WILL ANDROID TROJAN, WORM OR ROOTKIT SURVIVE IN SEANDROID AND CONTAINERIZATION?
|
|
|
- Marvin Anderson
- 9 years ago
- Views:
Transcription
1 WILL ANDROID TROJAN, WORM OR ROOTKIT SURVIVE IN SEANDROID AND CONTAINERIZATION? Rowland YU and William Lee Sophos Abstract SEAndroid and containerization have become buzzwords in mobile security over the last year. Both of them supply an isolated working environment for Android devices. Moreover, both have a main goal of trying to minimize the damage that can be caused by malicious applications, intruders, exploits and vulnerabilities. SEAndroid stands for Security Enhancements for Android, which defines and enforces a system-wide security policy over all processes, objects and operations. It blocks extra privileges escalated by applications, separates applications from each other and the system, or prevents the bypass of security features. On the other hand, containerization refers to the ability to separate an encrypted zone on a device and manage access to the zone. In other words, it not only secures data on device, but also controls how applications can access, share and use the data. Android 5.0 is trying to set itself up as a safe corporate mobile operating system by touting SEAndroid and containerization. The enforcements of SEAndroid and containerization have been changing the way OEMs and Security vendors respond to security issues. Besides, this paper will prove that, even with these security enhancements, you can still be infected; still have data stolen; still have corporate data leaked, or experience exploration of kernel vulnerabilities.
2 1. Introduction Android is a Linux kernel based mobile operating system [1]. The Linux kernel provides a multi-user nature and discretionary access control (DAC) enforcement module on top of which all Android layers are sitting. Android utilizes the kernel-level sandboxing and isolation mechanism to separate apps from one another, and control the communication between apps or resource accesses. In Linux DAC mechanism, all users have a user ID and a group ID, with a unique numerical identification number associated to user ID (UID) and a group ID (GID) respectively. The use of groups allows additional privileges and access purposes. When an Android app is installed, it gets a unique UID and GID. The same UID and GID are set to the app s home directory and data to allow the app full access. Moreover, Android maintains special groups for Internet, Bluetooth, external storage and more. For instance, when an app granted the INTERNET permission, it is automatically added to the "inet" group by the Android system. However, Android has some inherent weaknesses associated with DAC in its security model [2]. As a result, these can cause vulnerabilities in the system s security. The vulnerabilities can be divided into two primary aspects [3]: the inconsistence between Subject (whereby an active entity performs an action, such as a process) and Object (a passive entity which has a set of privileges, such as file or socket) makes it possible for unauthorized parties to access certain resources. And, flawed or malicious applications can bypass permission system, escalate their privileges and directly access resources in the kernel. Security Enhancements for Android (SEAndroid) is introduced to mitigate the above shortcomings. It deploys a mandatory access control (MAC) mechanism piggybacking on the existing Android DAC model. Also a centralized security policy configuration is set up for all processes, objects, and operations as per defined security context. In general, SEAndroid intends better to control access to applications data and resources, protect and confine system services, protect users from potential flaws and reduce the effects of malicious apps [4]. In addition, over the last decade, there has been a tremendous growth in the number of mobile users on a global scale. More and more employees bring their own mobile devices to their enterprise workplace. This so-called BYOD (bring your own device) phenomenon has posed a threat to corporate data. Therefore, containerization is adopted by organizations in mobile device management (MDM) to provide employees with a secured access to corporate data and also prevents the misuse of malware, intruders or other apps. The remainder of this paper is as follows. Firstly, we provide a description of fundamental information of SEAndroid and containerization in Section 2. Then in Section 3, an overview analysis of how existing malware will survive in the above security enhancements is given. The evaluation of existing vulnerabilities and bootkits is included too. Afterwards, we try to estimate the evolution of Android malware and vulnerabilities with respect to these enhancements in the future. Finally we offer a conclusion.
