Hide Android Applications in Images
|
|
|
- Caroline Farmer
- 9 years ago
- Views:
Transcription
1 Hide Android Applications in Images Axelle Apvrille, Fortinet, FortiGuard Labs 120, rue Albert Caquot Biot, France Ange Albertini, Corkami September 18, 2014 Abstract With AngeCryption, [Alb14b] has demonstrated it is possible to encrypt any input into a chosen JPG or PNG image. For a mobile malware author, this is particularly interesting when applied to Android packages (APK). Indeed, in that case, an attacker can craft a seemingly genuine wrapping APK which contains a valid image (e.g a logo) as resource or asset. However, the code is able to transform this unsuspicious image into another APK, carrying the malicious payload. The attacker installs that APK, and performs his/her nefarious deeds. Such an attack is highly likely to go unnoticed, because the wrapping APK hardly has anything suspicious about it, and nothing about the payload APK leaks as it is encrypted. Additionally, the attack works with any payload and currently on any version of Android. In short, what you see is on the left (an image). What there really is on the right (an Android application). Figure 1: A PNG of Anakin Skywalker :) Figure 2: Hidden payload Android application In this talk, we show the Proof of Concept application we have built. Naturally, the payload APK is harmless (it displays an image of Darth Vader). It is hidden in a genuine image of Anakin Skywalker. We show Android disassemblers are unable to detect anything of the real payload. We explain our PoC s implementation and how this attack works. Finally, we discuss potential solutions to mitigate such an attack. 1
2 The PoC has been sent to the Android Security Team on May 27, 2014, accepted and will be fixed in future releases. We are happy to be in the Android Security hall of fame [HOF14]. 1 Origins Android malware authors have always liked to hide malicious parts in applications they create or trojan. For example, Android/DroidCoupon.A!tr hides a rooting exploit in a PNG image inside the sample s raw resource directory (see Table 1). Images are usually found in all genuine applications, they are consequently a good choice for malware authors to hide malicious code and hope it won t be detected. Android malware name and sha256 hash Year of discovery Android/Gamex.A!tr ae7a f85d7a2ed205994f2d26f2d695aef15a bccbbbd069 Android/SmsZombie.A!tr acd51a4517bd8f6fb994ee0bb9408bdd80dd906183a3cdb4b39c4791 Android/DroidCoupon.A!tr 94112b350d0feceff0a788fb042706cb623a55b559ab4697cb10ca6200ea7714 Obfuscation 2013 Assets contains a file named logos.png. This is not a PNG, but a ZIP, and it de-zips to different valid output whether XORed with key (18) or not Hides malicious package in a33.jpg 2011 The Rage Against the Cage exploit is hidden in a PNG file in raw resources Table 1: Examples of samples hiding malicious packages in resource files In some cases, they even try more tricky solutions like in Android/Gamex.A!tr where the asset, misleadingly named logos.png, unzips differently (and correctly) whether XORed with a key or not. This is close to what researchers commonly refer to as polyglots [Alb14a]: a file which is valid for different formats. So, how about creating a PNG/APK polyglot? An APK is nothing more than a ZIP, and creating a polyglot file which is valid for both formats (PNG and ZIP) is actually quite easy. PNG files must start with a PNG file header at offset 0. ZIP tools however are less restrictive and allow the ZIP file header to be located somewhere else later in the file. So, a PNG/APK polyglot can be simply creating by prefixing a PNG to an APK: $ cat myphoto.png app.apk > polyglot.png $ file polyglot.png polyglot.png: PNG image data, 382 x 385, 8-bit/color... $ unzip -l polyglot.png Archive: polyglot.png warning [polyglot.png]: extra bytes at beginning... Length Date Time Name :03 res/layout/main.xml :03 AndroidManifest.xml :03 resources.arsc... Fortunately (or unfortunately depending from which angle you look at it), Android is more restrictive than common zip tools, and it refuses to load such APKs: 2
