Risk-Rating Framework for Mobile Applications (Sponsored by DISA CTO)
|
|
|
- Roy Fletcher
- 9 years ago
- Views:
Transcription
1 Risk-Rating Framework for Mobile Applications (Sponsored by DISA CTO) Praveen Sharma ( ) Federal Mobile Computing Summit March 6, 2014
2 What is Risk-Rating Framework? Mobile Application(s) Risk-Rating Framework (RRF) Probability of an app being BENIGN INCONCLUSIVE MALIGN Compliance to Mobile App SRGs Enables vetting of Android and ios mobile apps Supports DISA s mobile APP SRG compliance (CAC-card accessible) Fed Mobile Summit- 2 SRGs: Security Requirements Guidelines (issued by DISA)
3 Information Flow/Presentation Outline apps Tools (Manifest, Static, Dynamic) Common Threat Architecture Representation RRF Algorithms Bayesian Classifiers Partial Least Square Classifiers Compliance Checking Algorithms Rule-based Algorithms UI Mobile Malware and Potentially Good apps Mobile App SRGs Fed Mobile Summit- 3
4 Architecture Apps REST Ingest Active MQ Pipeline Active MQ Data Merging Tools- Chain Rating, Threat Model, Rollup Algorithms REST UI/Reporting Mongo Document Mongo Pipeline Mongo Score Mongo analysis Models Continuous Asset Evaluation Situational Awareness and Risk-Rating (CAESARS) Reference Architecture Supports Modularity, and Extension to New tools and Algorithms Fed Mobile Summit- 4
5 Apps/Input Data Set Android Apps Input Data Set Apple ios Apps Input Data Set Potentially Good Apps Known Bad Apps Potentially Good Apps F-Droid Google-Play Apps Contagiondump and Trade 1000 apps; 600 unique apps Source code and binary downloads possible Metadata* not available/ useful 4882 unique apps Only binary downloads Metadata available 6000 Malware sample; 1500 unique samples Apple Store Only binary downloads Metadata available (EverNote, Flashlight, AutoCad) *Metadata: reputation of the developer, stability of apps, Fed Mobile Summit- 5
6 Code-Checking Tools and Analysis: Overall Summary Tools for Android Apps Tools for Apple Apps Static Dynamic Services & RE Static, reputation AndroGuard (O) Android Audit Tools (O) Andrubis (A) Macholib (C) Androwarn (O) Apk-view-tracer (O) AntiLVL BiPlist (C) APKInspector (O) ASEF (O) APKTool (O) MIT LL reputation libs Coverity (C) Droidbox (O) ARE (O) Delvik ByteCode Analysis (O, A) Fed Mobile Summit- 6 DroidScope (O, A) AXMLPrinter2 (O) Dexpler (A) Mercury (O, C) ContrOWL Dexter (A, S) TaintDroid (O, A) Dare: Dalvik Retargetting (O, A) HP Fortify/Appscan (C, S) JED (C) Klocwork (C) Stowaway (A, S) Symdroid (A) PushDownoo (A) Google Bouncer (C) IDA Pro (C) Mobile-Sandbox (A,S) Color coding: Blue: Have done a deeper analysis O: Open Source C: Commercial A: Academic S: Service-Based
7 Code-Checking Tools and Analysis: Overall Summary Tools for Android Apps Tools for Apple Apps Static Dynamic Services & RE Static, reputation AndroGuard (O) Android Audit Tools (O) Andrubis (A) Macholib (C) Androwarn (O) Apk-view-tracer (O) AntiLVL BiPlist (C) APKInspector (O) ASEF (O) APKTool (O) MIT LL reputation libs Coverity (C) Droidbox (O) ARE (O) Delvik ByteCode Analysis (O, A) Fed Mobile Summit- 7 DroidScope (O, A) AXMLPrinter2 (O) These are just the illustrative tools integrated into RRF to demonstrate RRF capabilities Any other tool can be integrated into RRF Dexpler (A) Mercury (O, C) ContrOWL Dexter (A, S) TaintDroid (O, A) Dare: Dalvik Retargetting (O, A) HP Fortify/Appscan (C, S) JED (C) Klocwork (C) Stowaway (A, S) Symdroid (A) PushDownoo (A) Google Bouncer (C) IDA Pro (C) Mobile-Sandbox (A,S) Color coding: Blue: Have done a deeper analysis O: Open Source C: Commercial A: Academic S: Service-Based
8 Partial Least Squares (PLS) Classifier App Extract Declared Permissions and Static Features Create Expanded Feature Vector with Combinations of Features Partial Least Squares Analysis Permissions, n-tuples of permissions Apps X 11 X 12 X 13 X 1N X 21 X 22 X 23 X 2N... X M1 X M2 X M3 X MN Iteratively estimate Latent Variables from Measured Variables X 11 X 12 X 13 X 1k X 21 X 22 X 23 X 2k... X M1 X M2 X M3 X Mk Classifier Output Fed Mobile Summit- 8
9 Bayesian Classifier Probability Distribution for Permissions and Active Trail Fed Mobile Summit- 9
10 Algorithm Evaluation: Receiver Operating Curves Bayesian Classifier Partial Least Square Classifier Fed Mobile Summit- 10 Both the Risk-Rating Algorithms provide a low number of false positives
11 User Interface Overview Tab Details Tab report Compliance Summary Android apps ios apps
12 Mobile APP (MAPP) SRGs Where we are? Incorporated 4 SRGs Where we are going? Mapping SRGs to static features Identifying if incorporating the SRGs require Source code Fed Mobile Summit- 12 Static analysis Dynamic analysis Run-time test MDM will provide the needed information Guidance from DISA All of the above SRGs: Security Requirements Guidelines (issued by DISA) MAPP SRGs Currently Incorporated (4) SRG-APP MAPP The mobile application source code must not contain known malware. SRG-APP MAPP The mobile application must not execute as a privileged operating system process unless necessary to perform any application functions. SRG-APP MAPP The mobile application must not write data to persistent memory accessible to other applications. SRG-APP MAPP The mobile application must not change the file permissions of any files other than those dedicated to its own operation. MAPP SRGs Being Investigated (6) => static or dynamic analysis may be sufficient, guidance from DISA MAPP SRGs Considered for Investigation (13) => source code, dynamic, run-time, MAPP SRGs Postponed for now (28) => relates to classified, multiple persona,
13 MAPP SRGs Being Investigated (Examples) SRG-APP MAPP SRG-APP MAPP SRG-APP MAPP MAPP SRGs Currently Investigated (4) The mobile application must not permit execution of code without user direction unless the code is sourced from an organization-defined list of approved network resources. The mobile application code must not include embedded interpreters for prohibited mobile code. The mobile application must fail to an initial state when the application unexpectedly terminates, unless it maintains a secure state at all times. SRG-APP MAPP SRG-APP MAPP SRG-APP MAPP SRG-APP MAPP The mobile application must prevent XML injection. The mobile application must validate the correctness of data inputs. The mobile application must define a character set for data inputs. The mobile application must not contain format string vulnerabilities. Fed Mobile Summit- 13
14 Path Forward Incorporate Dynamic and Run-time Features for Android apps Integrate more MAPP SRGs Integrate static, dynamic and run-time features for ios apps Incorporate AV Interface with MDM solutions Creating controlled data-sets Investigating Dynamic Bayesian Networks Fed Mobile Summit- 14
15 Fed Mobile Summit- 15 Backup
16 Both the Risk-Rating Results Provide Almost Identical Scores Benign Apps Malign Apps Bayesian Network 1% Num Failed 10% Num Unknown Partial Least Square 89% Num Passed Fed Mobile Summit- 16
17 Code-Checking Tools and Analysis: Android Apps (Output from Androlyze) MathRace App from GooglePlay Manifest: Declared Perms Androlyze: Used Perms ACCESS_NETWORK_STATE ACCESS_COARSE_LOCATION ACCESS_FINE_LOCATION ACCESS_LOCATION_EXTRA_COMMANDS INTERNET READ_PHONE_STATE RECEIVE_BOOT_COMPLETED WAKE_LOCK com.android.launcher.permission.install_sho RTCUT ACCESS_NETWORK_STATE ACCESS_FINE_LOCATION INTERNET READ_PHONE_STATE WAKE_LOCK VIBRATE WRITE HISTORY BOOKMARKS Permission declared not used Permission used but not declared Fed Mobile Summit- 17
18 Code-Checking Tools and Analysis: ios FedExMobile from Apple MACHOLIB Plist: /System/Library/Frameworks/ MessageUI.framework/MessageUI /System/Library/Frameworks/Security.framework/ Security /System/Library/Frameworks/ CoreGraphics.framework/CoreGraphics LSRequiresIPhoneOS : TRUE CFBundleName: FedExMobile CFBundlePackageType: APPL CFBuildDate : 4/6/2012 Rating Rank : 100 Rating Label : 4+ Files : {List of Files} Frameworks calls used Metadata for ios Fed Mobile Summit- 18
19 Risk Rating Framework Prototype: Process and Components (Status Overview) apks Manifest Analysis (AAPT, APK Inspector) Static Analysis (Androguard, Androwarn, Androlyze in pipeline, features being integrated) User Modeling & Dynamic Analysis (Taintdroid, Droidbox, ASEF investigated, Not incorporated in the RRF) Declared perms., intents, Features (used perms, functional calls, ) extracted but not incorporated in alg. Features Common Represen tation Threat Model RRF Algorithms (Bayesian & Partial Least Square Classifiers) (Compliance Check Rule-based alg.) Mobile App SRGs Developer Reputation UI ipas Manifest Analysis (MIT LL parser for Macholib & Plist) Static Analysis (Work-in-progress) Framework calls Features Common Represen tation RRF Algorithms (Bayesian & Partial Least Square Classifiers) (Compliance Check Rule-based alg.) Fed Mobile Summit- 19 User Modeling & Dynamic Analysis (Work-in-progress) Developer Reputation Reputation Threat Model Mobile App SRGs
20 Common Threat Representation Option 1 Manifest tool: OVAL: Open Vulnerability and Assessment Language MAEC: Malware Attribute Enumeration and Characterization SCAP: Security Content Automation Non-Interference Policies Prevent information flow from high to low Declassification Policies Enable some portion of data to be revealed (such as the last four digits of the credit card numbers) Random Executable Crash Inputs Static Tools Common Representation of Different Outputs from Different tools Option 2 Splunk Dynamic Tools Option 3 NoSQL Document/No-Document databases Fed Mobile Summit- 20
21 Fed Mobile Summit- 21 Static Features distribution
The OWASP Foundation http://www.owasp.org
Android reverse engineering: understanding third-party applications OWASP EU Tour 2013 June 5, 2013. Bucharest (Romania) Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect. Steven Arzt. 04.10.2015 Secure Software Engineering Group Steven Arzt 1
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect Steven Arzt 04.10.2015 Secure Software Engineering Group Steven Arzt 1 04.10.2015 Secure Software Engineering Group Steven Arzt
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
Malware detection methods for fixed and mobile networks
Malware detection methods for fixed and mobile networks Gavin McWilliams January 2013 [email protected] Academic Centre of Excellence in Cyber Security Research Presentation Outline Malware detection
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
Top 8 Steps for Effective Mobile Security
Top 8 Steps for Effective Mobile Security Larry Pesce With thanks to Chris Crowley and Joshua Wright Top 8 Steps for Effective Mobile Security 2012 Chris Crowley/Joshua Wright 1 Outline Three Truths About
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
Android Security Joshua Hodosh and Tim Leek
Android Security Joshua Hodosh and Tim Leek This work is sponsored under Air Force contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Synthesis for Developing Apps on Mobile Platforms
Synthesis for Developing Apps on Mobile Platforms Jeff Foster University of Maryland, College Park Armando Solar-Lezama Massachusetts Institute of Technology Schedule for session Jeff Foster and Armando
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle
Hey, We Catch You: Dynamic Analysis of Android Applications. Wenjun Hu(MindMac) PacSec, Tokyo 2014.11
Hey, We Catch You: Dynamic Analysis of Android Applications Wenjun Hu(MindMac) PacSec, Tokyo 2014.11 Recent years witness the colossal growth of Android malware Vanja Svajcer, SophosLabs, Sophos Mobile
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Dynamic Analysis of Android Malware
VU University Amsterdam Faculty of Sciences Department of Computer Sciences Internet & Web Technology Master thesis Dynamic Analysis of Android Malware Victor van der Veen supervisors prof. dr. ir. Herbert
Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications
Android & ios Application Vulnerability Assessment & Penetration Testing Training 2-Day hands on workshop on VAPT of Android & ios Applications Course Title Workshop on VAPT of Android & ios Applications
KomliMobile Android SDK
KomliMobile Android SDK Overview Komlimobile Ad banner use a small portion of the screen to entice users to "click through" to a richer, full-screen experience such as a website or app store page. To display
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
A Study of Android Application Security
A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri USENIX Security Symposium August 2011 Systems and Internet Infrastructure Security Laboratory
Mobile Malware and Spyware: Working Through the Bugs. Detective Cindy Murphy 608-267-8824 [email protected]
Mobile Malware and Spyware: Working Through the Bugs Detective Cindy Murphy 608-267-8824 [email protected] The Mobile Malware Threat 155% increase in mobile malware from 2010 to 2011 614% increase
Mobile Application Development Android
Mobile Application Development Android MTAT.03.262 Satish Srirama [email protected] Goal Give you an idea of how to start developing Android applications Introduce major Android application concepts
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Messing with the Android Runtime
Northeastern University Systems Security Lab Messing with the Android Runtime Collin Mulliner, April 26th 2013, Singapore crm[at]ccs.neu.edu SyScan Singapore 2013 $ finger [email protected] 'postdoc'
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps. Hyeokgon Ryu, Infraware Technology, Ltd.
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps Hyeokgon Ryu, Infraware Technology, Ltd. Talking about Needs of Automated Converting from Android To Tizen Introduce
AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Our program is a practical knowledge oriented program aimed at making innovative and attractive applications for mobile
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not We don t have a BYOD program. This statement, referencing mobile device usage in the workplace, will likely sound familiar to federal government
Certificates and Application Resigning
Certificates and Application Resigning Introduction In the following chapters we will be reviewing how to resign an application along with how to get the needed resources for the process. To successfully
Database FAQs - SQL Server
Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Beginner s Android Development Tutorial!
Beginner s Android Development Tutorial! Georgia Tech Research Network Operations Center (RNOC)! cic.gatech.edu Questions? Get in touch! piazza.com/gatech/spring2015/cic [email protected]
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
ProfileDroid: Multi-layer Profiling of Android Applications. Xuetao Wei Lorenzo Gomez Iulian Neamtiu Michalis Faloutsos
ProfileDroid: Multi-layer Profiling of Android Applications Xuetao Wei Lorenzo Gomez Iulian Neamtiu Michalis Faloutsos How do we know what is occuring in an app? Description, connections, services? >550
Secure all the things with graphs and predictive analytics
Secure all the things with graphs and predictive analytics SESSION ID: Kevin Mahaffey CTO Lookout Tim Wyatt Director, Security Engineering Lookout Over-simplification of security Protection bars on windows
Certifying the Security of Android Applications with Cassandra
1 15 th International School on Foundations of Software Security and Design August 31 st, 2015, Bertinoro Certifying the Security of Android Applications with Cassandra Steffen Lortz, Heiko Mantel, David
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Status Update. Jon Baker September 28, 2010
Status Update Jon Baker September 28, 2010 HS SEDI is a trademark of the U.S. Department of Homeland Security (DHS). OVAL Overview An international, information security, community standard to promote
New Features in XE8. Marco Cantù RAD Studio Product Manager
New Features in XE8 Marco Cantù RAD Studio Product Manager Marco Cantù RAD Studio Product Manager Email: [email protected] @marcocantu Book author and Delphi guru blog.marcocantu.com 2 Agenda
Advertiser Campaign SDK Your How-to Guide
Advertiser Campaign SDK Your How-to Guide Using Leadbolt Advertiser Campaign SDK with Android Apps Version: Adv2.03 Copyright 2012 Leadbolt All rights reserved Disclaimer This document is provided as-is.
