Mobilitics Inria-CNIL project: privacy and smartphones
|
|
|
- Marylou Neal
- 9 years ago
- Views:
Transcription
1 Mobilitics Inria-CNIL project: privacy and smartphones Privatics team (Jagdish Achara, Claude Castelluccia, James Lefruit, Vincent Roca) Inria Rhone-Alpes CAPPRIS Reunion, Lyon Sept 10 th, 2013
2 Outline l Motivations l Private Data Leak Detection methodology and results l Conclusions Inria / Photo H. Raguet 2
3 Motivations (1) : The revolutionary arrival of AppStore model of App distribution l A large number of actors present on the device No more the presence of merely smartphone provider Both first (App server itself) & third-party (trackers, A&A etc.) Both first&third-party(very dangerous) Flurry first-party(policy&pi) third-party(dangerous) 3
4 Motivations (2) : The arrival of App stores l More opportunities for personal information leakage to various parties Not only limited to web browsers as is the case in desktops/laptops Apps for dedicated services (FB, LeMonde, SNCF etc.) 4
5 Motivations (2) l Difficult to trust all these parties various scandals in the past For example, Twitter and Path uploading users all contacts to their servers [1] [2] WSJ: What they know Mobile [3] [1] [2] [3] 5
6 Motivations (3) l Smartphones are well suited to marketers/trackers contain a lot of info on user interests and behaviors much more than on desktop/laptop because various sensors (GPS, Camera etc) and comm technologies (WiFi, GSM etc.) generate PI because smartphones are at the center of our cyber activities, and very personal (it s not shared usually) because smartphones have almost all-time Internet connectivity Because they re barely turned off à leads to accurate and detailed user profiling 6
7 Motivations(4) l A direct consequence is a large presence of online advertisers/trackers Flurry and many others à à à This requires scrutinizing smartphones for privacy risks tracking the trackers 7
8 Mobilitics project and its goals l started in January 2012 " " " " " " l focuses on Android and ios the leading mobile OS " " " " l Goal: investigate smartphone Apps and OS for potential privacy risks 8
9 Outline l Motivations l Private Data Leak Detection methodology and results l Conclusions Inria / Photo H. Raguet 9
10 General approach (ios & Android) 1. Run Apps on instrumented versions of Android and ios 2. Collect data in a local sqlite database 3. Analyze the data offline for potential private data leakage 10
11 ios (1) : Some background l Closed source and only code signed from Apple can be executed enforced by secure boot chain l Instrumenting ios requires Jailbreaking essentially a way to bypass Apple s secure boot chain l Also, no App source available à only binary rewriting is possible 11
12 ios (2) : Some Background l ios Apps are written in Objective-C, C, C++ l Private data can only be accessed by Apple defined frameworks written in Objective-C/C/C++ l Enforcement of user privacy by ios 1. Apple vetting process when Apps are submitted to AppStore 2. Users are asked before ios gives access to PI to an App 12
13 ios (3) : General Idea l Idea: change the implementation of the APIs responsible for private data access in order to: detect the App accessing the private data collect the data so that it can be searched later if it s transmitted to the network Apps (to be analyzed) dylib (tweak) accesses intercepts ios Frameworks stores Sqlite database 13
14 ios (4) : But how to do it? l As source code is not available, binary patching? It s a nightmare, I think! l Dynamically, at runtime? Fortunately, yes! Use Objective-C runtime method method_setimplementation Replace the C/C++ functions at assembly level. *NB: we use a third-party framework (MobileSubstrate) which makes it lot simpler 14
15 ios (5) : But how to do it? l Whole code (modified implementation of the methods) is compiled in a dylib and loaded at launch time in a process of interest 15
16 ios (6) : But how to do it? l We capture relevant info (method args, return values) and store it in a local sqlite DB l In order to confirm privacy leaks We also need to dump whole network data follows the same technique (method/function interception) done at BSD Socket level to ensure no App can bypass it 16
17 ios (7) : Post Analysis of data collected 1. Identify private data accessed by Apps 2. Search for private data in the network traffic to see if it s sent, and where 3. Search for private data in the input to cryptographic / hash functions, and if there s some, search the output in the network traffic 4. Find out if Apps use cross-app tracking techniques by using the UIPasteBoard class 17
18 ios (8) : Limitations l Are private data manipulations (hash, encryption etc.) done with custom functions rather than using standard ios API? if yes, we cannot detect it as we don t know what to search in the network traffic L For example, a simple XOR with a static key is sufficient à a fundamental limitation of our approach hard to evaluate if this is current practice or not But this means results obtained using our technique would be lower-bound 18
