SlideShare a Scribd company logo
1 of 38
Download to read offline
Avoiding the Pandora Pitfall   Tyler Shields
 Secure Coding Practices for   Veracode Research
 Android Application Privacy   November 3, 2011
Mobile Security                    Privacy
  Landscape                      Implications


  START                                         END
     1                2              3          4
                  Case Studies                  Q&A
Risk - noun `risk
The possibility of loss or injury
PC Sensitive Data
         Financial data
        Corporate data
       Computing power
             Email
                              Call L
          Contact List              ogs!

            Photos
              …

                   ages!    MMS!
         Vi deo Im
SMS!
Mobile Mitigations
                   Patch methodology
                    Process isolation
               Reasonable permission model
                  Some disk encryption
                     Code signatures
                           …


                   DEP!
       irus!
Anti-V
10.9 billion mobile apps downloaded in
2010, according to IDC




                       Expected to rise to
                       76.9 billion apps by 2014
Part 1: Malicious Code
 Activity monitoring and data retrieval

    Unauthorized dialing, SMS, and
      payments

              Unauthorized network
               connectivity (exfiltration
               or command & control)

                 UI impersonation

                   System modification
                    (rootkit, APN proxy
                    config)
                 Logic or time bomb
Part 2: Code Vulnerabilities

Sensitive data leakage (inadvertent or side channel)

Unsafe sensitive data storage

Unsafe sensitive data transmission

Hardcoded password/keys
Case Study: Hardcoded Passwords
eys!
              passw ord or k
             ed
Hardcod
                                 g?!
!
                 cut –  Debuggin
  La    zy short
                                E!!
  !
                – Get  ALL FRE
    O   wn one
    !
      !
Case Study: Unsafe Data Transmission
Goo
                                                        gle
                                           Tran               Cale
                                               smi                ndar
                                                  tted     !         !
                                                  in c appoint
                                   on!                lear       m
              ebook      applicati                           text ent dat
Off icial Fac       rything e
                                xcept                            !        a
           ed eve
T ransmitt      in clear
                             text!
              d
    passwor       !
                                  es,
             privat    e messag
   Photos,               , etc!
          wall posts
                     !
                                   bled!
               Web-      SSL Ena
   E ven with
!
Or better yet…
                                           er!!
!
                  ert che cking all togeth
  Just disable c
                              WILD!
             As Seen In The
Case Study: Unsafe Data Writes
Imp
        rope
                 r Da
                      ta S
   Acc              !      tora
Paym   ount                      ge!
     ents        Nu
          , Se mbers,
                 cur         Bil
             Code ity Acc l
                   s!         ess
 WOR           !
WOR    LD_
     LD_ READAB
          WRI            L
                   TEA E!
             !          BLE!
           !
Impr
           oper
                  Data
                        Stor
    SQLi          !           age!
           te3 D
                    ataba
                !         se!
     Cont
            ac
     Chat t List!
               Logs
                      !
 WOR         !
WOR LD_REA
   LD_W           DA
            RIT BLE!
                    EABL
         !                E!
       !
Case Study: Data Exfiltration
WSJ Breaks Story on Pandora Investigation


              “Federal prosecutors in
              New Jersey are investigating
              whether numerous
              smartphone applications
              illegally obtained or
              transmitted information
              about their users without
              proper disclosures”
!
                         m     execution
              No progra
                           !
                                           urce!
                             bin ary or so
         Full c overage of
                             !               y!
                         of bu    g discover
            Wi der range
                               !            a !
                          by ru    ntime dat
             N ot limited

Sta
   tic                       -- JD-GUI!
         Ana                 -- Veracode Engine!
             lysi
                 s   !
JD-Gui Analysis
AdMob Location Requests
AdMob AndroidID Request
Medialets Location Request
Medialets AndroidID Requests
SecureStudies getDeviceID Request
Android Manifest Permissions

ACCESS_CHECKIN_PROPERTIES        DIAGNOSTIC                  READ_SYNC_STATS
ACCESS_COARSE_LOCATION           DISABLE_KEYGUARD            REBOOT
ACCESS_FINE_LOCATION             DUMP                        RECEIVE_BOOT_COMPLETED
ACCESS_LOCATION_EXTRA_COMMANDS   EXPAND_STATUS_BAR           RECEIVE_MMS
ACCESS_MOCK_LOCATION             FACTORY_TEST                RECEIVE_SMS
ACCESS_NETWORK_STATE             FLASHLIGHT                  RECEIVE_WAP_PUSH
ACCESS_SURFACE_FLINGER           FORCE_BACK                  RECORD_AUDIO
ACCESS_WIFI_STATE                GET_ACCOUNTS                REORDER_TASKS
ACCOUNT_MANAGER                  GET_PACKAGE_SIZE            RESTART_PACKAGES
AUTHENTICATE_ACCOUNTS            GET_TASKS                   SEND_SMS
BATTERY_STATS                    GLOBAL_SEARCH               SET_ACTIVITY_WATCHER
BIND_APPWIDGET                   HARDWARE_TEST               SET_ALARM
BIND_DEVICE_ADMIN                INJECT_EVENTS               SET_ALWAYS_FINISH
BIND_INPUT_METHOD                INSTALL_LOCATION_PROVIDER   SET_ANIMATION_SCALE
BIND_REMOTEVIEWS                 INSTALL_PACKAGES            SET_DEBUG_APP
BIND_WALLPAPER                   INTERNAL_SYSTEM_WINDOW      SET_ORIENTATION
BLUETOOTH                        INTERNET                    SET_PREFERRED_APPLICATIONS
BLUETOOTH_ADMIN                  KILL_BACKGROUND_PROCESSES   SET_PROCESS_LIMIT
BRICK                            MANAGE_ACCOUNTS             SET_TIME
BROADCAST_PACKAGE_REMOVED        MANAGE_APP_TOKENS           SET_TIME_ZONE
BROADCAST_SMS                    MASTER_CLEAR                SET_WALLPAPER
BROADCAST_STICKY                 MODIFY_AUDIO_SETTINGS       SET_WALLPAPER_HINTS
BROADCAST_WAP_PUSH               MODIFY_PHONE_STATE          SIGNAL_PERSISTENT_PROCESSES
CALL_PHONE                       MOUNT_FORMAT_FILESYSTEMS    STATUS_BAR
CALL_PRIVILEGED                  MOUNT_UNMOUNT_FILESYSTEMS   SUBSCRIBED_FEEDS_READ
CAMERA                           NFC                         SUBSCRIBED_FEEDS_WRITE
CHANGE_COMPONENT_ENABLED_STATE   PERSISTENT_ACTIVITY         SYSTEM_ALERT_WINDOW
CHANGE_CONFIGURATION             PROCESS_OUTGOING_CALLS      UPDATE_DEVICE_STATS
CHANGE_NETWORK_STATE             READ_CALENDAR               USE_CREDENTIALS
CHANGE_WIFI_MULTICAST_STATE      READ_CONTACTS               USE_SIP
CHANGE_WIFI_STATE                READ_FRAME_BUFFER           VIBRATE
CLEAR_APP_CACHE                  READ_HISTORY_BOOKMARKS      WAKE_LOCK
CLEAR_APP_USER_DATA              READ_INPUT_STATE            WRITE_APN_SETTINGS
CONTROL_LOCATION_UPDATES         READ_LOGS                   WRITE_CALENDAR
DELETE_CACHE_FILES               READ_PHONE_STATE            WRITE_CONTACTS
DELETE_PACKAGES                  READ_SMS                    WRITE_EXTERNAL_STORAGE
DEVICE_POWER                     READ_SYNC_SETTINGS          WRITE_GSERVICES
                                                             WRITE_HISTORY_BOOKMARKS
                                                             WRITE_SECURE_SETTINGS
                                                             WRITE_SETTINGS
                                                             WRITE_SMS
                                                             WRITE_SYNC_SETTINGS
Phone Calls
                                             Read Phone State and Identity

                                      System Tools
                                             Modify Global System Settings
                                             Prevent Device From Sleeping
        Permissions !

                                             Bluetooth Administration
                                             Change Wi-Fi State
                                             Change Network Connectivity
                                             Automatically Start at Boot


                                                                        Network Communication
                                                                              Full Internet Access
                                                                              Create Bluetooth Connections
                                                                              View Network State
                                                                              View Wi-Fi State
                                                                        Your Personal Information
                                                                              Read Contact Data
                                                                              Add or Modify Calendar Events
                                                                                and Send Email To Guests
https://market.android.com/details?id=com.pandora.android&feature=search_result – 4/25/2011
Just a bit deeper…




Google purchases AdMob for
$750 million dollars. Closed
        May, 2010
ESPN, CBS Interactive, Geico, Starbucks…

                                   100,000 – 500,000 installations
                                   Permissions:
                                   • FINE (GPS) LOCATION
                                   • COARSE (NETWORK-BASED) LOCATION
                                   • FULL INTERNET ACCESS


                                  5,000,000 – 10,000,000 installation
                                  Permissions:
                                  • RECORD AUDIO
                                  • CHANGE YOUR AUDIO SETTINGS
                                  • FINE (GPS) LOCATION
                                  • COARSE (NETWORK-BASED) LOCATION
                                  • FULL INTERNET ACCESS
                                  • MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD
                                    CONTENTS
                                  • PREVENT DEVICE FROM SLEEPING




Permissions retrieved from official Android Marketplace on 4/25/2011
CBS News Advertising Networks
TV.com Advertising Networks
One
                                                                              week
                                                                              later...




1.
     http://www.rollingstone.com/culture/blogs/gear-up/pandora-responds-to-
     claims-that-its-online-service-violates-user-privacy-20110415
Privacy?
Here are Some Numbers…


                                             Permissions Requeste
                                                                       d!
                                          24% GPS information
                                                                  (11,929)!
                                          8% Read Contacts (3,6
                                                                  26)!
 53,000 - # Of                            4% Send SMS (1,693)!
 Applications                             3% Receive SMS (1262
                                                               )!
                                          2%Record Audio (1100
 Analyzed!                                                     )!
                                         2% Read SMS (832)!
 !                                       1% Process Outgoing!
 ~48,000 Android    3 Average Numb
                                   er   of Calls (323)!
 Market!            Permissions         .5% Use Credentials (2
                                                                48)!
 ~5,000 3rd Party   Requested!
 Markets!           !
                    117 Most Reque
                                   sted
                    for Single
                    Application!
And Even More Numbers…
Total Third Party Libraries: ~83,000!
!
Top Shared Libraries "!
   38% com.admob (18,426 apps )!
   8% org.apache ( 3,684 apps )!
   6% com.google.android ( 2,838 apps )!
   6% com.google.ads ( 2,779 apps )!
   6% com.flurry ( 2,762 apps )!
   4% com.mobclix ( 2,055 apps )!
   4% com.millennialmedia ( 1,758 apps)!
   4% com.facebook ( 1,707 apps)!
Code Reuse
                                  Most Code Is!
                                            !
Outsourcing                           Reused!
                                    Outsourced!
                        3rd Party Libraries (with source)!
                        3rd Party Libraries (binary format)!
Third Party Libraries                     !
                         Nobody really knows what their
                                    code does!!
Risk Transference!
                                    !
                               Your code!
                             Your libraries!
                           Outsourced code!
                           3rd party libraries!
                            Purchased code!
                               COTS code!
                                      !
                                        !
                         Contract your vendors
                            to do the same!
I’ll Accept that Risk!

Pass it on over..
Tyler Shields                                                                         @txs
tshields@veracode.com
txs@donkeyonawaffle.org               Summary


                                           Case Studies!
                                   ape!          !
                          L andsc
                    rity            No Hardcoded Passwords! On
         ile  Secu                                               ly T      P
     Mob              !
                            atio ns !              !                  ake rivacy!
                     pplic k!                                              Wh
                l e A                 Encrypt Data In Transit!                  at Y
          Mobi High Ris                                        Be H
                                                                    one      !      ou
                                                                                        Nee
               Ar e                                  !                  st W                d!
                        !               !
                            bile  Code  Secure Data At Rest!           Use      ith
                                                                                    You
                 iou s Mo Flaws!                                            rs!         r!
          M  alic     Co  ding                         !       Be W      !
            M  obile                                                a
                                Analyze Security of ALL Code! Tran ry of R
                                                                    sfe
                                      (Includes Code Reuse)!             renc isk
                                                                               e !

More Related Content

What's hot (6)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Watermark
WatermarkWatermark
Watermark
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
SLASH-Seminar-security awareness-v1-0-20121212
SLASH-Seminar-security awareness-v1-0-20121212SLASH-Seminar-security awareness-v1-0-20121212
SLASH-Seminar-security awareness-v1-0-20121212
 

Viewers also liked

Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
Tyler Shields
 
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
Tyler Shields
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
Tyler Shields
 
Anti-Debugging - A Developers View
Anti-Debugging - A Developers ViewAnti-Debugging - A Developers View
Anti-Debugging - A Developers View
Tyler Shields
 

Viewers also liked (10)

Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Praetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile PrivacyPraetorian Veracode Webinar - Mobile Privacy
Praetorian Veracode Webinar - Mobile Privacy
 
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
United Security Summit 2011 - Using the Mobile Top 10 as a Guide to Assessing...
 
Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!Social and Mobile and Cloud - OH MY!
Social and Mobile and Cloud - OH MY!
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Anti-Debugging - A Developers View
Anti-Debugging - A Developers ViewAnti-Debugging - A Developers View
Anti-Debugging - A Developers View
 
Anti Debugging
Anti DebuggingAnti Debugging
Anti Debugging
 
Del Garabateo A La Escritura Convencional
Del Garabateo A La Escritura ConvencionalDel Garabateo A La Escritura Convencional
Del Garabateo A La Escritura Convencional
 

Similar to Avoiding the Pandora Pitfall

Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
Risk Crew
 
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud ComputingToward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
white paper
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
Journal For Research
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the Cloud
Roman Stanek
 
Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02
Scott Winter
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
DefconRussia
 

Similar to Avoiding the Pandora Pitfall (20)

Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficial
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Spiritualists, magicians and security vendors
Spiritualists, magicians and security vendorsSpiritualists, magicians and security vendors
Spiritualists, magicians and security vendors
 
How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Internet of Things (2015)
Internet of Things (2015)Internet of Things (2015)
Internet of Things (2015)
 
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud ComputingToward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
 
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades shortHacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades short
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Stop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designStop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by design
 
Designing ambient
Designing ambientDesigning ambient
Designing ambient
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the Cloud
 
Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02
 
OC Big Data Monthly Meetup #5 - Session 2 - Sumo Logic
OC Big Data Monthly Meetup #5 - Session 2 - Sumo LogicOC Big Data Monthly Meetup #5 - Session 2 - Sumo Logic
OC Big Data Monthly Meetup #5 - Session 2 - Sumo Logic
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 

More from Tyler Shields

Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsSurvey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
 
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointSource Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Tyler Shields
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Tyler Shields
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
Tyler Shields
 
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the BerriesRaleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
Tyler Shields
 
Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application Backdoors
Tyler Shields
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Tyler Shields
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
Tyler Shields
 
More Apps More Problems
More Apps More ProblemsMore Apps More Problems
More Apps More Problems
Tyler Shields
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
Tyler Shields
 
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerIT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
Tyler Shields
 
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone AttacksIT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
Tyler Shields
 
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile SpywareiSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
Tyler Shields
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Tyler Shields
 
GovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The BerriesGovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The Berries
Tyler Shields
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
Tyler Shields
 
The Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIRThe Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIR
Tyler Shields
 
CarolinaCon 2009 Anti-Debugging
CarolinaCon 2009 Anti-DebuggingCarolinaCon 2009 Anti-Debugging
CarolinaCon 2009 Anti-Debugging
Tyler Shields
 
CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2006 Reverse Engineering 101CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2006 Reverse Engineering 101
Tyler Shields
 

More from Tyler Shields (20)

Survey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital ForensicsSurvey of Rootkit Technologies and Their Impact on Digital Forensics
Survey of Rootkit Technologies and Their Impact on Digital Forensics
 
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers ViewpointSource Boston 2009 - Anti-Debugging A Developers Viewpoint
Source Boston 2009 - Anti-Debugging A Developers Viewpoint
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
 
Raleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the BerriesRaleigh ISSA 2010 - The Monkey Steals the Berries
Raleigh ISSA 2010 - The Monkey Steals the Berries
 
Static Detection of Application Backdoors
Static Detection of Application BackdoorsStatic Detection of Application Backdoors
Static Detection of Application Backdoors
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
 
More Apps More Problems
More Apps More ProblemsMore Apps More Problems
More Apps More Problems
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
IT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every LayerIT Hot Topics - Mobile Security Threats at Every Layer
IT Hot Topics - Mobile Security Threats at Every Layer
 
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone AttacksIT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
IT Hot Topics 2010 - The Coming Wave of Smartphone Attacks
 
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile SpywareiSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
iSec Forum NYC - Smartphone Backdoors an Analysis of Mobile Spyware
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
 
GovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The BerriesGovCert.NL - The Monkey Steals The Berries
GovCert.NL - The Monkey Steals The Berries
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
The Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIRThe Coming Wave of Smartphone Attacks - Texas DIR
The Coming Wave of Smartphone Attacks - Texas DIR
 
CarolinaCon 2009 Anti-Debugging
CarolinaCon 2009 Anti-DebuggingCarolinaCon 2009 Anti-Debugging
CarolinaCon 2009 Anti-Debugging
 
CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2006 Reverse Engineering 101CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2006 Reverse Engineering 101
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Avoiding the Pandora Pitfall