3 Figure 3: When encrypted with AES-CBC and the given key and IV, the image of Anakin Skywalker encrypts to the image of Darth Vader. This proves it is possible to manipulate the output of encryption bytes. $ adb install polyglot.png Whoops: didn t find expected signature read_central_directory_entry failed file polyglot.png is not a valid zip file So, creating a PNG/APK polyglot actually fails. We then contemplate a tricker solution: Ange- Cryption. A valid PNG image will turn into a valid APK after decryption. 2 AngeCryption 2.1 Introduction AngeCryption [Alb14b] has demonstrated it is possible to encrypt any input file into a JPG or PNG image. For example, in [Apv14] we have shown we are able to encrypt Anakin Skywalker into Darth Vader, and reciprocally decrypt Darth Vader into Anakin Skywalker. See picture below. Encrypting with AES-CBC the image of Anakin with the specified key and Initialisation Vector results in the image of Darth Vader - and reciprocally. 2.2 Short crypto reminder A short reminder on cryptography is required to explain AngeCryption. However, we insist that AngeCryption is understandable without knowing much more about cryptography. AES (like DES, Blowfish etc) is block cipher, i.e it processes input data of a given size only. In the case of AES, the block size is of 16 bytes. This means that, essentially, AES is only able to process 16 bytes. To chain bigger documents, people use chaining methods which explain how to process each blocks. CBC, Cipher Block Chaining, is a common chaining method [NIS01]. 3
4 Figure 4: PNG file format illustration by Ange Albertini For its operation, it requires an additional parameter which is called the Initialisation Vector (IV). Exactly, if we call P i the 16-byte chunks of plaintext (unencrypted data), K the encryption key, IV the 16-byte initialization vector, then C i the corresponding ciphertext blocks (encrypted data) are computed like this: C 0 = AES K (P 0 IV ) and C i = AES K (P i C i 1 ). 2.3 How AngeCryption works A given input file cannot encrypt into a given output image as such, without a little trick. We do not exactly encrypt the input file but something that looks identical, and it does not exactly output the expected image, but something that looks identical. Precisely, the format of PNG files is illustrated at Figure 4 We output a PNG with the following layout. File Header. PNG start with a fixed 8-byte signature which is 0x89 PNG 0x0d 0x0a 0x1a 0xa. It needs to be correct for the file to be recognized as a valid PNG. Garbage chunk. We insert here data which will be ignored by the tool that reads the file as image, e.g comment chunks, end of object. For PNGs, a chunk is made of: Chunk length (4 bytes) Chunk id (4 bytes). We use a dummy chunk type like aaaa, so that tools ignore this chunk. Chunk data. CRC32 of chunk data and id. Header chunk (IHDR). In theory, PNG specifications [RPB99] mandate that PNGs begin with a header chunk (IHDR). In practice, this is seldom enforced by tools as we will demonstrate. 4
5 Data chunk (IDAT). Those are the chunks that contains the correct image data blocks End chunk (IEND), which terminates the PNG. To get such an output, we: Select an appropriate IV. We want our first cipher block C 1 to be equal to the PNG file header (8 bytes) + chunk length (4 bytes) + chunk id (4 bytes). By chance, this fits in an AES block (they are 16 bytes long). We also know what P 0 looks like: the first block of the input file. Finally, we know K. So, we select IV such that: IV = AESk 1 (C i) P i. In other words, we select the IV we need to get the first cipher block we want. Note that in real encryption cases, IV is selected randomly. Generate a modified input file. This modified input data has appended data at the end. This appended data is the decrypted CRC32 checksum + target image file blocks + end chunk. Why? Because when we encrypt decrypted data, we get the original data. So, if we encrypt those decrypted image blocks, we get the image blocks: AES k (AESk 1 (P i)) = P i. Note that AngeCryption is independant of AES, CBC or PNG. It just requires that: First cipherblock can be controlled (e.g via IV selection) Source format tolerate appended data Header + chunk declaration data fits in block size. 2.4 Tool An AngeCryption tool is released on angecrypt.py. For the end-user, the goal is to be able to encrypt an input file into a target image. To do so, AngeCryption must manipulate the input file into a modified file, without altering its content. The command line is: $ python angecrypt.py inputfile targetimage modifiedinput key algorithm where: inputfile. The initial file the end-user wants to encrypt into a target image. targetimage. That s what we want the encrypted file to look like. Current supported formats for output are PDF, PNG, JPG, FLV. modifiedinput. That s the input file modified by angecrypt.py so that encryption will indeed encrypt to targetimage. Manipulation of the input file is required: encrypting the input file directly cannot produce the targetimage. However, note that modifiedfile remains content-identical to inputfile, i.e if inputfile is an APK, then modifiedfile.apk is also a valid APK which installs the same application. key. The encryption key to use. Provide a string of valid length. 5
6 algorithm. Encryption algorithm to use. Currently, this is either AES128-CBC or 3DES-EDE2- CBC, with no padding. So, as output, the tool produces: 1. A modified input file. 2. A generated Python script to test and encrypt the input file. In this script, the appropriate IV to use is generated. 3 PoC application 3.1 Goal Essentially, what we wish to prove is that it is possible to embed undetectable, valid and runnable bytecode in a wrapping APK. By undetectable, we mean that static analysis, such as disassembly, of the wrapping APK does not reveal anything particular about that bytecode (apart if we undo the encryption packing). Important notes: Our PoC embeds an Android application, but we could basically have it embed whatever we want. For example, just a Dalvik Executable. We have not paid attention to obfuscating the wrapping APK. We believe this is outside the scope of the paper, as there is no particular problem in using off-the-shelf obfuscators such as ProGuard, DexGuard etc. We have not tried either to hide the installation of the payload APK. There are several ways to do this, for instance using the DexClassLoader class [Str12]. As this is a known technique, we believe this is also outside the scope of this paper. 3.2 Demo We have created a PoC Android application containing a valid PNG image of Anakin Skywalker, which installs a payload APK that displays an image of Darth Vader. We disassemble the PoC application and check that the string is nowhere to be seen in the wrapping APK. For example, with baksmali: $ java -jar baksmali.jar -o./smali PocActivity-debug.apk $ grep -r "Darth Vader"./smali $ The assets only contain one valid (viewable) PNG file (see Figure 1): $ file anakin.png anakin.png: PNG image data, x , 45-bit Now, let s show it works: 1. Install the application: 6
7 adb install PocActivity-debug.apk 2. Launch the application (Figure 5) and press the button. 3. This triggers the hidden payload APK (Figure 6)! This demonstration works with any payload application. Note trickier implementations can conceal the installation of the payload APK. Figure 5: Wrapping APK screenshot. Press the button to trigger the install of the hidden payload APK Figure 6: Hidden payload APK 3.3 Implementation Creating the encrypted payload APK We have implemented a dummy payload APK. In our case, this APK simply displays an image, but anything is possible. We are going to encrypt this APK into a PNG of Anakin Skywalker. $ python angecrypt.py payload.apk anakin-original.png payload-similar.apk Anakin= DarkSide aes For example, this outputs payload-similar.apk and generates a Python script to encrypt it: algo = AES.new( Anakin= DarkSide, AES.MODE_CBC, \xd3\x9e\x0c\xef#p*\xa3\xe9\x8a\xcc:+\xf0\x1a\xec ) with open( payload-similar.apk, "rb") as f: d = f.read() d = algo.encrypt(d) with open("dec-" + anakin-original.png, "wb") as f: f.write(d) 7
8 As such, the demo cannot immediately work, because payload-similar.apk does not unzip correctly 1 : $ unzip -l payload-similar.apk Archive: payload-similar.apk End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive. unzip: cannot find zipfile directory in one of payload-similar.apk or payload-similar.apk.zip, and cannot find payload-similar.apk.zip, period. Unzipping fails because some tools like unzip do not accept too much appended data at the end, the end being marked by a record called End-of-central-directory (EOCD). To work around, we add another EOCD at the end of our APK: there are thus 2 EOCD in the APK. $ dupe_eocd.py payload-similar.apk Precisely, the generated APK has the following format: Payload APK - unmodified. That s the application that displays Darth Vader in our PoC. Note there will be an EOCD at the end of the application. AES 1 (CRC32 + IHDR + IDAT + IEND) where CRC32 is the CRC32 checksum of the garbage chunk we inserted in the image. IHDR corresponds to the PNG header chunk IDAT corresponds to the PNG data chunks. That s where the pixels of Anakin are. IEND corresponds to a terminating PNG chunk Padding bytes. Those bytes ensure that the APK size is a multiple of 16, so that it can be processed by AES as such. EOCD The unzip tool is happy with this APK. Finally, we encrypt this APK (using the script which was generated earlier 2 : $ python encrypt-apk.py The APK does encrypt to a valid PNG of Anakin Skywalker (see Figure 7) because: The IV has been selected so that AES(beginning of APK)= Header + garbage chunk Appended data corresponds to decrypted data. Encrypting decrypted data is like doing nothing: AES(AES 1 (CRC32 + Anakin + IEND)) = CRC32 + Anakin + IEND. We get the garbage chunk CRC32 checksum, the chunk containing the image of Anakin and the end chunk. In crypto, CBC chaining also affects blocks after itself. So, adding padding bytes and EOCD to the file only affects cipherblocks after the end chunk. AES(Padding bytes+eocd) produces garbage bytes at the end of the image. Those bytes are ignored because they appear after the end chunk. 8