19 ios (9) : Tests and results l We chose 78 representative free ios Apps Goal is to be representative of the main App categories Same set of Apps would be tested on Android (chosen Apps are available on both platoforms): to have a behavioral comparision 19
20 ios (10) : Trackers disguise device tracking l 59% Apps bypass the official ios6 AdvertisingID should not be the case the AdID is supposed to let the end-user control tracking by resetting it as desired it s just an illusion L l 37% Apps will still bypass the AdID with future ios7 that bans the access to MAC address this % will increase as more companies will shift to other types of permanent identifiers for tracking 20
21 Android (1) : Overview of methodology l We benefit from the open-source nature of Android for instrumentation Change the Android source code itself l Same technics as with ios: Add all events captured in a local sqlite database Dump the network data at BSD Socket level Dump the encryption/hash data Perform post-analysis l Still in progress 21
22 Outline l Motivations l Private Data Leak Detection methodology and results l Conclusions Inria / Photo H. Raguet 22
23 Conclusions and remarks l Trackers disguise device tracking 59% Apps are employing techniques they are not supposed to, in order to track users makes ios6 AdvertisingID almost useless little progress in future ios7 Apple can t ignore this trend l Private data is sent to various parties As shown in the Table before l Live experiment to be conducted at CNIL with various users 23
24 Improvements to make (version 2) l We still need to distinguish between first and third-party (would require manual interception to some extent?) l Increase the number of Apps being tested (with paid Apps too this time to verify if some difference exist wrt. privacy) l Some known glitches to be fixed (access to serial number, bluetooth MAC Address etc.) 24
25 Last but not least: Don t believe naively what you read l The RATP App, v5.4.1 We don t collect any personal information l Really? list of active Apps, MAC address, device name, position (20m accuracy), permanent ID sent to Adgoji (SSL) or Sofialis (cleartext) l See our blog: : part-1 et part-2 25
26 Questions/Remarks? Thanks 26
Smartphone Security Overview
Smartphone Security Overview Jagdish Prasad Achara, Claude Castelluccia INRIA Rhone-Alpes 5 décembre 2012 J. P. Achara, C. Castelluccia (INRIA Rhone-Alpes) Smartphone Security Overview 5 décembre 2012
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Pentesting ios Apps Runtime Analysis and Manipulation. Andreas Kurtz
Pentesting ios Apps Runtime Analysis and Manipulation Andreas Kurtz About PhD candidate at the Security Research Group, Department of Computer Science, University of Erlangen-Nuremberg Security of mobile
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
ios Testing Tools David Lindner Director of Mobile and IoT Security
ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave [email protected] 15+ years consulting experience I hack and golf, sometimes at
Enterprise Mobility Management
Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER
WEB, HYBRID, NATIVE EXPLAINED June 2013 CRAIG ISAKSON MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER 701.235.5525 888.sundog fax: 701.235.8941 2000 44th St. S Floor 6 Fargo, ND 58103 www.sundoginteractive.com
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Novell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
AppPulse Mobile. Whitepaper: Overhead, Privacy, and Security. March 2016
AppPulse Mobile Whitepaper: Overhead, Privacy, and Security March 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions
We build your ideas into web and mobile applications. steicho Technological Solutions Automate your processes, through a commercial custom made application We offer software solutions to automate, streamline,
Android v ios Mobile Operating Systems
v ios Mobile Operating Systems is an open source operating system widely used on smartphones and tablets. has been available under a free and open source software license from October 21, 2008 and until
01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
Mobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications
Android & ios Application Vulnerability Assessment & Penetration Testing Training 2-Day hands on workshop on VAPT of Android & ios Applications Course Title Workshop on VAPT of Android & ios Applications
Mobile Phone & Website Tracking Platform Operation Guide
Mobile Phone & Website Tracking Platform Operation Guide This software is web based system, for users to logon with given user name & password to locate the tracker s current location, play back the history
Everything is Terrible
Everything is Terrible A deep dive into provisioning and code signing Hello and welcome to Everything is Terrible. This is a deep dive talk into the processes behind provisioning and code signing on Apple
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
When Security Gets in the Way. PenTesting Mobile Apps That Use Certificate Pinning
When Security Gets in the Way PenTesting Mobile Apps That Use Certificate Pinning Justine Osborne Alban Diquet Outline What is Certificate Pinning? Definition and Background Consequences for Mobile Blackbox
Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.
MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
ADF Mobile Overview and Frequently Asked Questions
ADF Mobile Overview and Frequently Asked Questions Oracle ADF Mobile Overview Oracle ADF Mobile is a Java and HTML5-based mobile application development framework that enables developers to build and extend
How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System
How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22 Document History Document Version Description 1.0 First official release of this guide Document History 2013 SAP AG or an SAP affiliate company.
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
Android vs. Apple ios Security Showdown Tom Eston
Android vs. Apple ios Security Showdown Tom Eston About Your Presenter Tom Eston CISSP, GWAPT Manger of the SecureState Profiling & Penetration Team Specializing in Attack & Penetration, Mobile Security
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Mobile Application GPS-Based
3 Mobile Application GPS-Based Berta Buttarazzi University of Tor Vergata, Rome, Italy 1. Introduction Most of navigators for mobile devices have a big failure; they do not notify the user of road condition
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Threat Model for Mobile Applications Security & Privacy www.datatheorem.com
Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,
Mobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
DEF CON 19: Getting SSLizzard. Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL
DEF CON 19: Getting SSLizzard Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL Agenda Introductions Primer / History: SSL and MITM Attacks Mobile SSL User Experience Research Motivations
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
THEODORA TITONIS VERACODE Vice President Mobile
THEODORA TITONIS VERACODE Vice President Mobile MOBILE SECURITY Increasing Threat MOBILE RISK 64% 34% 47% Companies with no BYOD policy. 3 Companies with no app security program. 4 614% Nearly half of
Affiliate Marketing for Mobile Apps. Peter Hamilton Partner / CMO Email: [email protected] Twitter: @PeterHamilton #AMDays
Affiliate Marketing for Mobile Apps Peter Hamilton Partner / CMO Email: [email protected] Twitter: @PeterHamilton #AMDays BOOM!!! Mobile Devices: More Mobile Phones than Humans on Earth More Smart Phones
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Mobile App Testing Process INFLECTICA TECHNOLOGIES (P) LTD
Mobile App Testing Process Mobile Application Testing Strategy EMULATOR QA team can perform most of the testing in a well-equipped test environment using device emulators with various options like ability
Cloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
ios SDK possibilities & limitations
ios SDK possibilities & limitations Licensing Licensing Registered as an Apple Developer (free) Access to XCode3 and ios SDK ios, Mac and Safari Dev Center Resources No possibility of distribution of developed
Absolute Manage MDM. John Wu Systems Engineer [email protected]
Absolute Manage MDM John Wu Systems Engineer [email protected] Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset
Mobile Phones Operating Systems
Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
999GPS.net Tracking Platform Operation Guide
999GPS.net Tracking Platform Operation Guide Welcome to use this Real Time GPS tracking platform, This software is web based system, it is not necessary to download any software or any plug-in software,
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Adobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
SSL Inspection Step-by-Step Guide. June 6, 2016
SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
AXON Mobile for ios Devices User Manual
AXON Mobile for ios Devices User Manual IMPORTANT SAFETY INSTRUCTIONS. Read all warnings and instructions. Save these instructions. For the most current product warnings and instructions, go to www.taser.com.
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
Native mobile apps: The wrong choice for business?
Native mobile apps: The wrong choice for business? Why businesses should think twice before building native mobile applications A white paper from Introduction Native mobile applications are popular with
Analysis of Native and Cross-Platform Methods for Mobile Application Development. [ Whitepaper] Praveen Kumar S
[ Whitepaper] Analysis of Native and Cross-Platform Methods for Mobile Application Development Praveen Kumar S Abstract Brands today use smartphones and tablets to reach out to consumers. However, it is
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Mobile Devices Using Without Losing
Mobile Devices Using Without Losing Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Tech Briefing 30March 2012 We all have mobile devices iphones,
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Building cross-platform Modern Apps: the Design perspective. Amit Bahree, Senior Director, Avanade @bahree, http://desigeek.com
Building cross-platform Modern Apps: the Design perspective Amit Bahree, Senior Director, Avanade @bahree, http://desigeek.com Agenda Mobile Platforms CoIT Development Options Xamarin Architecture Patterns
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17 Who are we? Flora Bottaccio Security Analyst at ADVTOOLS Sebastien Andrivet Director, co-founder of ADVTOOLS ADVTOOLS Swiss company founded in 2002
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle
