Vision: Automated Security Validation of Mobile Apps at App Markets
|
|
|
- Steven Pearson
- 10 years ago
- Views:
Transcription
1 Vision: Automated Security Validation of Mobile Apps at App Markets ABSTRACT Peter Gilbert Duke University Durham, NC Landon P. Cox Duke University Durham, NC Smartphones and app markets are raising concerns about how third-party applications may misuse or improperly handle users privacy-sensitive data. Fortunately, unlike in the PC world, we have a unique opportunity to improve the security of mobile applications thanks to the centralized nature of app distribution through popular app markets. Thorough validation of apps applied as part of the app market admission process has the potential to significantly enhance mobile device security. In this paper, we propose AppInspector, an automated security validation system that analyzes apps and generates reports of potential security and privacy violations. We describe our vision for making smartphone apps more secure through automated validation and outline key challenges such as detecting and analyzing security and privacy violations, ensuring thorough test coverage, and scaling to large numbers of apps. Categories and Subject Descriptors D.4.6 [Software]: Operating Systems Security and Protection General Terms Design, Security 1. INTRODUCTION The success of Apple s App Store and Google s Android Market has transformed mobile phones into a first-class development platform. The number of third-party applications or apps that the average smartphone user installs has grown rapidly [6], and browsing app stores has become a form of inexpensive entertainment for millions of people. Apps are small programs that often provide their functionality by accessing sensitive data (e.g., account, password, contact, financial records, medical records, GPS, camera, and microphone) and services located in the cloud (e.g., Google, Facebook, and Twitter). Ensuring that apps properly handle such high-value sensitive data is an important and difficult problem. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. MCS 11, June 28, 2011, Bethesda, Maryland, USA. Copyright 2011 ACM /11/06...$ Byung-Gon Chun Yahoo! Research Santa Clara, CA [email protected] Jaeyeon Jung University of Washington Seattle, WA [email protected] There are growing concerns about both buggy and malicious apps that may leak, steal, or destroy sensitive data. Recent incidences of malicious apps found in the Android Market show that smartphones are susceptible to the same kinds of malware that have long plagued the PC world [5]. Furthermore, many other apps, while lacking malicious intent, may unintentionally compromise sensitive data. Recent studies of the Android and iphone platforms [8, 19, 27] have found that apps frequently share private data in an undesirable way by leaking it to unknown destinations and third-party ad servers. Similar to approaches for securing PCs, research on mobile device security has explored end-host system solutions such as scanning for viruses using signatures. Our prior work on TaintDroid [19] used taint tracking to detect unwanted exfiltration of sensitive data. It allows a user to track the propagation of sensitive data through and between apps and can raise an alert when sensitive data leaves the device. However, by the time a leak has been detected and analyzed, it may be too late to protect the sensitive data. Other work explores running end-host replicas (dubbed virtual smartphones or clones) in the cloud to enable more powerful analysis [15, 25]. However, these approaches still rely on detecting malicious or abnormal behavior after apps have been installed and run on individual smartphones. Fortunately, unlike in the PC world, we have a unique opportunity to improve the security of mobile applications thanks to the centralized nature of app distribution; users typically obtain apps through just a few popular app markets (e.g., Apple App Store, Google Android Market, Amazon s Appstore, Microsoft Windows Phone 7 Marketplace). Applying security validation at the appmarket level offers a great opportunity to enhance mobile app security. However, app markets currently apply either limited manual validation or no validation at all. The manual validation approach involves experts employed by an app market or a third-party security firm deciding whether to approve an app by manually exercising its functionality and observing its behavior. Unfortunately, experience with Apple s App Store approval process has demonstrated that this approach is less than ideal. Apple s approval process can introduce costly delays and uncertainty into the development cycle, while banned behavior such as WiFi-3G bridging [9] and alleged violators of Apple s privacy policies [3, 4] have still slipped into the App Store. We believe that automated validation of smartphone apps at the app-market level is a promising approach for drastically improving the security of smartphones. We envision an automated validation process applied either by market providers to apps submitted for in-
2 clusion, or by a third-party market filter service that advises users about apps safety. Alternatively, a market provider could offload the task of validating submitted apps to a third-party service. In this paper, we present a system that aims to achieve this goal. At a high level, the system utilizes virtual smartphones running in the cloud to test and verify security properties of apps. By running virtual smartphones in parallel, we can analyze apps at a massive scale. AppInspector is an automated security testing and validation system that embodies this approach. We have identified several important challenges such as generating inputs that sufficiently explore an app s functionality, logging relevant events at multiple levels of abstraction as the app executes, and using these logs to accurately characterize an app s behavior. Our exploration is preliminary and intended to initiate discussion on mobile app validation. The rest of this paper discusses each of these challenges in greater detail and proposes several promising techniques for addressing them. 2. SYSTEM OVERVIEW We envision a security validation system that 1) analyzes apps submitted to popular app markets, 2) identifies apps that exhibit malicious behavior and should be removed or avoided by users, and 3) facilitates producing easy-to-understand reports informing users of potential privacy risks due to misuse or abuse of sensitive data. To analyze apps, we propose a dynamic approach that monitors an app s use of sensitive information and checks for suspicious behavior such as excessive resource consumption or deleting user data. In order to scale to hundreds of thousands of apps in a costeffective manner, this process must be automated as much as possible. However, it would be cost-prohibitive to test such a large number of apps on actual mobile devices. Instead, we propose using commodity cloud infrastructure to emulate smartphones. This will enable a large-scale security validation service to be built at low cost by utilizing the cloud for computation. A single host may be capable of running multiple virtual device instances at once, and cloud-hosted validation will enable testing many apps in parallel. Building such an app validation system presents three key challenges: C1. How do we track and log sensitive information flows and actions to enable root cause analysis and application behavior profiling? C2. How do we identify security or privacy violations from collected logs and pinpoint the root cause and execution path that led to the violations? C3. How do we traverse diverse code paths to ensure that analysis is thorough? In the rest of the paper, we give an overview of AppInspector, our proposed system to address these challenges. At a high level, the envisioned validation system consists of an AppInspector master, which creates multiple AppInspector nodes, each including a virtual smartphone. Validation is massively parallel, and requires little coordination between tasks. The master coordinates scheduling validation tasks on the nodes. We outline the basic steps of a validation task, i.e., the analysis of an app on a single AppInspector node. Figure 1 illustrates the major components of the system mentioned in the overview. AppInspector first installs and loads the app on a virtual smartphone. Figure 1: AppInspector node architecture An input generator running on the host PC then injects user interface events and sensor input. The smartphone application runtime is augmented with an execution explorer that aids in traversing possible execution paths of the app. These two components address C3. While the app runs, an information-flow and action tracking component monitors privacy-sensitive information flows and generates logs, addressing C1. Finally, to address C2, AppInspector provides security analysis tools which can be used after execution completes to interpret the logs and generate a report. In the following sections we further describe these four components. 3. TRACKING APPS BEHAVIOR AppInspector s ultimate goal is to identify third-party apps that behave maliciously or mishandle privacy-sensitive data, before they are released through app markets. An additional goal is to help smartphone users better understand how all apps handle their privacysensitive information, to allow them to make informed decisions about which apps to install and use. To this end, we must first define what we consider to be a security or privacy violation. A security violation occurs when an app performs an action beyond the permissions granted to the app at install-time by the underlying smartphone platform. For example, if an app accesses sensitive data for which it is not granted permission, this is a clear security violation. Privacy violations can be more subtle. Because many apps collect sensitive information such as location or user identifiers in order to provide useful functionality, simply detecting a transmission of sensitive data is not sufficient to declare a privacy violation. At a high level, a privacy violation occurs when an app releases sensitive data to a remote party in a way neither expected nor desired by the user. However, encoding user preference and expectations inside automated analysis is difficult. As a result, for the purposes of automated detection, we define a privacy violation as follows: we consider a violation to occur when an app discloses sensitive information without first notifying the user through a prompt or license agreement. Whether or not a disclosure is considered a privacy violation by a user will often depend on its purpose or intent as perceived by the user: for example, a user may tolerate her location being sent to a content server to deliver content tailored to her location, but she might object to her location being sent to a third-party analytics service. In general, multiple components may be involved in causing a violation. These may include the app itself, as well as third-party analytics and advertising libraries plugged in by the developer for monetization. However, we note that the involvement of third-party code is not necessary for a violation to occur. The key asset that AppInspector aims to protect is users privacysensitive data. In order to detect leaks or disclosures and then iden-
3 tify the specific functionality or code component(s) involved in a leak or disclosure, we need to pinpoint the root cause and execution path that led to an outgoing network transmission containing sensitive data. To support this kind of analysis, it is necessary to track both explicit flows, in which sensitive information propagates through the app, external libraries, and system components through direct data dependencies, as well as implicit flows, e.g., when information is leaked due to a sensitive value influencing the control flow of the program. Tracking Explicit Flows. To track explicit flows of sensitive data, we apply system-wide dynamic taint analysis, or taint tracking [17, 23]. Taint tracking involves attaching a label to data at a sensitive source, such as an API call which returns location data, and propagating this label through program variables, IPC messages, and persistent storage, to detect when it reaches a sink such as an outgoing network transmission. We take advantage of the fact that apps are often written primarily in interpreted code and executed by a virtual machine to simplify the implementation and reduce the runtime overhead of taint propagation as in TaintDroid [19]. However, since our analysis is performed offline, we can take a step further to address some limitations of the system posed by its realtime operation. For example, we can perform finer-grained taint tracking for IPC messages and file I/O to avoid overtainting problems. In addition, we can also explore finer-grained taint tracking for native functions. Tracking Implicit Flows. Implicit flows leak sensitive information through program control flow. For example, consider the following if-else statement: if (w == 0) x = y; else z = y; where the value of w is privacy-sensitive. By watching the values of x and z, which are affected by the control flow, one can learn whether w is 0 or not. To detect such leaks via implicit flows, we can track control dependencies by creating control-dependency edges; e.g., in the above example, edges between w and x and between w and z. This can potentially result in overtainting, or labeling and propagating false dependencies. A possible approach for addressing this drawback is to selectively propagate tainted control dependencies as in DTA++ [20]. We note that tracking implicit flows accurately is a long-standing challenge and an active area of research. Tracking Actions. In addition to flows of sensitive data, we track and log actions performed by applications at multiple levels in the software stack. For example, we record method invocations that lead to disk and network I/O events or access hardware devices such as GPS or accelerometers. Choosing which information to log and the logging granularity is an important decision which affects both the depth and quality of analysis that can be performed later as well as the runtime performance of the app under testing. While it is not critical for a system driven by automated input to achieve real-time performance, large performance overheads could affect the number of execution paths that can be explored as well as the computational cost. With this in mind, we propose logging the following information: taint source and sink invocations, bytecode instructions which touch sensitive data along with code origin, call graph information including interpreted methods and native code (JNI) invocations, IPC and file system accesses involving sensitive data, and timestamps for all logged events. We believe that we can log these categories of information by instrumenting the application runtime and system libraries in a way that will not impose prohibitive performance or log volume overheads. 4. SECURITY ANALYSIS The next challenge we consider is how to detect malicious behavior and misuse of sensitive data using our information-flow and action tracking runtime. Dependency Graphs. An abstraction that we believe will prove useful is dependency graphs, which illustrate the path from the event determined to be the root cause of a malicious use or a misuse of sensitive data, through the data and control flow of the app and potentially other system components, to an eventual network transmission flagged as containing sensitive data. Dependency graphs are constructed once testing of an app completes using information collected during execution. On top of a dependency graph, we can perform analysis such as backward slicing, filtering, and aggregation. Backward slicing traverses vertices that are causally dependent from sinks to sources. Filtering produces a filtered log of an execution by excluding instructions which are unrelated and unaffected by sensitive information. Finally, aggregation produces a summarized log of an execution that affects sensitive information. Using those primitives, we can write rules to identify misbehavior and then attempt to pinpoint responsible APIs (e.g., third-party library vs. application code), how data passed among apps (or between the app and the system), and the original action or API that triggered the misbehavior (e.g., platform API vs. a button click) We expect that detecting security violations such as an app accessing sensitive data without acquiring explicit permission can be automated. However, it may be difficult to detect other misuses of sensitive data. Detecting misuse of sensitive data. Detecting misuse of sensitive data by an app that was granted permission to access the data is more difficult. End-user license agreements (EULAs) and explicit notifications of data collection can provide useful hints for determining whether a disclosure of sensitive data amounts to a privacy violation. When a disclosure is detected, we can check if a notification is displayed to the user in the causal taint tracking path from the taint source to the taint sink. Then, we can try to determine if the notification contains messages informing the user of data collection or requesting permission to transmit the data in question. Similarly, we can check if the EULA mentions private data collection. Even with EULAs, some permissions-hungry apps may still request more permissions than they need to provide their functionality. Another facet of our analysis could be to determine the permissions actually needed by an app based on its observed functionality. This could help encourage developers to build more privacy-respecting apps. Two promising approaches for interpreting the text of user notifications and EULAs are: 1) applying natural language processing and 2) crowdsourcing like Amazon Mechanical Turk [1]. In the future, this analysis could be made easier if developers utilize P3P [7] to express privacy policies in a machine-readable format. 5. INPUT GENERATION & EXECUTION EXPLORATION So far, we have discussed how to track flows of privacy-sensitive information and analyze execution logs in order to identify security and privacy violations. A fundamental limitation of the proposed dynamic tracking techniques is that any analysis is limited to execution paths which are actually traversed during testing. In practice, an app may offer many diverse execution paths, and to ensure that privacy analysis is thorough, we must determine if there is a feasible path from any source of private information to a corresponding sink among all feasible execution paths. This poses another chal-
4 Code coverage (%) Comics Enmt. Social News& ShopLifestyleTools Health Games Weather Figure 2: Code coverage for random testing (30 minutes) Number of branches Application Figure 3: Branch counts of 1100 apps lenge: Can we explore diverse execution paths of an app accurately and scalably in an automated manner? First, we must keep in mind that smartphone apps are primarily event-based programs. Execution is typically driven by two broad types of events: 1) UI input events, such as taps or drags on the touchscreen or text inputs, and 2) callbacks triggered by other devices or sensors, such as GPS location updates and camera photos. As a result, our system must be capable of generating and delivering arbitrary sequences of UI and sensor input events. Fortunately, many apps use standard UI input elements such as text input fields and buttons provided by platform SDKs. To aid in delivering meaningful inputs to these apps, it may be useful to instrument standard UI libraries to treat common types of input elements such as username/password prompts as special cases. When considering which execution paths to explore, we would like to avoid false negatives and false positives. A false negative occurs when testing fails to cover a feasible execution path that leads to potentially unwanted behavior such as transmitting sensitive data. On the other hand, a false positive occurs when testing explores and flags an execution path, when the path is globally infeasible. Exhaustively exploring all feasible execution paths, which yields no false negatives or false positives, is not scalable due to the well-known path explosion problem, i.e., the number of execution paths grows exponentially as the number of branches increases. This fundamental tradeoff between accuracy and scalability presents a number of research opportunities. To begin, we consider the simple strategy of random testing, which explores concrete execution paths by injecting randomlygenerated inputs, thus avoiding false positives and scalability problems. While attractive in its simplicity, random testing has been found to achieve poor code overage for other types of applications [10, 11]. To get an idea of whether random testing is a viable strategy for testing smartphone apps for privacy violations, we chose nine apps from a late 2010 survey of the most popular free apps in each category of the Android Market [2] and supplied each with a continuous stream of touchscreen taps and drags, hardware button presses, and location updates for 30 minutes. To measure coverage of execution paths, we modified Android s Dalvik VM to collect basic block code coverage. The results presented in Figure 2 show that random testing achieves 40% or lower coverage in all cases. While the experiments did yield at least two disclosures of location data, we observed that the tests commonly got stuck in terminal parts of the apps UI. One example of the shortcomings of random testing is the test of a social networking app, which achieved less than 1% coverage because it could not progress past the initial login prompt. To enable more thorough exploration of execution paths, we advocate a more systematic approach. Symbolic execution [21], which is typically used for finding bugs [11], systematically explores all possible execution paths. Applying symbolic execution to the entire software stack, including apps, libraries, and the OS, would eliminate all false negatives and false positives. However, as we mentioned earlier, complete systemwide symbolic execution is not scalable. Instead, we propose applying a mixed-execution approach, also known as concolic execution, which combines symbolic and concrete execution (e.g., as in CUTE [26], EXE [12], and S2E [14]). Since our goal is to explore diverse paths of a specific third-party app, it is only necessary to apply symbolic execution to the app itself, while the rest of the environment (e.g., Android libraries and system) can be executed concretely. Selectively applying symbolic execution to only part of the system for scalability was explored by S2E [14]. However, for AppInspector, switching back and forth between symbolic execution and concrete execution is necessary not only for scalability but also to enable analysis of apps that communicate with remote parties. When an app interacts with a remote server hosted by a third party, it is not possible to symbolically execute the server code, so AppInspector must concretely execute request/response interactions with the server. To test the basic feasibility of this approach in terms of scaling, we analyzed branch counts of 1100 apps, which are shown in Figure 3. 90% of the apps have 4187 or fewer branches. The results suggest that symbolic execution performed selectively may be feasible for these apps: a recent study [10] demonstrated path exploration for programs with similar complexity. Parallel symbolic execution [16] can further speed up symbolic execution. In symbolic execution, we maintain state associated with the current execution path including a path constraint (a boolean formula over symbolic inputs) and symbolic values of program variables. When we switch from symbolic execution to concrete execution, we use a constraint solver to produce concrete values for the execution. To switch from concrete execution to symbolic execution, we can add the concrete return value and related side effects as part of a constraint. This can cause an overconstraining problem, which can in turn lead to false positives. Another possibility is to make the return value and related side effects symbolic; however this could cause the system to explore infeasible paths since we may not consider calling contexts properly. Exploring this tradeoff is an important research question. Finally, we must decide which program variables should be symbolic and which should be concrete. In general, we choose to make private information such as location symbolic; in contrast, for some variables such as remote IP addresses, we want to use the concrete value in order to determine where private data is being sent. We are developing this mixed execution engine on top of the Android platform to evaluate the accuracy and scalability of our
5 proposed approach. At a high level, we plan to modify Android s Dalvik VM to add extra state including a path constraint or symbolic expression to local variables, operands, and fields. In addition, we must interpret bytecodes in a way that properly manages the extra state by updating the symbolic expression or by forking and updating state for a branch using a constraint solver. 6. RELATED WORK We briefly describe key related work on software security analysis. PiOS [18] shares the goal of investigating smartphone apps for potential privacy violations. Unlike our work, PiOS employs static data flow analysis techniques and is implemented for the Apple ios system. The use of static analysis enables exploring broad execution paths including infeasible ones. However, it is prone to false positives because of well-known problems in static analysis such as alias and context sensitivity problems. Furthermore, it provides incomplete analysis due to the difficulty of resolving messaging destinations and handling system calls. We hope to overcome these challenges by directly instrumenting the smartphone platform and tracking information flow at runtime. Lastly, it is hard to detect certain malicious behavior such as deleting sensitive data using static analysis. By analyzing running programs, we can observe the behavior of apps and detect this type of malicious behavior. Dynamic information flow analysis techniques have proven useful for intrusion detection and malware analysis. BackTracker keeps track of the causality of process-level events for backtracking intrusion [22]. Panorama uses the instruction-level dynamic taint analysis for detecting information exfiltration by malware in Windows OS [28]. Unlike these systems, we explore diverse execution paths systematically by mixing symbolic and concrete execution focusing on third-party smartphone apps. Recently, TaaS proposed a service for automated software testing [13]. CloudAV proposed antivirus as an in-cloud network service [24]. Similarly, we envision AppInspector being used as a service for privacy validation of smartphone apps in the cloud. 7. CONCLUSION This paper presents our vision for implementing automated security validation of mobile apps at app markets. We proposed AppInspector, a security validation service that analyzes smartphone apps submitted to app markets and generates reports that aid in identifying security and privacy risks. We sketched the high-level design of AppInspector and discussed several challenges and ideas for approaching them. We strongly believe that large-scale automated validation of apps at central distribution points is an important step toward enabling more secure mobile computing, and we urge the research community to take advantage of this opportunity. 8. REFERENCES [1] Amazon mechanical turk. [2] Android market. market.android.com. [3] Apple sued over apps privacy issues; google may be next. USTRE6BR1Y [4] iphone and android apps breach privacy. [5] Malware infects more than 50 android apps. technology_and_science-security/. [6] More than 60 apps have been downloaded for every ios device sold. [7] P3P 1.1 Specification. [8] Your apps are watching you. online.wsj.com/article/ SB html. [9] Flashlight app sneaks tethering into app store (for now) [pulled]. July [10] J. Burnim and K. Sen. Heuristics for scalable dynamic test generation. In TR UCB/EECS , [11] C. Cadar, D. Dunbar, and D. R. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, [12] C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In ACM CCS, [13] G. Candea, S. Bucur, and C. Zamfir. Automated software testing as a service. In ACM SOCC, [14] V. Chipounov, V. Kuznetsov, and G. Candea. S2E: A platform for in-vivo multi-path analysis of software systems. In ASPLOS, [15] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: Elastic execution between mobile device and cloud. In EuroSys, [16] L. Ciortea, C. Zamfir, S. Bucur, V. Chipounov, and G. Candea. Cloud9: A software testing service. In LADIS, [17] J. Clause, W. Li, and A. Orso. Dytan: A generic dynamic taint analysis framework. In ISSTA, [18] M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting privacy leaks in ios applications. In NDSS, [19] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, [20] M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic taint analysis with targeted control-flow propagation. In NDSS, [21] J. C. King. Symbolic execution and program testing. Communications of the ACM, [22] S. T. King and P. M. Chen. Backtracking intrusions. In SOSP, [23] J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In NDSS, [24] J. Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-version antivirus in the network cloud. In USENIX Security, [25] G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: Versatile protection for smartphones. In ACSAC, [26] K. Sen, D. Marinov, and G. Agha. CUTE: A concolic unit testing engine for c. In FSE, [27] E. Smith. iphone applications & privacy issues: An analysis of application transmission of iphone unique device identifiers (UDIDs). In Technical Report, [28] H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In ACM CCS, 2007.
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Codeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
Detection and Identification of Android Malware Based on Information Flow Monitoring
Detection and Identification of Android Malware Based on Information Flow Monitoring Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong To cite this version: Radoniaina Andriatsimandefitra, Valérie
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
How To Use Titanium Studio
Crossplatform Programming Lecture 3 Introduction to Titanium http://dsg.ce.unipr.it/ http://dsg.ce.unipr.it/?q=node/37 [email protected] 2015 Parma Outline Introduction Installation and Configuration
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Project Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam [email protected] Abstract Project Orwell is a client and server application designed to facilitate the preservation
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Cloud9 Parallel Symbolic Execution for Automated Real-World Software Testing
Cloud9 Parallel Symbolic Execution for Automated Real-World Software Testing Stefan Bucur, Vlad Ureche, Cristian Zamfir, George Candea School of Computer and Communication Sciences Automated Software Testing
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Threat Model for Mobile Applications Security & Privacy www.datatheorem.com
Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,
Android Developer Applications
Android Developer Applications January 31, 2013 Contact Departmental Privacy Office U.S. Department of the Interior 1849 C Street NW Mail Stop MIB-7456 Washington, DC 20240 202-208-1605 [email protected]
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Enterprise Mobile Application Development: Native or Hybrid?