9 PNG File Header Garbage chunk Chunk CRC 32 Chunk IHDR Chunk(s) IDAT containing Anakin Skywalker Chunk IEND AES(Dummy) AES(EOCD) AES encrypt Ignored APK Payload APK AES 1 (CRC32 +IHDR + IDAT +IEN D) Dummy bytes so that size multiple of 16 EOCD Figure 7: Real layout of PNG and APK in the demo We check that the encrypted APK looks like a real PNG of Anakin Skywalker. It does :) This is the PNG we will insert in the assets of a wrapping APK. Just to be sure it will work, we check that the decrypted PNG installs on Android: $ python decrypt-png.py $ adb install decrypted.apk 2893 KB/s ( bytes in 0.135s) pkg: /data/local/tmp/decrypted.apk Success Wrapping APK There are several ways to implement such an APK. We chose a simple and straight forward method (but it can be enhanced): Read the asset using AssetManager.getAssets() and open the PNG. The payload APK could also have been hidden in raw resources. Decrypt the asset using cipher AES/CBC/NoPadding. Write the decrypted APK to the SD card. Another writeable location would do fine too. Alternatively, there are ways to load DEX files as byte arrays (see opendexfile in dalvik.system.dexfile). Install the APK using the following piece of code: Intent intent =new Intent(Intent.ACTION_VIEW); intent.setdataandtype(uri.fromfile(new File(filename)), 1 Android packages (.apk) actually are Zip files (.zip) 2 Do not forget to customize the filenames to encrypt the modified duplicate EOCD payload-similar.apk file. 9
10 "application/vnd.android.package-archive"); intent.addflags(intent.flag_activity_new_task); startactivity(intent); There are other ways to do this (calling setclassname() for example). This implementation has the advantage of working on Android 4.4, but it triggers an install screen that an attacker might want to hide. Concealing the install screen is feasible (e.g using DexClassLoader), but is out of the scope of this paper. 4 Status This PoC has been tested over Android (latest version at the time of writing the paper). The PoC has been sent to the Android Security Team on May 27, On June 6, 2014, the team implemented a fix prohibiting any appended data after EOCD. We are however uncertain the fix makes sure to look after the first EOCD, and have consequently filed an issue on June 19,2014. The Android Security Team answered they d be looking into it. 5 Conclusion It works :) We are able to hide a payload APK inside an apparently genuine APK. This genuine wrapping APK does not reveal anything of the payload APK. This can be used maliciously by an attacker to hide his real intents, or by packers. How can we detect this? Currently, there is no real way to detect what the payload APK does, apart from actually decrypting the PNG. Security engineers might consider the following: Keep an eye on applications which are decrypting resources or assets. Our wrapping code for instance is easy to understand. It could be obfuscated though. Run the application in a sandbox and check for unexpected behaviour. Indeed, this technique hides the payload application/bytecode, not the behaviour. When the wrapping APK is launched, the payload PAK will get executed. Add stronger constraints to APKs so that an image can no longer decrypt to a valid APK. For instance, forbidding appended data in the ZIP format after the first End Of Central Directory will have AngeCryption fail. This is the option the Android Security Team chose and have started fixing on June 6th References [Alb14a] Ange Albertini. This PDF is a JPEG; or This Proof of Concept is a Picture of Cats. Journal of PoC GTFO, 3, [Alb14b] Ange Albertini. When AES(*)=*, April src/angecryption/slides/angecryption.pdf. 10
11 [Apv14] Axelle Apvrille. AngeCryption at Insomni Hack, March AngeCryption-at-Insomni-Hack/. [HOF14] Android Security Acknowledgements, security/acknowledgements.html. [NIS01] NIST. Recommendation for Block Cipher Modes of Operation - Modes and Techniques, Special Publication A, sp800-38a.pdf. [RPB99] Glenn Randers-Pehrson and Thomas Boutell. PNG (Portable Network Graphics) Specification. Technical report, Massachusetts Institute of Technology (MIT), Version [Str12] Tim Strazzere. Dex Education: Practicing Safe Dex. In BlackHat USA, July
Covering the global threat landscape
Covering the global threat landscape OBFUSCATION IN ANDROID MALWARE, AND HOW TO FIGHT BACK Axelle Apvrille & Ruchna Nigam Fortinet, France Malware authors are certainly creative when it comes to hiding
Android Application Repackaging
ISA 564, Laboratory 4 Android Exploitation Software Requirements: 1. Android Studio http://developer.android.com/sdk/index.html 2. Java JDK http://www.oracle.com/technetwork/java/javase/downloads/index.html
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 13 Some More Secure Channel Issues Outline In the course we have yet only seen catastrophic
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
Reversing Android Malware
Reversing Android Malware The Honeynet Project 10 th Annual Workshop ESIEA PARIS.FR 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Copyright 2011 CyberSecurity Malaysia MYSELF Mahmud Ab Rahman
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL
A Perfect CRIME? TIME Will Tell Tal Be ery, Web research TL Agenda BEAST + Modes of operation CRIME + Gzip compression + Compression + encryption leak data TIME + Timing + compression leak data Attacking
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
An overview of FAT12
An overview of FAT12 The File Allocation Table (FAT) is a table stored on a hard disk or floppy disk that indicates the status and location of all data clusters that are on the disk. The File Allocation
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures Author: Debasis Mohanty www.hackingspirits.com Email ID: [email protected] [email protected] Table of Contents 1. INTRODUCTION............3 2.
PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling
Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Project #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
Practical Attacks on Digital Signatures Using MD5 Message Digest
Practical Attacks on Digital Signatures Using Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic [email protected]
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France
GostCrypt User Guide Laboratoire de Cryptologie et de Virologie Opérationnelles - France Copyright c 2014 Laboratoire de Cryptologie et de Virologie Opératoinnelles - France GOSTCRYPT.ORG Contents 1 Introduction.................................................
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
Digitally Signing Acrobat PDF Files
UK ATC Malcolm Stewart Royal Observatory Edinburgh 20 December 2001 Computing User Note CUN 23.1 Digitally Signing Acrobat PDF Files Contents 1. Introduction... 1 2. Acronyms... 1 3. Prerequisites... 2
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
The OWASP Foundation http://www.owasp.org
Android reverse engineering: understanding third-party applications OWASP EU Tour 2013 June 5, 2013. Bucharest (Romania) Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security
Securing Data at Rest: Database Encryption Solution using Empress Embedded Database
Securing Data at Rest: Database Encryption Solution using Empress Embedded Database By: Srdjan Holovac Empress Software Inc. June 2012 White Paper Contents Introduction... 2 Importance of security... 2
Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011
Transmission Security (TRANSEC) in an IP-based VSAT Architecture February 2011 As the ability to monitor satellite transmissions grows more sophisticated, the need to implement increased levels of security
Monitor file integrity using MultiHasher
Monitor file integrity using MultiHasher Keep Research Data Securely Integrity Monitoring Beginner Introduction This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
AES Crypt User Guide
AES Crypt User Guide Publication Date: 2013-12-26 Original Author: Gary C. Kessler ([email protected]) Revision History Date Contributor Changes 2012-01-17 Gary C. Kessler First version 2013-03-03 Doug
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
MarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Beginners Guide to Android Reverse Engineering
(W)ORK-SH/OP: Beginners Guide to Android Reverse Engineering (W)ORK-SH/OP: [email protected] Hall[14], Day 3 11:00h Agenda Purpose Recommended or needed tools (De)construction of Android apps Obtaining APKs Decompiling
WhatsApp monitoring for Fun and Stalking. by Flavio Giobergia
WhatsApp monitoring for Fun and Stalking by Flavio Giobergia The idea behind the project If you have used WhatsApp at least once in your life, you know that there is a really lovely/shitty (deping on the
CNC Transfer. Operating Manual
Rank Brothers Ltd CNC Transfer Operating Manual Manufactured by: Rank Brothers Ltd 56 High Street, Bottisham, Cambridge CB25 9DA, England Tel: +44 (0)1223 811369 Fax: +44 (0)1223 811441 Website: http://www.rankbrothers.co.uk/
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Android Packer. facing the challenges, building solutions. Rowland YU. Senior Threat Researcher Virus Bulletin 2014
Android Packer facing the challenges, building solutions Rowland YU Senior Threat Researcher Virus Bulletin 2014 1 What is Android Packer? Android packers are able to encrypt an original classes.dex file,
Bootloader with AES Encryption
...the world's most energy friendly microcontrollers Bootloader with AES Encryption AN0060 - Application Note Introduction This application note describes the implementation of a bootloader capable of
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Hello. What s inside? Ready to build a website?