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Citrix Worx App SDK Overview
Citrix Worx App SDK Overview Table of Contents Introduction... 3 About the App Catalog Deployment Model... 3 About the Citrix MDX Toolkit... 4 The Worx App SDK... 5 The Unmanaged and Managed Modes of Worx
HOW LOOKOUT S PREDICTIVE SECURITY UNMASKED A MOBILE THREAT
Mobile Threats MalApp HOW LOOKOUT S PREDICTIVE SECURITY UNMASKED A MOBILE THREAT Introduction To detect advanced threats that can evade signatures and behavioral analyses, Lookout developed a platform
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, William Enck Department of Computer Science, University of
Android Application Analyzer
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume. 1, Issue 4, August 2014, PP 32-37 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Android
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014 About [email protected] @cziegeler RnD Team at Adobe Research Switzerland Member of the Apache
Hadoop SNS. renren.com. Saturday, December 3, 11
Hadoop SNS renren.com Saturday, December 3, 11 2.2 190 40 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
Localizing Your Mobile App is Good for Business
Global Insight Localizing Your Mobile App is Good for Business Simply put, the more people who can find and use your mobile application in their native language, the larger your potential market. But launching
Detecting client-side e-banking fraud using a heuristic model
Detecting client-side e-banking fraud using a heuristic model Tim Timmermans [email protected] Jurgen Kloosterman [email protected] University of Amsterdam July 4, 2013 Tim Timmermans, Jurgen
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
How To Protect Poste Italiane From Cyber Crime
Mobile Application VERIfication Cluster Platform Computer Emergency Response Team of Poste Italiane ESSoS 15 - Engineering Secure Software and Systems March 4-6, 2015 Milan, Italy Authors Poste Italiane
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Harvesting Developer Credentials in Android Apps
8 th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York City, Jun 24-26 Harvesting Developer Credentials in Android Apps Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang Florida
A Business Process Driven Approach for Generating Software Modules
A Business Process Driven Approach for Generating Software Modules Xulin Zhao, Ying Zou Dept. of Electrical and Computer Engineering, Queen s University, Kingston, ON, Canada SUMMARY Business processes
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna UC Santa Barbara Santa
INTRODUCTION TO ANDROID CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 11 02/15/2011
INTRODUCTION TO ANDROID CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 11 02/15/2011 1 Goals of the Lecture Present an introduction to the Android Framework Coverage of the framework will be
A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development
Automating SQL Injection Exploits
Automating SQL Injection Exploits Mike Shema IT Underground, Berlin 2006 Overview SQL injection vulnerabilities are pretty easy to detect. The true impact of a vulnerability is measured
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
BUSINESS RULES CONCEPTS... 2 BUSINESS RULE ENGINE ARCHITECTURE... 4. By using the RETE Algorithm... 5. Benefits of RETE Algorithm...
1 Table of Contents BUSINESS RULES CONCEPTS... 2 BUSINESS RULES... 2 RULE INFERENCE CONCEPT... 2 BASIC BUSINESS RULES CONCEPT... 3 BUSINESS RULE ENGINE ARCHITECTURE... 4 BUSINESS RULE ENGINE ARCHITECTURE...
Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014
Android Packer facing the challenges, building solutions Rowland YU Senior Threat Researcher Virus Bulletin 2014 1 What is Android Packer? Android packers are able to encrypt an original classes.dex file,
Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH-032015
Rapid IOC Detection and Remediation WP-ATH-032015 EXECUTIVE SUMMARY In the escalating war that is cyber crime, attackers keep upping their game. Their tools and techniques are both faster and stealthier
