Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications
|
|
|
- Sheena Stevenson
- 10 years ago
- Views:
Transcription
1 Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl SBA Research ggmbh Vienna, Austria (1stletterfirstname)(lastname)@sba-research.org Abstract In recent months a new generation of mobile messaging and VoIP applications for smartphones was introduced. These services offer free calls and text messages to other subscribers, providing an Internet-based alternative to the traditional communication methods managed by cellular network carriers such as SMS, MMS and voice calls. While user numbers are estimated in the millions, very little attention has so far been paid to the security measures (or lack thereof) implemented by these providers. In this paper we analyze nine popular mobile messaging and VoIP applications and evaluate their security models with a focus on authentication mechanisms. We find that a majority of the examined applications use the user s phone number as a unique token to identify accounts, which further encumbers the implementation of security barriers. Finally, experimental results show that major security flaws exist in most of the tested applications, allowing attackers to hijack accounts, spoof sender-ids or enumerate subscribers. 1 Introduction In the past few months, several new smartphone messaging and VoIP services with a novel user authentication concept were introduced. These new-generation communication applications aim at replacing traditional text messaging (SMS) and only require the user s phone number for registration. Contrary to well-known instant messaging services, no additional authentication mechanisms other than the phone number are used by these applications. In this paper we focus on the security of applications that are using this novel authentication concept. Due to this limitation, services such as Skype, Facebook Chat and Google Chat were regarded as out of scope. Note that these services have been the subject of an ample amount of past research. The common advantages of the tools we examined lie in very simple and fast setup routines combined with the possibility to incorporate existing on-device address books. Additionally these services offer communication free of charge and thus pose a low entry barrier to potential customers. However, we find that the very design of most of these messaging systems thwarts their security measures, leading to issues such as the possibility for communication without proper sender authentication. The main contribution of our paper is an evaluation of the security of mobile messaging applications with the aforementioned properties and the possibilities of abuse in realworld scenarios. Additionally, we draw attention to a number of suitable security mechanisms to prevent the misuse of these systems. The rest of the paper is organized as follows: Section 2 gives an overview of related work. Section 3 outlines the basic functionalities of the examined communications services, while Section 4 introduces our threat assessment for these applications. Section 5 documents our findings and explains how the flaws we identified might pose threats to users. We conclude in Section 6 and give a brief overview of approaches for future research. 2 Related Work In this paper we document our findings on weak user authentication in messaging applications on smartphones. User authentication is a popular field of research in information security [16, 2], especially applied to distributed systems [13] or for web services [11, 18]. A vast number of protocols has been designed to provide secure user authentication, for example based on Kerberos [15] or public key cryptography and the usage of a PKI [4]. Due to the steadily increasing pervasiveness of smartphones these platforms have sparked the interest of the security community. The security features and properties of
2 Android [9, 8, 3, 10] as well as ios [5] have been widely studied. Furthermore, smartphone application security has been evaluated in the past [6, 7]. To the best of our knowledge no evaluation of novel smartphone messaging services analyzed in this paper has been published at the time of writing. Recently, cloud storage services have attracted the interest of security researchers [12] analyzing the implications of faulty authentication in that area. There are numerous applications for Android that promise encrypted, secure communication, such as Red and TextSecure [17]. 3 Mobile Messaging Applications General Characteristics All applications analyzed in this paper have one thing in common: They use the user s phone number as the basis for identification. During the setup process, the software asks the user to enter the phone number of the device. Although Android can grant direct access to the user s phone number to applications, this mechanism is currently not in use. Apple s ios App Store guidelines on the other hand do not allow applications to access the phone number, making manual input necessary. One major, if unintentional, benefit of this approach is that even devices without a phone module (e.g. a WiFi-only tablet) can be activated using the phone number of another device. It should be noted that these messaging applications use the phone number for user identification only and do not attempt to communicate over the regular mobile phone network. The main problem with this approach is naturally that the system has to verify the user s input, seeing as a malicious user could enter someone else s phone number and therefore hijack or create an account with false credentials. All the messengers we analyzed implement measures to prevent users from impersonating others by trying to authenticate a number they do not control. Still, several of these approaches display fundamental design flaws. Section 5 analyzes the shortcomings of several messengers. WhatsApp The most popular tested application (judging by its widespread distribution among various smartphone platforms) is the WhatsApp messenger. It is a crossplatform messaging application for Android, BlackBerry, ios and Symbian. The vendor has not released any information on its user base, however, based on the Android Market sales, it can be estimated to have at least a few million users 1. Recently, the vendor reported that in one single day over one billion messages were sent over Whatsapp 2. In contrast to other comparable messengers, this piece of software does not support calls via VoIP. 1 retrieved on August 23rd, retrieved on November 2nd, Evaluation In this section we detail the methodology and the experimental setup of our evaluation. 