3 2. The Fundamentals of SEAndroid and Containerization with Related Impacts This section gives an overview of the enhancements made to Android via adding SEAndroid and containerization. The main objective of this section is to provide background information on SEAndroid and containerization as well as their impact on OEMs and Security vendors. 2.1 Security Enhancements for Android (SEAndroid) Starting with Android 4.3, SELinux plays a significant part in the Android security architecture, to enforce mandatory access control (MAC) over all processes, objects and operations in a system-wide security policy [5]. SELinux is capable of confining privileged processes access to files and network resource even processes running with root or superuser identity. Moreover, it provides a centralized security policy configuration and automating policy creation against potential harm from a confined daemon that becomes compromised. SEAndroid refers to Security Enhancements for Android (SE for Android) project [6] which has been implanted in Android Open Source Project (AOSP). SEAndroid widened the scope of SELinux and enabled the integration of SELinux and run-time Middleware MAC (MMAC) into Android in a comprehensive and coherent manner. Figure 1 gives a high level view of SEAndroid Framework [7]. The framework can be spanned to three parts: kernel space, user space as well security policy and configuration files. SELinux Policy and Configuration Files ActivityManagerService Security Server PackageManagerService init zygote installd Context Files Mac Permission lookup SELinux utilities & commands User Space Libselinux (support security policy, file attributes and process APIs) Policy Files read/write SELinux File System Configuration Files reload SELinux Linux Security Module (LSM) Security Server Cache Miss Access Vector Cache LSM Hooks Kernel Space Various Linux Kernel Services Figure 1. The overview of SEAndroid framework
4 2.1.1 Kernel Space In the kernel, SELinux depends on the Linux Security Module (LSM), audit subsystem, and file system. The LSM contains an Access Vector Cache and Security Server. The Security Server has capability of permitting or denying the use of an Object by a Subject. The SELinux decisions, including permitting or denying access, are cached in order to increase performance. The cache is known as the Access Vector Cache (AVC). As a variant of the Linux, Android introduces a number of new kernel subsystems and drivers such as Binder, ashmem, logger, and wakelocks. As a result, major changes have been made to define new hooks in the LSM security module and insert calls and corresponding SELinux permission checks to these hooks into security relevant subsystems such as Binder. Furthermore, SELinux in Android file system has gained additional support of extended attribute for security labeling Policy and Configuration Files All operating system access control is based on certain type of access control attribute associated with objects and subjects [8]. The access control attribute in SELinux is described as a security context. The security context of SEAndroid is based on the concepts of Type Enforcement (TE), role-based access control and multilevel security. Under Type Enforcement, subjects accessing objects is governed through a set of rules. Subjects also named as domain are processes; while objects are files, sockets, network hosts and others on the system. Subjects and objects are labeled with a single security context, which has four elements: user, role, type, and mls_level with the following format: user:role:type:mls_level SEAndroid includes several unique configuration files and policy definition files to compute security contexts. The table below contains the configuration files that can be found on the devices. file_contexts Declare default security contexts for labeling all files on the system seapp_contexts Contain information to label security contexts of application processes (domain) property_contexts The file is unique for Android, and declare default security contexts for Android properties services service_contexts Declare default security contexts for Android subsystem like Android servicemanager mac_permissions.xml Contains certificate info used by the seinfo attribute during the installation of an app. The seinfo attribute is also part of the middleware MAC for inter-process communication (IPC) As described in Section 2.1.1, Access Vectors are the rules that determining a domain s access rights to an object. An Access Vector rule contains the subject, object, class, and the permissions granted to the
5 subject[9]. The policy rule has the format of: <av_action> <domain> <type>:<classes> {<permissions>} as explained below: av_action defines permitted actions including allow, auditallow, dontaudit and neverallow. Domain is a label for the subject (e.g. process) or set of processes. Type is a label for the object (e.g. file, socket) or set of objects. Class is the kind of object (e.g. file, socket) being accessed. Permission is the operation (e.g. read, write) being performed. The *.te (Type Enforcement) policy files under the external/sepolicy/ directory of Android Open Source Project contain all the required allow, type_transition and other rules for each domain. These.te files also determine access to objects via calling macros. Macros are common grouping of classes, permissions, and rules to simplify the writing of rules. All policy files are built into a non-human readable kernel policy matrix file named sepolicy and installed by default in the root directory. These configuration files in above table are also installed as parts of the SEAndroid policy files. These policy files are compiled as part of the Android build and added into the ramdisk image so that they can be interpreted by init process at very early stage in boot. Once the partitions have been mounted, the kernel policy as well as other policy configuration files such as file_contexts and property_contexts will be reloaded by setting a trigger of selinux.reload_policy property in the init.rc configuration. Since this paper mainly focuses on the condition of Android malware in the SEAndroid environment, the MAC policy configuration file, mac_permissions.xml, is the primary concern that will be explained in Section 3. The file is used for the install-time check of application permissions against the MAC policy. It utilizes the value of signature and seinfo tags to assign policy stanzas for a given app or all apps from either platform or third-parties. Besides, denied Android permissions can be specified via a blacklist (deny-permission) while a whitelist is used for allow-permissions, but not both. As a result, an application cannot be installed if the permission is not allowed, or can t be run after updated policy. Shown in the following example of mac_permissions.xml, apps with the platform certificate can have allow-all permissions. On the other side, third party apps fall into the default seinfo tag and cannot access several permissions such as location, camera, and calling home. However, appendix A tells a different story in the real world, that is, there is no any restriction on permissions for third party apps. <?xml version="1.0" encoding="utf-8"?> <policy> <!-- Sample signer stanza for install policy Rules: Sample stanzas are given below based on the AOSP developer keys. --> <!-- Platform dev key with AOSP --> <signer signature="...b357" > <allow-all /> <seinfo value="platform" /> </signer> <!-- shared dev key in AOSP --> <signer signature="...6f84" >
6 <allow-permission name="android.permission.access_coarse_location" /> <allow-permission name="android.permission.access_fine_location" /> <allow-permission name="android.permission.access_network_state" /> <allow-permission name="android.permission.allow_any_codec_for_playback" /> <allow-permission name="android.permission.bind_appwidget" /> <allow-permission name="android.permission.bind_wallpaper" /> <allow-permission name="android.permission.call_phone" />... <seinfo value="shared" /> </signer> <!-- All other keys --> <default> <seinfo value="default" /> <deny-permission name="android.permission.access_coarse_location" /> <deny-permission name="android.permission.access_fine_location" /> <deny-permission name="android.permission.authenticate_accounts" /> <deny-permission name="android.permission.call_phone" /> <deny-permission name="android.permission.camera" /> <deny-permission name="android.permission.read_logs" /> <deny-permission name="android.permission.write_external_storage" /> </default> </policy> The information of seinfo tag will be used in the seapp_contexts configuration file shown as follows. Applications signed by the platform signatures run in the processes with the domain named platform_app, and the type of its data file is app_data_file. On the other hand, the untrusted_app domain is the default assignment in seapp_contexts for all non-system apps as well as to any system apps that are not signed by the platform key. # Input selectors: # issystemserver (boolean) # user (string) # seinfo (string) # name (string) # path (string) # sebool (string) #... issystemserver=true domain=system_server user=system domain=system_app type=system_app_data_file user=bluetooth domain=bluetooth type=bluetooth_data_file user=nfc domain=nfc type=nfc_data_file user=radio domain=radio type=radio_data_file user=shared_relro domain=shared_relro user=shell domain=shell type=shell_data_file user=_isolated domain=isolated_app user=_app seinfo=platform domain=platform_app type=app_data_file user=_app domain=untrusted_app type=app_data_file The type enforcement policy rules of untrusted_app can be found in untrusted_app.te. From there, we find that any untrusted application never allows sending/receiving uevent and netlink messages, reading information in debugfs, registering services, or accessing Android properties. In general, these rules attempt to isolate untrusted apps from kernel and address the privilege escalation from an unprivileged app via exploit.
7 2.1.3 User Space In SEAndroid userspace, two aspects, the SELinux API library and app security labeling, will be explained, since security contexts for processes and app data directories may affect behaviors of Android malware. A minimal port of the SELinux API library named libselinux is created for Android. libselinux positions itself in the middle of the kernel and userspace. The library hides the low level functionalities of the kernel while providing interfaces and functions for apps to get and set process and file security contexts, and to obtain security policy decisions. The zygote process, typically via the request of the ActivityManagerService (AMS), initiates the startup of all Android apps. Each process is assigned the DAC credentials (UID, GID and supplementary GIDs) when it is forked from zygote. In addition to DAC, the security context is required for app processes in SEAndroid. The seinfo argument described in Section is used to generate security context via the AMS for the particular app being started. Furthermore, each app data directory needs to be set the corresponding security label when created. The Android installd daemon is responsible of the creation of the app data directories. The installd receives the seinfo value from the PackageManagerService then labels the security contexts for data directories based on the configuration file seapp_contexts. 2.2 Containerization Containerization, also known as secure container, offers the ability to set up a separate and encrypted zone on a device. Within the secure protected zone, enterprise applications are able to run isolated from personal applications. Moreover, it protects sensitive resources including business , documents, contacts, calendars and intranet browsing alongside personal data. Furthermore, containerization allows a company to deploy itself over hundreds of devices without headache of app wrapping and data pushing. However, containerization has some limitations. First of all, it cannot protect everything [10]: it only works on a handful of apps and data identified by the container vendor but not others. Secondly, containerization may cause compatibility problems and break other functionalities; it may prevent other processes accessing the device s contact list and message conversations. Thirdly, the potential vulnerabilities and exploits of Android or other personal apps may subvert the system of containerization. An attacker can embed malicious code into alternative keyboard apps, turning these apps into actual keylogging spyware [12].
