Fingerprints On Mobile Devices: Abusing and Leaking

Size: px
Start display at page:

Download "Fingerprints On Mobile Devices: Abusing and Leaking"

Transcription

1 Fingerprints On Mobile Devices: Abusing and Leaking I. Introduction YulongZhang,ZhaofengChen,HuiXue,andTaoWei FireEyeLabs Fingerprintscannersarebecomingmoreandmorepopularonthemodernmobiledeviceslike HTCOneMax,HuaweiMate7,iPhone5s/6/6+,andSamsungGalaxyS5.Basedonarecent projection[1],50%ofsmartphoneshipmentswillhaveafingerprintsensorby2019.those fingerprintscannersaremorethanjustagimmicktounlockyourphonexxtheycanalsoletyou convenientlyauthorizemoneytransactionswithaswipeofyourfinger.withtheintroductionof ApplePay,mobilepaymentisgoingtobeaprimarydriverforfingerprintsensors.Mostof ApplescompetitorshavereactedquicklytomatchApplesmobilepaymentleadinthemarket. However,howsecurethosefingerprintframeworksaredesignedremainsthecustomers biggestconcern.inthetraditionalpasswordxbasedauthsystems,victimscaneasilyreplacethe stolenpasswordswithanewone.butfingerprintslastforalifexxonceleaked,theyareleaked fortherestofyourlife.moreover,fingerprintsareusuallyassociatedwitheverycitizen sidentity, immigrationrecord,etc.itwouldbeahazardiftheattackercanremotelyharvestfingerprintsin alargescale. Previouslytherehavebeensomeworksfocusingonfingerprintspoofingattack[2][3].These worksdemonstratethatfingerprintscanbestolenfrompolishedsurfaces(e.g.smartphone screens)orfromawavinghandphoto,andcanbespoofedusingelectricallyconductive materials.wecategorizethistypeofattackasopticalattacks.inthispaper,wewillratherfocus onthesystemattacksofmobilefingerprintauthframework.toourknowledge,wearethefirst todiscussthistypeofthreats. Wewillanalyzethemobilefingerprintauthenticationandauthorizationframeworks,anddiscuss severalsecuritypitfallsofthecurrentdesigns,including: ConfusedAuthorizationAttack Unsecurefingerprintdatastorage Trustedfingerprintsensorsexposedtotheuntrustedworld BackdoorofpreXembeddingfingerprints Thispaperisstructuredasfollows:wewillintroducethebackgroundoffingerprintauth frameworkinsectionii,anddescribedetailedvulnerabilitiesinsectioniii.furtherdiscussions willbeprovidedinsectioniv.weconcludethepaperinsectionv.

2 II. Background 1. Original Mobile Fingerprint Auth Framework Figure1:Originalmobilefingerprintauthframework Figure1illustratesthenormaldesignofmobilefingerprintauthentication/authorization framework.anexampledevicewiththisdesignishtconemax.inthisdesign,thekernel interactsdirectlywiththefingerprintsensor,andvendorfingerprintlibraries(nativecode)and fingerprintservices(javacode)providefunctionalwrappingofcommonfingerprintauth operations.thehighlevelauthlogicisimplementedinspecificappsbyinvokingvendor exposedapis. ThereisanobvioussecurityweaknesswiththisdesignXXthefingerprintsarejustassecureas thekernel.iftheattackerrootsthedevice,he/shecanstealthefingerprintdata.unfortunately therearequiteafewpublicknownkernelvulnerabilitiesthatcanbeexploitedtorootthe majorityofandroiddevices,likeframaroot[4],towelroot[5],andpingpongroot[6],etc.thus thevendorsarenowmovingtoamoresecureddesignwiththehelpofarmtrustzone[7]. 2. Mobile Fingerprint Auth Framework with TrustZone

3 Figure2:TrustZoneisolationonmobiledevices Figure3:TheimprovedmobilefingerprintauthframeworkwithTrustZoneisolation Figure2showsthegeneralarchitectureformobileplatformsequippedwithTrustZone. TrustZoneisolatesthenormalworld(thenormaluser/kernelmode)andthesecureworld (TrustedExecutionEnvironments,orTEE)bycreatingadditionaloperatingmodes,knownas thesecuremodeandthemonitormode.thesecuremodehasthesamecapabilitieswiththe normalworldwhileoperatinginaseparatememoryspace.thetrustzonemonitoractsasa virtualgatekeepercontrollingmigrationbetweenthetwoworlds.thenormalworldcanissue requeststothesecureworldviasecuremonitorcalls(smc). Sincethenormalworldcannottouchthesecureworld smemory,fingerprintscanbewell protectedintrustzonefrombeingaccessedbynormalworldattackers.figure3depictsthe enhancedfingerprintauthframeworkutilizingtrustzone sprotection.inthisdesign,the fingerprintsensordriver,fingerprintrecognitionlogic,andthefingerprintdataareallisolatedin thesecureworld,sothefingerprintauthframeworkremainssecureevenifthenormalworld kerneliscompromised.

4 Althoughtheenhanceddesignhasbeenmuchsecurerthantheoriginaldesign,inthenext sectionwewillrevealthattherearestillmanyseveresecuritypitfalls. III. Vulnerabilities 1. Confused Authorization Attack Thefirstvulnerabilityisthatallthefingerprintframeworksarepronetothe Confused AuthorizationAttack,whichhaslongbeenoverlooked.Authorizationgrantsaccessrightsto resources,whileauthenticationverifieswhoyouare.securitysystemsoftenmistakenlytreat authorizationasauthentication,orfailtoprovidecontextprooffortheauthorizationobjects. Withoutpropercontextproof,theattackercanmisleadthevictimtoauthorizeamalicious transactionbydisguisingitasanauthenticationoranothertransaction.forexample,asshown infigure4,theattackercaneasilyfakealockscreentofoolthevictimtothinkthathe/sheis swipingfingertounlockthedevice,butthefingerprintisactuallyusedtoauthorizeamoney transferinthebackground. CurrentlytheFIDOAllianceisdevelopingthespecificationofsecureauthenticationand authorizationprotocolsforthemobileecosystem.asfidodescribesinthespecification[12]: Basically(if(a(FIDO(UAF(Authenticator(has(a(transaction(confirmation(display(capability,(FIDO( UAF(architecture(makes(sure(that(the(system(supports(What(You(See(is(What(You(Sign(mode( (WYSIWYS).(A(number(of(different(use(cases(can(derive(from(this(capability(EE(mainly(related(to( authorization(of(transactions((send(money,(perform(a(context(specific(privileged(action,( confirmation(of( /address,(etc). FIDO sspecificationrequiresthat the(transaction(confirmation(display(component(implementing( WYSIWYS(needs(to(be(trusted.However,theoriginalfingerprintauthframeworkhasno reliablewaytoprovidetheauthorizationcontextproof.theframeworkwithtrustzonecanbe improvedtoachievethisgoal(thetrustletmodulesintrustzonecanbemodifiedtoprovidethe contextproof),butsofar(june2015)wehaven tseenanymajorvendorthatimplementedthis feature.

5 Figure4:Illustrationofusingconfusedauthorizationattacktoauthorizemoneytransfer 1 2. Fingerprint Data Storage Vulnerability Thesecondissueisthatnotallthevendorsstorethefingerprintssecurely.Whilesomevendors claimedthattheystoreuser sfingerprintsencryptedinasystempartition,theyputusers fingerprintsinplaintextandinaworldxreadableplacebymistake.oneexampleishtcone MaxXXthefingerprintissavedas/data/dbgraw.bmpwith0666permission(worldXreadable) 2. Anyunprivilegedprocessesorappscanstealuser sfingerprintsbyreadingthisfile.other vendorsstorefingerprintsintrustzoneorsecureenclave,buttherearestillknown vulnerabilitiesforattackerstoleveragetopeekintothesecretworld[8][9]. Tomakethesituationevenworse,eachtimethefingerprintsensorisusedforauthoperation, theauthframeworkwillrefreshthatfingerprintbitmaptoreflectthelatestwipedfinger.sothe attackercansitinthebackgroundandcollectthefingerprintimageofeveryswipeofthevictim. Notethatthereissomespecialtyoftheformatoftherawfingerprintbitmapimage.Normallythe sizeofeachbitmaprowisroundeduptoamultipleof4bytesbypadding.butasamplerowof therawfingerprintbitmaplookslike: 01 FE A0 A0 A0 A0 A0 A0 B0 A0 80 [...] B0 B0 B0 A0 B0 A0 A0 A0 A0 A0 A0 A0 90 A0 A B Thisisageneralissueforfingerprintbasedpaymentformobile.Thedeviceshownisjustforillustration andisnotnecessarilyvulnerable. 2 HTChaspatchedthisvulnerabilityperournotification

6 Weobservedthatalltherowsstartwith0xFE01.Thisisprobablyusedtomarkthebeginningof eachfingerprintimageline.andeachlinehas187bytesofdata(including0xfe01),whichis not4xbytealigned.ifoneopenstherawfingerprintbitmapimagedirectly,itwilllooklikefigure 5(a).Afterappropriatelypadding,itwillbecorrectlylooklikeFigure5(b).Thefingerprintbitmap imageisblurryinthebottomandhasmoredetailsintheupperpart.also,onemaynoticethat theimageisvisiblyseparatedintotwohorizontalparts,andtheleftpartisalmosttwicethewidth oftherightpart.thisisthedesignnatureofcertainsensorchips.wejustpresenttheimageas itis. (a)(b) Figure5:FingerprintbitmapobtainedfromHTCOneMax.Boththerawbitmap(a)andthereX alignedversion(b)areshown.weonlypastedasmallportionoftheimagestoprotectthe fingerprintowner sanonymity. 3. Fingerprint Sensor Exposure Vulnerability EveniftheprotectionoffingerprintdatainTrustZoneisindeedtrustworthy,itonlymeansthat thefingerprintspreviouslyregisteredonthedevicesaresecured.wefoundthatthefingerprint sensoritselfinmanydevicesisstillexposedtotheattackers.althoughthearmarchitecture enablesisolatingcriticalperipheralsfrombeingaccessedoutsidetrustzone(e.g.by programmingthetrustzoneprotectioncontroller),mostvendorsfailtoutilizethisfeatureto protectfingerprintsensors 3.Tothebestofourknowledge,wearethefirstoftheworldtoput forwardthefingerprintsensorspyingthreats. 3 Asofwriting,wehaveconfirmedthisvulnerabilityonHTCOneMax,SamsungGalaxyS5,etc.All vendorshaveprovidedpatchesperournotification.

7 Figure6:Hownormalworldissupposedtointeractwiththefingerprintsensor(TrustZone shouldalwaysactasthemediator) Figure7:Malwareinthenormalworldcandirectlyreadthefingerprintsensor AsshowninFigure6,insteadofdirectlycommunicatingwiththefingerprintsensor,allthe normalworldcomponentsaresupposedtoinvokethetrustzonefingerprintforsensor operations.however,mostvendorsfailtolockdownthesensor(frombeingaccessedbythe normalworldprograms)whentheprocessorswitchedbackfromthesecureworld.withoutthe properlockxdown,theattackerfromnormalworldcandirectlyreadthefingerprintsensor(shown infigure7).notethatattackerscandothisstealthilyinthebackgroundandtheycankeep readingthefingerprintsoneverytouchofthevictim sfingers.thisalsoindicatesthatattackers withremotecodeexecutionexploits(e.g.[11])canremotelyharvesteveryone sfingerprintsina largescale,withoutbeingnoticed. Giventhatthefingerprintsensorisexposedtothenormalworld,theonlyprotectionisthe accesspermissionenforcedbythenormalworldkernel.unfortunately,onsomephones,the sensorisonlyguardedby system privilegeinsteadof root.thisdecreasestheattack difficultysincetherearesomeeasierxtoxexploitvulnerabilities(e.g.cvex2015x1474)togainthe system privilegecomparedtothe root privilege.

8 Afterobtainingenoughprivilegetoread/writethesensor,theremainingmatterishowto configurethesensorintothestatetoactivelyreadfingerprints.usuallythefingerprintsensor s IOoperationsareopenXsourcedandmayincludethefollowing: IOCTL_POWER_ON IOCTL_POWER_OFF IOCTL_DEVICE_RESET IOCTL_SET_CLK IOCTL_CHECK_DRDY IOCTL_SET_DRDY_INT IOCTL_REGISTER_DRDY_SIGNAL IOCTL_SET_USER_DATA IOCTL_GET_USER_DATA IOCTL_DEVICE_SUSPEND IOCTL_STREAM_READ_START IOCTL_STREAM_READ_STOP IOCTL_RW_SPI_MESSAGE IOCTL_GET_FREQ_TABLE IOCTL_DISABLE_SPI_CLOCK IOCTL_SET_SPI_CONFIGURATION IOCTL_RESET_SPI_CONFIGURATION IOCTL_GET_SENSOR_ORIENT Notethatforcertainimplementations,althoughthesensorgotexposedtothenormalworld,the normalworldkernelhasstrippedoutcertainioctlhandlers.malwarecanutilizesomekernel exploittodynamicallyenablesuchfunctionalities(e.g.throughcodeinjectionorrop).malware withrootprivilegecanalsoflashacustomizedkernelwithsuchioctlhandlersenabledintothe Android sbootpartition. MalwarecanuseIOCTL_REGISTER_DRDY_SIGNAL toregisterastheeventsignallistenerofthe sensordevice.thenitcansequentiallyinvokeioctl_power_on,ioctl_set_clk, IOCTL_DEVICE_RESET,IOCTL_SET_DRDY_INT,IOCTL_CHECK_DRDY, IOCTL_STREAM_READ_START,etc.toinitializethedevicetotheactivelyreadingfingerprintsstate. Oncethesensorisintheactivereadingstate,malwarecankeepstealingusers fingerprints silentlyinthebackground.forsomedevices,thefingerprintsensorisintegratedontothehome button,whichmeansthattheattackercanstealusers fingerprintsoneverytouchofthehome button. 4. Pre-embedded Fingerprint Backdoor Moreover,theattackerscanstealthilyembedprefabricatedfingerprintsinthedevicesasan authorizationbackdoor,beforeprovidinganewdevicetothevictim.therootcauseofthis vulnerabilityisthattheuidisplayingthenumberofregisteredfingerprintsisaseparate

9 component(inthenormalworld,withouttrustzone sprotection)fromtheactualfingerprintauth frameworkinthesecureworld.attackerscandeceivetheusertobelievethatthereareonlyn fingerprintregisteredonthedevicebutthereareactuallymorethann.suchextraprex embeddedfingerprintcanbeusedtobypasstheauthframeworklikeabackdoor. ItisusuallytheSettingsappthatdisplaystheregisteredfingerprintnumbertotheusers,sothe attackerneedstomodifythesettingsapp.forexample,onmanydevices,onecanmodifythe enrolledfingerprintnummethodof!the!class com/android/settings/fingerprint/fingerprintsettingsinsecsettings.apk,by changingthereturnvalueofgetenrolledfingerstobenem,wherenistheactualregistered fingerprintnumberandmisthenumberoffingerprintsprexembeddedbytheattacker. NotethatSettingsisasystemapp,theattackerneedstosigningthemodifiedSettingsappwith thesameprivatekeythatsignstheothersystemapps,whichisthephonevendor sprivatekey anddifficultforattackerstoobtain.theattackercouldalsoextracttheromandresigningall thesystemapps(includingthereplacedsettingsapp)usingtheattacker sownprivatekey. Iftheattackerhasrootprivilege,anotheralternativeistodirectlydisablethesystemsignature checking.mostofandroiddevicesenforcethesystemsignaturecheckingbasedonthe comparesignaturesmethodintheclasscom/android/server/pm/packagemanagerservice implementedin/system/framework/services.jar.itwillreturnzeroifsignaturematch,and nonxzerootherwise.therefore,onecanmodifythismethodtoalwaysreturnzero,sothatthe systemsignaturecheckingwillalwayssuccess. IV. Discussion 1. Suggestions to mobile users and vendors Toavoidbeingattackedbymalwareorbeingexploitedforremotecodeexecution,wesuggest normaluserstochoosemobiledevicevendorswithtimelypatching/upgradingtothelatest version(e.g.androidlollipop),andalwayskeepyourdeviceuptodate.also,itisalwaysa goodpracticetoinstallpopularappsfromreliablesources.enterprise/governmentusersshould seekforprofessionalservicestogetprotectionsagainstadvancedtargetedattacks. Mobiledevicevendorsshouldimprovethesecuritydesignofthefingerprintauthframeworkwith improvedrecognitionalgorithmagainstfakefingerprintattacks,andbetterprotectionofboth fingerprintdataandthescanningsensor.moreover,vendorsshouldfigureouthowto differentiateauthorizationwithauthenticationandprovidecontextproof.theexistingfingerprint authstandardshouldbefurtherimprovedtoprovidemoredetailedandsecuredguidelinesfor

10 developerstofollow.finally,givenasecuritystandard,vendorsstillneedprofessionalsecurity vetting/auditstoenforcesecureimplementations. 2. Suggestions to the overall fingerprint auth ecosystem Actuallyallthefourvulnerabilities/attacksdescribedinthispaperarecommonlyapplicabletoall thefingerprintbasedauthentication/authorizationplatforms.forexample,manyhighxend laptopsequipfingerprintscannerstoauthenticateandauthorizeuserlogin.sincethefingerprint driverisakernelmodule,itisonlyassecureasthekernel.attackerswithkernelexploitcan stealfingerprintdataorcollectfingerprintfromthesensorinthebackground. Forexternalfingerprintscannersusedforidentityrecognition(e.g.inthecustomhouse, immigrationoffice,andthedmv),dooraccesscontrol,ormoneytransactioninbanks,the situationissimilar.sowesuggestthatthefingerprintauthframeworkforallplatformsshould alsobeimprovedtobetterprotectfingerprintdataandsensor(andprovidedefenseofanyother attacksdescribedinthispaperifapplicable). V. Conclusion Inthistalk,werevealedsomesevereissueswiththecurrentAndroidfingerprintframeworksthat havelongbeenneglectedbyvendorsandusers.weprovidedinxdepthsecurityanalysisofthe popularmobilefingerprintauthentication/authorizationframeworks,anddiscussedthesecurity problemsofexistingdesigns,including(1)theconfusedauthorizationattackthatenables malwaretobypasspayauthorizationsprotectedbyfingerprints,(2)insecurefingerprintdata storage,(3)fingerprintsensorexposedtotheuntrustedworld,and(4)prexembeddedfingerprint backdoor.wealsoprovidedsuggestionsforvendorsanduserstobettersecurethefingerprints. References [1] [2] [3] [4] [5] [6] [7] [8] [9] android [10] pc_bp147_to.pdf

11 [11] AndroidXInXTheXGoldenXAgeXOfXAdXLibs.pdf [12]

The Android Developers Guide to 3 rd -Party SDK Assessment and Security

The Android Developers Guide to 3 rd -Party SDK Assessment and Security SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed

More information

How we keep harmful apps out of Google Play and keep your Android device safe

How we keep harmful apps out of Google Play and keep your Android device safe How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,

More information

What someone said about junk hacking

What someone said about junk hacking What someone said about junk hacking Yes, we get it. Cars, boats, buses, and those singing fish plaques are all hackable and have no security. Most conferences these days have a whole track called "Junk

More information

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization

More information

FIDO Trust Requirements

FIDO Trust Requirements FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms

More information

Exploiting Trustzone on Android

Exploiting Trustzone on Android 1 Introduction Exploiting Trustzone on Android Di Shen(@returnsme) [email protected] This paper tells a real story about exploiting TrustZone step by step. I target an implementation of Trusted Execution

More information

McAfee Vulnerability Manager 7.5.1

McAfee Vulnerability Manager 7.5.1 McAfee Vulnerability Manager 7.5.1 The McAfee Vulnerability Manager 7.5.1 quarterly release adds features to the product without having to wait for the next major release. This release notes file contains

More information

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann 2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY Axel Hoffmann Biography Axel Hoffmann Linux System Administrator 1&1 Mail & Media Dev. & Tech. GmbH [email protected] 2 Introduction Requirements

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

Threat Model for Mobile Applications Security & Privacy www.datatheorem.com

Threat Model for Mobile Applications Security & Privacy www.datatheorem.com Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,

More information

How Secure is Authentication?

How Secure is Authentication? FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site

More information

PAKITI Patching Status System

PAKITI Patching Status System PAKITI Patching Status System EGI-InSPIRE A Race for Security: Identifying Vulnerabilities on 50 000 Hosts Faster then Attackers Michal Procházka 1, Daniel Kouřil 1, Romain Wartel 2, Christos Kanellopoulos

More information

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex

More information

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna

More information

How to remove Encrypted File guide. How to manually remove Encrypted File

How to remove Encrypted File guide. How to manually remove Encrypted File How to remove File guide This guide can be used only by Advanced PC users! If you are not an Advanced PC user, you can harm your PC. For fast and easy File removal you can download OSHI Defender. DOWNL

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

Scalable Authentication

Scalable Authentication Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors

More information

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running

More information

PFP Technology White Paper

PFP Technology White Paper PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions

More information

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. Yuchen Zhou and David Evans Presented by Yishan

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. Yuchen Zhou and David Evans Presented by Yishan SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans Presented by Yishan Background Single Sign-On (SSO) OAuth Credentials Vulnerabilities Single

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3. PR11 - Log Review Procedure Document Reference PR11 - Log Review Procedure Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 12 January 2010 - Initial release. 1.1 14 September

More information

Security Technology for Smartphones

Security Technology for Smartphones Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate

More information

Security in Android apps

Security in Android apps Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps

More information

Android Security 2015 Year In Review

Android Security 2015 Year In Review Android Security 2015 Year In Review April 2016 Contents 3 Overview 7 Google Security Services for Android 25 Android Platform Security 33 Ecosystem Data 43 Noteworthy PHAs and Vulnerabilities 48 Appendix

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

Windows Phone 7 Internals and Exploitability

Windows Phone 7 Internals and Exploitability Windows Phone 7 Internals and Exploitability (abridged white paper) Tsukasa Oi Research Engineer 目 次 1. Abstract... 3 2. Introduction: Windows Phone 7 and Analysis... 3 3. Security Analysis Windows Phone

More information

Software that provides secure access to technology, everywhere.

Software that provides secure access to technology, everywhere. Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How

More information

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, 2015. This document is the property of Bomgar Corporation.

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, 2015. This document is the property of Bomgar Corporation. Bomgar Corporation Bomgar Application Security Assessment Summary January 26, 2015 This document is the property of Bomgar Corporation. Report Author Customer Project Document Control Document Control

More information

Information Security for Modern Enterprises

Information Security for Modern Enterprises Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.

More information

Change Management. Why Change Management? CHAPTER

Change Management. Why Change Management? CHAPTER Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements

More information

Penetration testing. A step beyond missing patches and weak passwords

Penetration testing. A step beyond missing patches and weak passwords Penetration testing A step beyond missing patches and weak passwords June 25 th, 2012 Eirik Thormodsrud Graduated from the ISG in 2006 Employed by Ernst & Young Norway ever since (5 ½ years) Manager at

More information

Research on Situation and Key Issues of Smart Mobile Terminal Security

Research on Situation and Key Issues of Smart Mobile Terminal Security Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has

More information

BYPASSING THE ios GATEKEEPER

BYPASSING THE ios GATEKEEPER BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY

More information

Data Masking Best Practices

Data Masking Best Practices Data Masking Best Practices 1 Information Security Risk The risk that sensitive information becomes public 2 Information Security Risk Government systems store a huge amount of sensitive information Vital

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

CDM Software Asset Management (SWAM) Capability

CDM Software Asset Management (SWAM) Capability CDM Software Asset Management (SWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT

More information

Tutorial on Smartphone Security

Tutorial on Smartphone Security Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization

More information

CITY OF BOULDER *** POLICIES AND PROCEDURES

CITY OF BOULDER *** POLICIES AND PROCEDURES CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of

More information

Unknown threats in Sweden. Study publication August 27, 2014

Unknown threats in Sweden. Study publication August 27, 2014 Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Security and Cloud Computing

Security and Cloud Computing Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

Configuring Email on Mobile Devices

Configuring Email on Mobile Devices 1 Configuring Email on Mobile Devices Contents Android IMAP... 3 Android - POP3... 7 iphone IMAP... 10 iphone - POP3... 13 2 Android IMAP The look and feel of each Android device can be different based

More information

The Mobile Problem. Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India

The Mobile Problem. Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India The Mobile Problem Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India M 3 AAWG Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity Summit Desired Outcomes 1.

More information

Secunia Vulnerability Intelligence Manager (VIM) 4.0

Secunia Vulnerability Intelligence Manager (VIM) 4.0 Secunia Vulnerability Intelligence Manager (VIM) 4.0 In depth Real-time vulnerability intelligence brought to you on time, every time, by Secunia s renowned research team Introduction Secunia is the world-leading

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

Analysis of Secure Key Storage Solutions on Android

Analysis of Secure Key Storage Solutions on Android Analysis of Secure Key Storage Solutions on Android Tim Cooijmans, Joeri de Ruiter, Erik Poll Digital Security, Radboud University Nijmegen Mobile payments App to transfer money or pay in a shop Transaction

More information

FIDO Security Reference

FIDO Security Reference FIDO Security Reference FIDO Alliance Proposed Standard 09 October 2014 This version: https://fidoalliance.org/specs/fido uaf authnr metadata service v1.0 ps 20141009.html Previous version: https://fidoalliance.org/specs/fido

More information

Top 8 Steps for Effective Mobile Security

Top 8 Steps for Effective Mobile Security Top 8 Steps for Effective Mobile Security Larry Pesce With thanks to Chris Crowley and Joshua Wright Top 8 Steps for Effective Mobile Security 2012 Chris Crowley/Joshua Wright 1 Outline Three Truths About

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore CYBER TRENDS & INDUSTRY PENETRATION TESTING Technology Risk Supervision Division Monetary Authority of Singapore A NEW DAWN New Services / Mobile Application, NFC, FAST Technology / Biometrics, Big Data,

More information

Advanced ANDROID & ios Hands-on Exploitation

Advanced ANDROID & ios Hands-on Exploitation Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages

More information

e-government Agency Delivering Secure, Public-Oriented e-government Facilities in Africa A Holistic Approach

e-government Agency Delivering Secure, Public-Oriented e-government Facilities in Africa A Holistic Approach THE UNITED REPUBLIC OF TANZANIA President s office, Public Service Management e-government Agency Delivering Secure, Public-Oriented e-government Facilities in Africa A Holistic Approach Dr. Jabiri Kuwe

More information

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates

More information

An Information Security and Privacy Perspective for Procurement Services Projects

An Information Security and Privacy Perspective for Procurement Services Projects MANAGEMENT OF DATA: An Information Security and Privacy Perspective for Procurement Services Projects Presentation for: Procurement Services Senior Leadership Meeting Presented by: Ann Nagel, Associate

More information

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!

More information

Introduction to SquareTrade Security Services

Introduction to SquareTrade Security Services The SquareTrade branded seal on our web site gives our customers confidence and trust in our site that their online transactions will not be compromised. - Paul Sarver Jr., www.mytableware.com Introduction

More information

Topic 5a Operating System Fundamentals

Topic 5a Operating System Fundamentals Topic 5a Operating System Fundamentals What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O, etc.) process and control software memory management

More information

SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities

SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities 123456 SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities Yuchen Zhou David Evans 1 http://www.ssoscan.org/ Single Sign-On Service 2 Single Sign-On Workflow Integrator (e.g.,

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS

HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS The 20 Critical Security Controls published by the SANS Institute are a practical set of tactics focused on protecting an organization

More information

Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10

Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10 SESSION ID: ASD-T10 Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10 Daniel Miessler Security Research HP Fortify on Demand @danielmiessler HP Fortify on Demand

More information

How To Test A Control System With A Network Security Tool Like Nesus

How To Test A Control System With A Network Security Tool Like Nesus Using the Nessus Vulnerability Scanner on Control Systems By Dale Peterson All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control

More information

State of Security. Top Five Critical Issues Affecting Servers. Decisive Security Intelligence You Can Use. Read Our Predictions for 2013 and Beyond

State of Security. Top Five Critical Issues Affecting Servers. Decisive Security Intelligence You Can Use. Read Our Predictions for 2013 and Beyond July 2014 State of Security Top Five Critical Issues Affecting Servers Decisive Security Intelligence You Can Use Read Our Predictions for 2013 and Beyond Cyber security has never been more important in

More information

NOK NOK LABS AUTHENTICATION & OTT SERVICES

NOK NOK LABS AUTHENTICATION & OTT SERVICES NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1 NOK NOK LABS The authentication challenge A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME...

More information

A Study of Android Application Security

A Study of Android Application Security A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri USENIX Security Symposium August 2011 Systems and Internet Infrastructure Security Laboratory

More information

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Running head: USING NESSUS AND NMAP TOOLS 1

Running head: USING NESSUS AND NMAP TOOLS 1 Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:

More information

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks! ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE

More information

QUIRE: : Lightweight Provenance for Smart Phone Operating Systems

QUIRE: : Lightweight Provenance for Smart Phone Operating Systems QUIRE: : Lightweight Provenance for Smart Phone Operating Systems Dan S. Wallach Rice University Joint work with Mike Dietz, Yuliy Pisetsky, Shashi Shekhar, and Anhei Shu Android's security is awesome

More information