4.1 Methodology For our evaluation, we selected nine popular messaging and VoIP applications for both Android and ios. We estimated the user base of the applications by accumulating data available from the Android Market 3 and Xyologic 4, a company providing download estimations for ios applications. Table 1 gives an overview of the applications and their features. The great majority of our selected smartphone messaging applications support Voice over Internet Protocol (VoIP) calls and text messages. Furthermore, all tested applications used the user s phone number as the unique user ID for initial authentication, with the Short Message Service (SMS) being the preferred method to verify the user s control over a given phone number. We then identified five possible attack vectors exploiting the insufficient authentication methods employed in these applications. Lastly, we systematically examined the software packages for the presence of these flaws. This section describes the five common attack vectors we identified amongst popular smartphone messaging applications. Authentication Mechanism and Account Hijacking We analyzed the initial setup mechanisms of the applications during which a phone number is linked to a device. None of the tested applications retrieve the device s phone number automatically but instead ask the user to input it manually during the setup phase. The common method to verify the entered number is sending a SMS message to the specified number containing a verification PIN that the user has to enter in the application s user interface. We analyzed the communication between phone and server during the initial setup and tested if an attacker could hijack accounts by passing another user s phone number as his/her own. Sender ID Spoofing / Message Manipulation In the second part of our evaluation, we analyzed the communication between the phone and the server during message sending and receiving. The attack scenarios for this part are a malicious user that wants to send a message with a spoofed sender ID. In contrast to the scenario outlined in the previous paragraph, the attacker may do this without hijacking the entire account. The manipulation of a message during transfer is another possible threat, however, as most tested application use en- 3 retrieved on November 2nd, retrieved on November 2nd, 2011
3 VoIP Text Messages Number Verification Uploads Address Book WhatsApp no yes SMS, active SMS yes Viber yes yes SMS and passive phone call yes ebuddy XMS no yes SMS yes Tango yes no SMS yes Voypi 1.2 yes yes SMS yes Forfone yes yes SMS yes HeyTell yes no no no EasyTalk yes yes SMS yes Wowtalk yes yes SMS yes Status Messages Platforms Estimated User Base WhatsApp yes Android, ios, BlackBerry, Symbian 23-63M Viber no Android, ios 10-15M ebuddy XMS no Android, ios 1-1.5M Tango no Android, ios 10-15M Voypi 1.2 no Android, ios M Forfone no Android, ios M HeyTell no Android, ios 5-9M EasyTalk no ios M Wowtalk yes ios 0.06M Table 1. Overview of selected smartphone messaging applications, their features, supported platforms, and estimated user base. cryption for communication with the server, such an attack would usually not be practical in real life scenarios. Unrequested SMS/phone calls Most services emit SMS messages or even phone calls throughout the phone number verification process. A malicious user could use another user s number in the setup process to generate annoying messages or phone calls on the victim s phone without revealing his identity. Another scenario in this class is eavesdropping and replaying a message. Enumeration Most applications upload the user s address book to the server and compare the entries to a list of registered users (only EasyTalk utilizes a slightly different mechanism and only transmits the number as it is dialed). The server then returns the subset of the user s contacts that are using the service. We analyzed how this mechanism could be used to enumerate users of the service, e.g. by uploading an address book containing a large amount of phone numbers. The main problem resulting from this functionality is that an attacker can derive useful information about the user s device such as the operating system, if a specific application only runs on one specific system (for instance a certain OS/version combination). This enables the attacker to perform system specific attacks. Modifying Status Messages Two out of the nine applications allow the user to set a status message that is shared with people that have this user in their address book. In this part of the evaluation, we considered two threats. The first one is the modification of a user s status message by an attacker. We analyzed the protocol for setting the status message and explore possible vulnerabilities that could result in unauthorized modification of status messages. The second threat is a privacy-related design error. Not only is it possible to determine whether the owner of a given phone number has installed the messenger application (as outlined above), but also the status message of a user is visible to people that have stored this user in their address book. Since no user confirmation is required to store a number in the address book, an attacker can very easily get access to the status messages of all subscribers to services vulnerable to this attack. In practice, this approach would likely be combined with some sort of enumeration attack. 4.2 Experimental Setup For our security evaluation we used a Samsung Nexus S running Android and an Apple i 4 running ios Applications that are available for both platforms were tested on both the Nexus S and the i. To be able to read encrypted HTTPS traffic from and to the tested applications, we set up a SSL proxy that acted as a man-in-themiddle and intercepted requests to HTTPS servers. We further used SSLsniff [14] by Moxie Marlinspike to read SSL-