Enterprise Mobile Application Development: Native or Hybrid? Enterprise Mobile Application Development: Native or Hybrid? SevenTablets 855-285-2322 [email protected] http://www.seventablets.com
Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Detection of illegal control flow in Android System: Protecting private data used by Smartphone Apps
Detection of illegal control flow in Android System: Protecting private data used by Smartphone Apps Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana Cavalli To cite this version: Mariem Graa,
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Machine Data Analytics with Sumo Logic
Machine Data Analytics with Sumo Logic A Sumo Logic White Paper Introduction Today, organizations generate more data in ten minutes than they did during the entire year in 2003. This exponential growth
AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection Zhemin Yang Fudan University [email protected] Guofei Gu Texas A&M University [email protected] Min Yang
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
TouchDevelop App Development on Mobile Devices
TouchDevelop App Development on Mobile Devices Nikolai Tillmann, Michal Moskal, Jonathan de Halleux, Manuel Fahndrich, Sebastian Burckhardt Microsoft Research One Microsoft Way Redmond WA, USA {nikolait,micmo,jhalleux,maf,sburckha}@microsoft.com
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD
CONTINUOUS MONITORING A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Mobile App Proposal 0-000-000-000. - Magazine company- [email protected]. January 12, y. Direct Contact. Email
Mobile App Proposal - Magazine company- January 12, y Direct Contact 0-000-000-000 Email [email protected] TABLE OF CONTENTS 1. Introduction 2. Project Overview & Objectives 3. About Newsboard 4. Analytics
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Insight. Security Response. Deployment Best Practices
Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Is there a fee to use U-Deposit? No, U-Deposit is a free*, convenient service provided to UNITED SA Federal Credit Union members.
U-Deposit: FAQs What is U-Deposit? Is U-Deposit secure? What are the requirements to use U-Deposit? Is there a fee to use U-Deposit? How can I sign up for U-Deposit? What are the hardware and software
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
TrustDefender Mobile Technical Brief
TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
RV-Droid: Runtime Verification and Enforcement for Android Applications
RV-Droid: Runtime Verification and Enforcement for Android Applications Yliès Falcone, Sebastian Currea, Mohamad Jaber Laboratoire d Informatique de Grenoble - VASCO Team - University of Grenoble, Université
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Cloud Computing and Advanced Relationship Analytics
Cloud Computing and Advanced Relationship Analytics Using Objectivity/DB to Discover the Relationships in your Data By Brian Clark Vice President, Product Management Objectivity, Inc. 408 992 7136 [email protected]
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK GEARING THE RESOURCE POOR MOBILE DEVICES INTO RESOURCEFULL BY USING THE MOBILE
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Uncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users
RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users Bahman Rashidi Virginia Commonwealth University [email protected] Carol Fung Virginia Commonwealth University
Kaspersky Endpoint Security 8 for Smartphone for Android OS
Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...
AdwareMedic http://www.adwaremedic.com [email protected] About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
PrinterOn Mobile Applications for ios and Android
PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Dynamic Spyware Analysis
Dynamic Spyware Analysis Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song Secure Systems Lab Technical University Vienna {pizzaman,chris,ek}@seclab.tuwien.ac.at Carnegie Mellon University
A Practical Attack to De Anonymize Social Network Users
A Practical Attack to De Anonymize Social Network Users Gilbert Wondracek () Thorsten Holz () Engin Kirda (Institute Eurecom) Christopher Kruegel (UC Santa Barbara) http://iseclab.org 1 Attack Overview
www.novell.com/documentation User Guide Novell iprint 1.1 March 2015
www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
GigaSpaces Real-Time Analytics for Big Data
GigaSpaces Real-Time Analytics for Big Data GigaSpaces makes it easy to build and deploy large-scale real-time analytics systems Rapidly increasing use of large-scale and location-aware social media and
COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