8 2.3 Impacts of SEAndroid and Containerization on OEMs and security vendors Starting from the Android 5.0 release, Android has shifted from partial enforcement to full enforcement and made several significant improvements listed as follows. It means OEMs and security vendors have to better understand and scale their implementations and apps on SEAndroid to provide compatible devices and comprehensive security respectively [4]. Everything is in full enforcement since the 5.0 release. More than 60 domains including crucial domains (installd, netd, vold, and zygote) are enforced. Only init process is able to run in the init domain. Any generic denial prevents any special domain from starting. On the other side, several enterprise mobile management and security providers have implemented containerization since the container approach can offer strong values in securing enterprise data. In the next five years, 65 percent of enterprises will adopt a mobile device management (MDM) system with containerization functionality embedded [11]. However, companies must be aware that container solutions cannot offer absolute security and infection is inevitable.
9 3. The survival of existing Android malware based on above enforcements This section analyses a set of Android malware discovered by SophosLabs in the last twelve months. We divide these malware into different classifications including SMS sender, Trojan backdoor, Spyware, FakeApp, Ransomware, and potentially unwanted app (PUA). It provides a general description of their functionalities and corresponding permissions. Subsequently, the analysis and tests of these families are performed on the basis of SEAndroid and containerization. 3.1 Classifications of Android Malware During the last 12 months, SophosLabs has recorded near 1.5 million unique malware. Figure 1 shows the classifications of these malware. Premium SMS Sender is the largest malware family and owns 55.6% in total number of malware. Backdoor Trojan holds the second position and occupies near 21%. The third largest classification is Spyware. The rest of the malware families such as Rootkit, Banker Trojan, and Ransomware only hold 7.5%. Classifications of Android Maware in last 12 months FakeApp 1.5% Others 2.7% Downloader 1.2% Rootkit 0.7% Banker 0.7% Ransomware 0.5% Spyware 16.2% SMS 55.6% Backdoor 20.7% Figure 2. Android Malware Classification from 2014-May to 2015-April
10 3.2 Premium SMS Sender Over the last couple of years, the premium SMS Sender Trojans have become the largest threat plaguing Android because this is the easiest way for cybercriminals to make easy money fast. SMS Trojans usually take advantage of social engineering techniques and masquerade as popular apps, games, pornographic attraction and more. Cybercriminals can register short codes via premium SMS providers, and deploy into their malicious apps. These apps in Android are required only one necessary permission, which is "android.permission.send_sms"; then use sendtextmessage () method to silently send SMS at the premium SMS short code from above. And, we demonstrate that this is still an achievable way under the enforcement of SEAndroid and containerization. 3.3 Backdoor Android Backdoors refer to advanced mobile Trojans and usually have capability of performing multiple tasks as follows: Set up or distribute via mobile Botnet Send or intercept SMS messages Download, install, or activate any Android app without user knowledge Make arbitrary phone call Clear user data, uninstall existing applications, or disable system applications Upload sensitive information including device id, locations, application usage, call log and SMS history to remote websites Execute command & control services Android Backdoors are one of the most complicated malware families. And malware writers use a variety of methods and techniques into their malicious apps. Therefore, it is hard to measure the effectiveness of SEAndroid and containerization in addressing the threat of Android backdoors. If SEAndroid enabled, normal backdoor Trojan will have trouble carrying out functionalities such as installing itself into system directory, disabling system apps, or gaining access to apps data. But, it is still able to steal and upload sensitive info, download and ask to install applications, and set up mobile botnets when setting proper Android permissions. However, sophisticated backdoors like CoolReaper [13] are hidden in ROM images by either legitimate OEMs or third party distributors. As a result, such kind of backdoors have the superuser privilege and can accomplish any tasks without worry of SEAndroid and containerization because the security setting can be easily customized or disabled by the OEMs or distributors.
11 3.4 Spyware & Banker Trojan Android Spyware and Banker Trojan have key functionalities in common, which aim to gather sensitive information about a person, organization, or device and send such information to another entity without user content [14]. In Android, the information contains device id, apps info, call and SMS log, contacts, locations, and login and password details. The information could be sent out via Internet or SMS messages. Moreover, Banker Trojan is able to scan for legitimate banking apps, replace them with bogus apps, and attempt to disable any mobile security software. In SEAndroid, most functionalities of Spyware and Banker Trojan can be achieved via declaring suitable permissions such as "android.permission.read_sms", "android.permission.receive_sms", "android.permission.read_phone_state", and "android.permission.read_contacts". Additionally, malware writers can steal bank login information via launching a pop-up activity like a phishing website. However, with SEAndroid enabled, this kind of malware is not able to delete legitimate bank apps and disable security software silently. Also, containerization is able to prevent the leakage of enterprise data even the access to SMS or contact information since enterprise data is locked inside the container and only authorized apps can access. 3.5 FakeApp and Ransomware FakeApps, especially FakeAV, report fake alerts to scare victims to pay money for simulated removal of malware. The payment can be made via online credit card or Premium SMS. The writers of FakeApps may perform additional tasks of downloading and installing malware, and stealing sensitive information. Some FakeApps and Android Ransomware take a further step to lock up your devices with a pop-up that freezes out all other apps. Moreover, Crypto Ransomware such as SimpleLocker has the ability to encrypt documents, pictures, audios, and videos. In general, both FakeApps and Ransomware can survive in the SEAndroid and containerization enforcement and cause damage to personal information. However, FakeApps and Ransomware are not able to access or steal sensitive information in enterprise security containers. Nevertheless, the malicious behavior of lock-out and encryption will seriously decrease the usability of your devices. And these malware can only be removed by either rebooting into safe mode or performing a factory reset.
12 3.6 Rootkit and Bootkit In summary, SEAndroid is designed to minimize risks from exploits and vulnerabilities for Android. It can effectively block existing exploits and vulnerabilities during their execution [5]. In fact, it is difficult for SEAndroid to prevent the operating system from being compromised. The Samsung Galaxy S4 built upon SEAndroid has been rooted just a few months after released [15]. Also, the latest Samsung Galaxy S6 and S6 Edge have been rooted by PingPong exploit [16] less than 30 days after their first released. The S6 and S6 Edge are running on Samsung Knox extending SEAndroid. In the real world, the number of rooted devices is far greater than the expectation. A study [17] from Chinese Internet portal Tencent shows that 27.44% mobile users actually rooted theirs devices in order to remove build-in apps or customized the devices. Considering that China now has 386 million active Android users [18], the count of rooted devices is huge. As users usually download rootkit from third party stores or buy rooted devices from grey markets, it comes as no surprise that malicious rootkit being so popular, and bootkit malware like Oldboot can infect hundred thousand devices [19].
13 4. The Evolution of Android Malware and Vulnerabilities in the Near Future SEAndroid introduces security enhancements with SELinux based mandatory access control (MAC) to provide centralized policy management for every device. On the other side, Containerization creates a separate encrypted zone on a device for enterprise resources and supplies another layer for secure access to these resources in the container. The goal of both enhancements is to limit or block the damage or information leakage caused by malware [20, 21]. In fact, none of the security enhancements addresses one of the core issues related with Android permission model. Permissions are the key to control if an Android app can access sensitive information. However, it is hard to distinguish malicious apps from clean apps only with requested permission information. Appendix C shows the permission information from 8,000 popular clean apps, majority of them contain the dangerous permissions that also widely used in Android malware. So far, both SEAndroid and Containerization could not tackle the critical problems as a significant malware increase has been recorded by SophosLabs. As a result, Google I/O 2015 introduces a new app permissions model that allows user to pick and choose what permissions an app can access at runtime [22]. The proposal tries to address leftover security issues from SEAndroid and containerization. That would be better move, but most users have little knowledge of the scope and implications of permissions and may not make correct security decisions. So it will rely heavily on OEMs and security service providers to continue their effort delivering better solutions. In summary, the uprising trends will keep dominating Android malware attacks in Also, Android malware has been getting smarter and aiming to generate more profit. Since SMS mobile payments are still a popular and common method in some regions [23], the incentive of Premium SMS sender for mobile malware developers is simple and clear. Moreover, where Windows has gone, Android has followed: the Android Ransomware Koler and SimplerLocker borrow the method of operation from similar one on Windows. Last but not least, rootkit and bootkit will emerge time and time again because of the open nature of Android and habit of rooting devices.
14 5. Conclusion The paper explains the need of SEAndroid enhancement due to the inherent weaknesses associated with its DAC security model. It also describes the management control of containerization for content and apps. Additionally we show their impact on OEMs and security vendors. However, both of them have failed to meet their objectives against the damage or information leakage caused by Android malware. The failures have been demonstrated through the significant increase and case studies of Android malware. Furthermore, we expect the continuing increase of smarter Android malware in the future, which effectively takes advantage of social engineering and bypasses these security enhancements.
15 References [1] Android (operating system). [2] Android and Security. [3] Daniel J. Thompson, Xiaofang Wang, Xiaoyong Zhou. A Study of the Consistency of Android Permissions and Linux DAC. Indiana University School of Informatics [4] Security-Enhanced Linux in Android. [5] Stephen Smalley and Robert Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. Trusted Systems Research National Security Agency [6] Security Enhancements (SE) for Android. [7] SEforAndroid. [8] SELinux Concepts. [9] SELinux concepts from Google. [10] Pros and cons of using secure containers for mobile device security. [11] Mobile enterprise management tools are targeted by spyphones, researchers warn. s_researchers_warn/ [12] How Mobile Malware Bypasses Secure Container Solutions. [13] CoolReaper Revealed: A Backdoor in Coolpad Android Devices. [14] Spyware. [15] Mobile Security Myth 2: Deploying Containers Will Lock Down Corporate Data. [16] PingPongRoot ***S6 & S6 Edge Root Tool***.
16 [17] Over 27.44% Users Root Their Phone(s) In Order To Remove Built-In Apps, Are You One Of Them?. [18] China now has 386 million active Android users. [19] Most Sophisticated Android Bootkit Malware ever Detected; Infected Millions of Devices. [20] SELinux for Android and Samsung KNOX. [21] Google Slashes Android Malware in Half. [22] Google Locks Down Excessive Android App Permissions. [23] Report: Huge spike in mobile malware targets Android, especially mobile payments.
17 Appendices A. Sample mac_permissions.xml from a Nexus 5 running on Android 5.1. <?xml version="1.0" encoding="iso "?> <!-- AUTOGENERATED FILE DO NOT MODIFY --> <policy> <signer signature="...e26a"> <seinfo value="platform"/> </signer> <default> <seinfo value="default"/> </default> </policy> B. Sample untrusted_app.te policy ### Untrusted apps ### ### untrusted_app includes all the appdomain rules, plus the ### additional following rules: ### type untrusted_app, domain; app_domain(untrusted_app) net_domain(untrusted_app) bluetooth_domain(untrusted_app) # Some apps ship with shared libraries and binaries that they write out # to their sandbox directory and then execute. allow untrusted_app app_data_file:file { rx_file_perms execmod }; allow untrusted_app tun_device:chr_file rw_file_perms; # ASEC allow untrusted_app asec_apk_file:file r_file_perms; # Execute libs in asec containers. allow untrusted_app asec_public_file:file { execute execmod }; # Allow the allocation and use of ptys # Used by: create_pty(untrusted_app) # Used by Finsky / Android "Verify Apps" functionality when # running "adb install foo.apk". # TODO: Long term, we don't want apps probing into shell data files. # Figure out a way to remove these rules. allow untrusted_app shell_data_file:file r_file_perms; allow untrusted_app shell_data_file:dir r_dir_perms; # b/ : Allow reads from /data/anr/traces.txt # TODO: We shouldn't be allowing all untrusted_apps to read # this file. This is only needed for the GMS feedback agent. # See also b/ GMS runs as untrusted_app, and # it's too late to change the domain it runs in. # This line needs to be deleted. allow untrusted_app anr_data_file:file r_file_perms; #
18 # Rules migrated from old app domains coalesced into untrusted_app. # This includes what used to be media_app, shared_app, and release_app. # # Access /dev/mtp_usb. allow untrusted_app mtp_device:chr_file rw_file_perms; # Access to /data/media. allow untrusted_app media_rw_data_file:dir create_dir_perms; allow untrusted_app media_rw_data_file:file create_file_perms; # Write to /cache. allow untrusted_app cache_file:dir create_dir_perms; allow untrusted_app cache_file:file create_file_perms; ### ### neverallow rules ### # Receive or send uevent messages. neverallow untrusted_app domain:netlink_kobject_uevent_socket *; # Receive or send generic netlink messages neverallow untrusted_app domain:netlink_socket *; # Too much leaky information in debugfs. It's a security # best practice to ensure these files aren't readable. neverallow untrusted_app debugfs:file read; # Do not allow untrusted apps to register services. # Only trusted components of Android should be registering # services. neverallow untrusted_app service_manager_type:service_manager add; # Do not allow untrusted_apps to connect to the property service # or set properties. b/ neverallow untrusted_app property_socket:sock_file write; neverallow untrusted_app init:unix_stream_socket connectto; neverallow untrusted_app property_type:property_service set; # Allow verifier to access staged apks. allow untrusted_app { apk_tmp_file apk_private_tmp_file }:dir r_dir_perms; allow untrusted_app { apk_tmp_file apk_private_tmp_file }:file r_file_perms; C. High Risk Permissions in Top 8000 Android Apps From Google Play Permission Percentage INTERNET 98.1% WRITE_EXTERNAL_STORAGE 75.3% READ_PHONE_STATE 43.4% ACCESS_FINE_LOCATION/ACCESS_COARSE_LOCATION 25.3% READ_EXTERNAL_STORAGE 16.3% CAMERA 13.8% READ_CONTACTS 12.6%
19 SYSTEM_ALERT_WINDOW 8.8% CALL_PHONE 6.9% RECEIVE_SMS 5.0% SEND_SMS 4.7% READ_SMS 3.8% READ_CALENDAR 3.1% MOUNT_UNMOUNT_FILESYSTEMS 2.6% READ_CALL_LOG 1.9% PROCESS_OUTGOING_CALLS 1.9%
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Security Enhanced (SE) Android: Bringing Flexible MAC to Android
Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov Abstract The Android software
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Introduction to Android 5 Security
Introduction to Android 5 Security Lukáš Aron and Petr Hanáček Faculty of Information Technology, Department of Intelligent Systems, Brno University of Technology [email protected] Abstract. This paper
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Linux OS-Level Security Nikitas Angelinas MSST 2015
Linux OS-Level Security Nikitas Angelinas MSST 2015 Agenda SELinux SELinux issues Audit subsystem Audit issues Further OS hardening 2 SELinux Security-Enhanced Linux Is NOT a Linux distribution A kernel
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Android Security. Giovanni Russello [email protected]
Android Security Giovanni Russello [email protected] N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Samsung KNOX User Guide KNOX for Consumers Edition
Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung
Firewall-based Solution for Preventing Privilege Escalation Attacks in Android
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Secure computing: SELinux
Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,
Top Ten Cyber Threats
Top Ten Cyber Threats Margaret M. McMahon, Ph.D. ICCRTS 2014 Introduction 2 Motivation Outline How malware affects a system Top Ten (Simple to complex) Brief description Explain impacts Main takeaways
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net
Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home
Android Security 2015 Year In Review
Android Security 2015 Year In Review April 2016 Contents 3 Overview 7 Google Security Services for Android 25 Android Platform Security 33 Ecosystem Data 43 Noteworthy PHAs and Vulnerabilities 48 Appendix
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
Practical Attacks against Mobile Device Management Solutions
Practical Attacks against Mobile Device Management Solutions Michael Shaulov, CEO [email protected] Daniel Brodie, Sr Security Researcher [email protected] About: Daniel Security researcher for nearly
Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Sophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Analysis of the Linux Audit System 1
Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