4 protected traffic that is not sent over HTTPS (e.g. XMPP). Figure 1 explains our approach for the experimental setup. The SSL proxy was used to analyze HTTPS connections and allowed us to read as well as modify HTTPS traffic on the fly. Other protocols were observed with SSLsniff. 1. (HTTPS): number 2. (SMS): Code 3. (HTTPS): Code Figure 2. Presumed authentication process of WhatsApp SSL-Interception Figure 1. Experimental setup for intercepting SSL. 5 Results In this section we present the results of our security evaluation of the application discussed in Section 3 with respect to the different attacks outlined in section Overview Table 2 gives a compact overview of the vulnerabilities found in the tested applications. It is notable that almost all applications were vulnerable to SMS flooding and enumeration attacks, but only very few to sender spoofing or message manipulation. 5.2 Authentication Mechanism and Account Hijacking the phone, where the app then checks if the PIN entered by the user matches the previously generated PIN. An attacker could exploit this mechanism to hijack any WhatsApp account. This can be done by typing the victim s phone number during the verification phase and then intercepting the communication between the phone and the server to eavesdrop the PIN. This communication is SSL-protected; however, the attacker has to intercept only the connection between his own phone and the WhatsApp server. To exploit this vulnerability, it is possible set up a SSL proxy and install the proxy s certificates as described in Section 4 on the phone in order to get access to the encrypted communication transparent to the application. Once the attacker has entered the PIN into his phone, the victim s WhatsApp account is linked to the attacker s phone. This enables the attacker to send and retrieve messages from the victim s account. This process also unlinks the victim s device, causing it to not receive messages from WhatsApp anymore. Code In this section we describe successful attacks against the authentication mechanisms of the tested applications. The general idea is that an attacker tries to hijack accounts to be able to spoof the sender ID and receive messages targeted to a victim. In essence, the attacker aims at linking his mobile device to the phone number of the victim. Attacker 1. (HTTPS): Code + Number Proxy WhatsApp To prevent malicious users to impersonate somebody else using the victim s number, a verification SMS containing a 3-digit PIN is sent to the phone. The user then has to copy that code into the WhatsApp application s GUI. This process binds a WhatsApp user account (represented by the phone number) to a physical device. Figure 2 shows the presumed authentication process of WhatsApp. We discovered that the phone number verification process of WhatsApp is fatally broken. The PIN for the verification SMS message is generated on the phone and then sent to the server via a HTTPS connection. The server then initiates the SMS message via a SMS proxy to Target 2. (SMS): Code Figure 3. MitM-Attack against WhatsApp authentication Figure 3 shows a possible attack on the authentication process of WhatsApp. A man-in-the-middle attack on the communication between the phone and the client makes it
5 Account Hijacking Spoofing / Manipulation Unrequested SMS Enumeration Other Vulnerabilities WhatsApp yes no yes yes yes Viber no no yes yes ebuddy XMS no no yes yes Tango yes no yes yes Voypi yes yes yes yes yes Forfone no yes yes yes HeyTell yes no no limited EasyTalk yes no yes yes WowTalk yes no yes yes yes Table 2. Overview on attacks. possible to eavesdrop the secret SMS verification code before it was even delivered to the spoofed phone number. Tango and Voypi The applications Tango and Voypi share a very similar approach for device registration. Like WhatsApp, both applications ask the user to enter the device s phone number. If the number is not registered for the service yet, no verification is done. Only if the number is already known to the system, a verification process via SMS (similar to WhatsApp) is performed. While this registration schema is not vulnerable to account hijacking, an attacker can impersonate users that are not yet registered for that service. As long as a number is not registered for Tango or Voypi, an attacker can use it without SMS verification. HeyTell HeyTell does not have any kind of verification. During the setup process the user has to select his or her own cellphone number from the address book (or create a new entry if it does not exist). The device is then linked to the chosen number without verification. WowTalk WowTalk s registration mechanism is based on SMS-verification. The user has to enter his phone number into the application which transmits it to the server. The server generates a random verification code and sends it back to the phone via SMS. The problem, however, is that the server also sends the verification code via HTTPS to the phone so that it can compare the user s input to the correct code. We used the SSL proxy to intercept the server s reply and so retrieve the verification code. An attacker can use this technique to hijack any WowTalk account. Figure 4 explains our attack against WowTalk s client authentication. EasyTalk EasyTalk uses SMS for phone number verification. After a device s registration request, the server generates a verification code that is sent to the device via SMS. After receiving the SMS the user has to enter the code into the application that forwards it to the server for verification. The server then replies to the device with either OK if the Attacker 1. (HTTPS): Request 2b. (HTTPS): PIN Target 2a. (SMS): PIN Figure 4. MitM-attack against WowTalk application device sent the correct code or ERROR if the user entered an incorrect code into the application. We were able to successfully authenticate a client by modifying this message from ERROR to OK. The server does not detect this message manipulation and keeps the device authenticated. 1. (HTTPS): Registration Request 2. (SMS): PIN 3. (HTTPS): PIN 4. (HTTPS): OK/ERROR Figure 5. Device authentication in EasyTalk. Figure 5 shows the authentication mechanism of EasyTalk. Viber Compared to the other introduced applications, Viber s authentication mechanism is well designed and properly implemented. The application asks the user for the phone number and sends an authentication request to the server. The server generates a verification code and sends