Beginner s guide Hello Ready to build a website? Our easy-to-use software allows you to create and customise the style and layout of your site without having to understand any coding or HTML. In this guide
MICROSOFT WORD TUTORIAL
MICROSOFT WORD TUTORIAL G E T T I N G S T A R T E D Microsoft Word is one of the most popular word processing programs supported by both Mac and PC platforms. Microsoft Word can be used to create documents,
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Hydra. Advanced x86 polymorphic engine. Incorporates existing techniques and introduces new ones in one package. All but one feature OS-independent
Hydra Advanced x86 polymorphic engine Incorporates existing techniques and introduces new ones in one package All but one feature OS-independent Random register operations Different synonymous instructions
Network Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z
Network Security EDA491 2011/2012 Laboratory assignment 4 Revision A/576, 2012-05-04 06:13:02Z Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
Optimized Mal-Ops Hack ad networks like a boss
Optimized Mal-Ops Hack ad networks like a boss Vadim KOTOV [email protected] @vadimkotov Rahul KASHYAP [email protected] @rckashyap Virus Bulletin Seattle 2014 Agenda What is malvertising? Why is
OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: [email protected] Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
Identifying and Exploiting Padding Oracles. Brian Holyfield Gotham Digital Science
Identifying and Exploiting Padding Oracles Brian Holyfield Gotham Digital Science Session ID: ASEC-403 Session Classification: Intermediate What is a Padding Oracle? We re a SQL Server Shop, we don t use
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
A Basic Summary of Image Formats
A Basic Summary of Image Formats Merciadri Luca [email protected] Abstract. We summarize here the most used image formats, and their respective principal applications. Keywords: image formats,
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
AutoCrypt 2.1 User Guide!
AutoCrypt 2.1 User Guide We Make Software - TensionSoftware.com AutoCrypt 2011-2013 Tension Software all rights reserved Every effort has been made to ensure that the information in this manual is accurate.
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
A simple tscheme guide to securing electronic transactions
A simple tscheme guide to securing electronic transactions 1 A simple tscheme guide to securing electronic transactions Electronic Transactions An electronic transaction is best thought of as a type of
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
User Manual. UniMag Magnetic Stripe Reader For Mobile Devices
User Manual UniMag Magnetic Stripe Reader For Mobile Devices 80110505-001-G 07/27/2011 Copyright 2010-2011, International Technologies & Systems Corporation. All rights reserved. Revision History Revision
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
NØGSG DMR Contact Manager
NØGSG DMR Contact Manager Radio Configuration Management Software for Connect Systems CS700 and CS701 DMR Transceivers End-User Documentation Version 1.24 2015-2016 Tom A. Wheeler [email protected] Terms
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE FENG Ziliang*, PAN Weijun* / ** 1, WANG Yang* * Institute of Image and
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
LAB 6: Code Generation with Visual Paradigm for UML and JDBC Integration
LAB 6: Code Generation with Visual Paradigm for UML and JDBC Integration OBJECTIVES To understand the steps involved in Generating codes from UML Diagrams in Visual Paradigm for UML. Exposure to JDBC integration
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lab V: File Recovery: Data Layer Revisited
New Mexico Tech Digital Forensics Fall 2006 Lab V: File Recovery: Data Layer Revisited Objectives - Perform searches based on file headers - Data Carving with Foremost - Zip password recovery Procedures
On Disk Encryption with Red Hat Enterprise Linux
On Disk Encryption with Red Hat Enterprise Linux Author: Contact: Copyright: URL: Bowe Strickland, Curriculum Manager [email protected] Copyright 2011, Red Hat, Inc. All rights reserved. http://people.redhat.com/~bowe/summit/2011/tot/on_disk_encryption