  • 1. Avoiding the Pandora Pitfall Tyler Shields Secure Coding Practices for Veracode Research Android Application Privacy November 3, 2011
  • 2. Mobile Security Privacy Landscape Implications START END 1 2 3 4 Case Studies Q&A
  • 3. Risk - noun `risk The possibility of loss or injury
  • 4. PC Sensitive Data Financial data Corporate data Computing power Email Call L Contact List ogs! Photos … ages! MMS! Vi deo Im SMS!
  • 5. Mobile Mitigations Patch methodology Process isolation Reasonable permission model Some disk encryption Code signatures … DEP! irus! Anti-V
  • 6. 10.9 billion mobile apps downloaded in 2010, according to IDC Expected to rise to 76.9 billion apps by 2014
  • 7. Part 1: Malicious Code Activity monitoring and data retrieval Unauthorized dialing, SMS, and payments Unauthorized network connectivity (exfiltration or command & control) UI impersonation System modification (rootkit, APN proxy config) Logic or time bomb
  • 8. Part 2: Code Vulnerabilities Sensitive data leakage (inadvertent or side channel) Unsafe sensitive data storage Unsafe sensitive data transmission Hardcoded password/keys
  • 10. eys! passw ord or k ed Hardcod g?! ! cut – Debuggin La zy short E!! ! – Get ALL FRE O wn one ! !
  • 11. Case Study: Unsafe Data Transmission
  • 12. Goo gle Tran Cale smi ndar tted ! ! in c appoint on! lear m ebook applicati text ent dat Off icial Fac rything e xcept ! a ed eve T ransmitt in clear text! d passwor ! es, privat e messag Photos, , etc! wall posts ! bled! Web- SSL Ena E ven with
  • 13. ! Or better yet… er!! ! ert che cking all togeth Just disable c WILD! As Seen In The
  • 14. Case Study: Unsafe Data Writes
  • 15. Imp rope r Da ta S Acc ! tora Paym ount ge! ents Nu , Se mbers, cur Bil Code ity Acc l s! ess WOR ! WOR LD_ LD_ READAB WRI L TEA E! ! BLE! !
  • 16. Impr oper Data Stor SQLi ! age! te3 D ataba ! se! Cont ac Chat t List! Logs ! WOR ! WOR LD_REA LD_W DA RIT BLE! EABL ! E! !
  • 17. Case Study: Data Exfiltration
  • 18. WSJ Breaks Story on Pandora Investigation “Federal prosecutors in New Jersey are investigating whether numerous smartphone applications illegally obtained or transmitted information about their users without proper disclosures”
  • 19. ! m execution No progra ! urce! bin ary or so Full c overage of ! y! of bu g discover Wi der range ! a ! by ru ntime dat N ot limited Sta tic -- JD-GUI! Ana -- Veracode Engine! lysi s !
  • 26. Android Manifest Permissions ACCESS_CHECKIN_PROPERTIES DIAGNOSTIC READ_SYNC_STATS ACCESS_COARSE_LOCATION DISABLE_KEYGUARD REBOOT ACCESS_FINE_LOCATION DUMP RECEIVE_BOOT_COMPLETED ACCESS_LOCATION_EXTRA_COMMANDS EXPAND_STATUS_BAR RECEIVE_MMS ACCESS_MOCK_LOCATION FACTORY_TEST RECEIVE_SMS ACCESS_NETWORK_STATE FLASHLIGHT RECEIVE_WAP_PUSH ACCESS_SURFACE_FLINGER FORCE_BACK RECORD_AUDIO ACCESS_WIFI_STATE GET_ACCOUNTS REORDER_TASKS ACCOUNT_MANAGER GET_PACKAGE_SIZE RESTART_PACKAGES AUTHENTICATE_ACCOUNTS GET_TASKS SEND_SMS BATTERY_STATS GLOBAL_SEARCH SET_ACTIVITY_WATCHER BIND_APPWIDGET HARDWARE_TEST SET_ALARM BIND_DEVICE_ADMIN INJECT_EVENTS SET_ALWAYS_FINISH BIND_INPUT_METHOD INSTALL_LOCATION_PROVIDER SET_ANIMATION_SCALE BIND_REMOTEVIEWS INSTALL_PACKAGES SET_DEBUG_APP BIND_WALLPAPER INTERNAL_SYSTEM_WINDOW SET_ORIENTATION BLUETOOTH INTERNET SET_PREFERRED_APPLICATIONS BLUETOOTH_ADMIN KILL_BACKGROUND_PROCESSES SET_PROCESS_LIMIT BRICK MANAGE_ACCOUNTS SET_TIME BROADCAST_PACKAGE_REMOVED MANAGE_APP_TOKENS SET_TIME_ZONE BROADCAST_SMS MASTER_CLEAR SET_WALLPAPER BROADCAST_STICKY MODIFY_AUDIO_SETTINGS SET_WALLPAPER_HINTS BROADCAST_WAP_PUSH MODIFY_PHONE_STATE SIGNAL_PERSISTENT_PROCESSES CALL_PHONE MOUNT_FORMAT_FILESYSTEMS STATUS_BAR CALL_PRIVILEGED MOUNT_UNMOUNT_FILESYSTEMS SUBSCRIBED_FEEDS_READ CAMERA NFC SUBSCRIBED_FEEDS_WRITE CHANGE_COMPONENT_ENABLED_STATE PERSISTENT_ACTIVITY SYSTEM_ALERT_WINDOW CHANGE_CONFIGURATION PROCESS_OUTGOING_CALLS UPDATE_DEVICE_STATS CHANGE_NETWORK_STATE READ_CALENDAR USE_CREDENTIALS CHANGE_WIFI_MULTICAST_STATE READ_CONTACTS USE_SIP CHANGE_WIFI_STATE READ_FRAME_BUFFER VIBRATE CLEAR_APP_CACHE READ_HISTORY_BOOKMARKS WAKE_LOCK CLEAR_APP_USER_DATA READ_INPUT_STATE WRITE_APN_SETTINGS CONTROL_LOCATION_UPDATES READ_LOGS WRITE_CALENDAR DELETE_CACHE_FILES READ_PHONE_STATE WRITE_CONTACTS DELETE_PACKAGES READ_SMS WRITE_EXTERNAL_STORAGE DEVICE_POWER READ_SYNC_SETTINGS WRITE_GSERVICES WRITE_HISTORY_BOOKMARKS WRITE_SECURE_SETTINGS WRITE_SETTINGS WRITE_SMS WRITE_SYNC_SETTINGS
  • 27. Phone Calls Read Phone State and Identity System Tools Modify Global System Settings Prevent Device From Sleeping Permissions ! Bluetooth Administration Change Wi-Fi State Change Network Connectivity Automatically Start at Boot Network Communication Full Internet Access Create Bluetooth Connections View Network State View Wi-Fi State Your Personal Information Read Contact Data Add or Modify Calendar Events and Send Email To Guests https://market.android.com/details?id=com.pandora.android&feature=search_result – 4/25/2011
  • 28. Just a bit deeper… Google purchases AdMob for $750 million dollars. Closed May, 2010
  • 29. ESPN, CBS Interactive, Geico, Starbucks… 100,000 – 500,000 installations Permissions: • FINE (GPS) LOCATION • COARSE (NETWORK-BASED) LOCATION • FULL INTERNET ACCESS 5,000,000 – 10,000,000 installation Permissions: • RECORD AUDIO • CHANGE YOUR AUDIO SETTINGS • FINE (GPS) LOCATION • COARSE (NETWORK-BASED) LOCATION • FULL INTERNET ACCESS • MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD CONTENTS • PREVENT DEVICE FROM SLEEPING Permissions retrieved from official Android Marketplace on 4/25/2011
  • 32. One week later... 1. http://www.rollingstone.com/culture/blogs/gear-up/pandora-responds-to- claims-that-its-online-service-violates-user-privacy-20110415
  • 34. Here are Some Numbers… Permissions Requeste d! 24% GPS information (11,929)! 8% Read Contacts (3,6 26)! 53,000 - # Of 4% Send SMS (1,693)! Applications 3% Receive SMS (1262 )! 2%Record Audio (1100 Analyzed! )! 2% Read SMS (832)! ! 1% Process Outgoing! ~48,000 Android 3 Average Numb er of Calls (323)! Market! Permissions .5% Use Credentials (2 48)! ~5,000 3rd Party Requested! Markets! ! 117 Most Reque sted for Single Application!
  • 35. And Even More Numbers… Total Third Party Libraries: ~83,000! ! Top Shared Libraries "! 38% com.admob (18,426 apps )! 8% org.apache ( 3,684 apps )! 6% com.google.android ( 2,838 apps )! 6% com.google.ads ( 2,779 apps )! 6% com.flurry ( 2,762 apps )! 4% com.mobclix ( 2,055 apps )! 4% com.millennialmedia ( 1,758 apps)! 4% com.facebook ( 1,707 apps)!
  • 36. Code Reuse Most Code Is! ! Outsourcing Reused! Outsourced! 3rd Party Libraries (with source)! 3rd Party Libraries (binary format)! Third Party Libraries ! Nobody really knows what their code does!!
  • 37. Risk Transference! ! Your code! Your libraries! Outsourced code! 3rd party libraries! Purchased code! COTS code! ! ! Contract your vendors to do the same! I’ll Accept that Risk! Pass it on over..
  • 38. Tyler Shields @txs tshields@veracode.com txs@donkeyonawaffle.org Summary Case Studies! ape! ! L andsc rity No Hardcoded Passwords! On ile Secu ly T P Mob ! atio ns ! ! ake rivacy! pplic k! Wh l e A Encrypt Data In Transit! at Y Mobi High Ris Be H one ! ou Nee Ar e ! st W d! ! ! bile Code Secure Data At Rest! Use ith You iou s Mo Flaws! rs! r! M alic Co ding ! Be W ! M obile a Analyze Security of ALL Code! Tran ry of R sfe (Includes Code Reuse)! renc isk e !