 1.000 0 master_key_check 0.00 1.000 0
  • 9. STEPS looked at the odds ratios of the vulnerabilities in the independent variables to quantify the size of the relationship between the independent vulnerabilities and the key size vulnerability Is vulnerability in one independent variable significantly more likely to experience a key size vulnerability? The odds ratios will allow us to quantify the size of that likelihood examined the output of the model to determine which independent variables are significant in relation to the dependent variable, and which, if any, are not created a logistic regression model to examine relationship between our dependent and independent variables
  • 12. ODDS RATIOS COMPARISON MODEL 1 Variable Name OR (CI) secure_random_check 1.68 (1.07, 2.66) * sqlcipher_key_leakage_check 0.68 (0.23, 1.98) * = odds ratio significantly different from 1 MODEL 2 Variable Name OR (CI) dirtycow_check 1.50 (0.90, 2.51) sends_sms_check 1.64 (0.87, 3.10) decode_apk_check 0.30 (0.06, 1.50) allow_backup_check 0.78 (0.57, 1.07) secure_random_check 1.82 (1.14, 2.90) * javascript_interface_check 1.34 (0.89, 2.03) * = odds ratio significantly different from 1
  • 13. WHAT DID YOU FIND? DO YOU HAVE A LIST OF INSECURE APPS? OR PATTERNS OF INSECURE LIBRARIES OR OTHER ASPECTS OF APPS?
  • 14. FINDINGS • Only secure_random_check was significant • Model1 • odds ratio of 1.68 (95% CI 1.07 - 2.66) • Model 2 • odds ratio of 1.82 (95% CI 1.14 - 2.90) • Country Association • 1007 applications – representing 48 categories and developed across 79 distinct countries • 57 apps were unable to be logically associated to a country of origin • A unique trend by location was found to be insignificant
  • 15. Total Apps Vulnerable Keysize % Africa 15 1 6.7% Americas 333 63 18.9% Asia 386 85 22.0% Europe 163 48 29.4% Oceania 13 3 23.1%
  • 16. DO YOU THINK THERE ARE ANY IMPLICATIONS OF WHAT YOU’VE FOUND? IS IT NOVEL? IS IT WORTH OTHERS CHECKING ON THE APPS OR OTHER FINDINGS YOU HAVE?
  • 17. IMPLICATIONS • Model1:odds ratio of 1.68 (95% CI 1.07 - 2.66) • apps that have a secure_random_check vulnerability are 1.68 times as likely to also have a keysize_check vulnerability than those apps that do not have a secure_random_check vulnerability • Model 2 : odds ratio of 1.80 (95% CI 1.14 - 2.90) • apps that have a secure_random_check vulnerability are 1.80 times as likely to also have a keysize_check vulnerability than those apps that do not have a secure_random_check vulnerability • Country Attribution • Associating Apps to Country of Origin • Global Associations

Hinweis der Redaktion

  1. Endale
  2. Endale
  3. Rhiannon
  4. Joseph 
  5. Stacy
  6. Endale
  7. Stacy
  8. Stacy
  9. Rhiannon
  10. Stacy
  11. Stacy
  12. Stacy
  13. Endale
  14. Stacy & Joseph 
  15. Joseph 
  16. Endale 
  17. Stacy and Joseph 
  18. Joseph