6 it via SMS message to the user s phone. Alternatively, the user can request a phone call from Viber. In that case, a speech synthesizer voice speaks the code on the phone call. The user has to the enter the received code in the Viber application that forwards it to the server, which in turn checks the input. At no time does the server trust the client (i.e. the application on the user s phone) and no sensitive authentication data is transmitted between phone and server. Figure 6 explains the authentication mechanism of Viber. Forfone and ebuddy XMS The authentication mechanisms of Forfone and ebuddy XMS are similar to Viber s and thus not susceptible to attacks that are based on intercepting the communication between the device and the server. Conclusion We do not propose our own authentication schema, as some of the tested applications already have secure protocols. While a secure implementation seems trivial, our evaluation showed that the majority of the tested applications are susceptible to even basic attacks. Forfone In Forfone s messaging protocol an additional identifier of the sender is required for sending messages. In Android the IMSI of the phone and in ios the UDID (Unique Device Identifier) are used for sender authentication. While this additional parameter raises the difficulty of sender ID spoofing, it cannot be considered as a secure authentication mechanism as these two identifiers can be accessed by any third party application on the phone. Table 3 summarizes the layout of the messaging protocols used by Voypi and Forfone. Voypi Forfone HTTP-Method GET POST sender phone number sender phone number receiver phone number receiver phone number Parameters receiver country code message message timestamp sender UDID Table 3. Messaging protocols of Voypi and Forfone. 5.4 Unrequested SMS 1. (HTTPS): Registration Request 2. (SMS): Code 3. (HTTPS): Code 4. (HTTPS): Ok Figure 6. Authentication in Viber. When taking a look at the authentication mechanisms, several applications use an SMS sent to the (assumed) requesting handset in order to verify the validity of the request and to thwart account hijacking (see Section 5.2). However, several implementations of this mechanism can be misused in order to send these verification-messages to the arbitrary users. In one application (WhatsApp) we were even able to modify the messages sent, thus being able to communicate via SMS worldwide free of charge. 5.3 Sender ID Spoofing This section introduces the results of our evaluation of messaging protocols in the tested applications. We analyzed the protocols and attempted to send messages with spoofed sender IDs without hijacking the entire account. Most of the tested applications use the Extensible Messaging and Presence Protocol (XMPP) [19] for messaging and can therefore rely on the security features present in the XMPP server that prevent sender ID spoofing. However, Voypi and Forefone have their own implementations for messaging that are based on HTTP(S) requests. Voypi The unencrypted HTTP request that is used by Voypi to generate messages has four GET parameters: both the sender s and the receiver s phone number, the message, and a time stamp. There is no authentication required to send a message, therefore, an attacker can spoof the sender ID. General Approach The general approach consists of spamming an arbitrary user with text messages containing validation requests from a messaging service. Since we are able to do this in an automated fashion, this can be frustrating to a victim constantly receiving authorization requests. Unfortunately for the attacker (and fortunately for potential victims) all examined applications had some kind of timeout that thwarted real mass spamming. Still, an attacker is able to send messages at a regular interval. The adversary could also target certain numbers used for emergencies such as those used by system administrators in high-availability data centers, potentially causing the victim to switch off her device. The idea behind the attack can be seen in Figure 7 This approach works for the following messengers: WhatsApp, Viber, Tango, ebuddy XMS, WowTalk, Voypi, Forfone and easytalk. However, no application other than WhatsApp allow for the injection of content into the verification SMS, thus making it rather useless for actual spamming (as used for marketing purposes).
7 Attacker 1. (HTTPS): Request Registration 2. (SMS): Request Figure 7. General approach. Victim Viber The messaging application Viber allows for an even more annoying attack. In case the SMS message for authentication was not answered by the target, the attacker can choose to set up an authentication request using a phone call (Figure 8 shows the relevant parts of the authentication mechanism in Viber). Attacker 1. (HTTPS): Request Registration 3. (HTTPS): Request Call 2. (SMS): Request 4. (Call): 2 nd Request Figure 8. Sending SMS and requesting phone calls with Viber. Victim WhatsApp Finally, WhatsApp offers an intriguing feature (or rather design error) that can be (mis-)used for sending free text messages worldwide. When looking at the authentication mechanism, we discussed that the authentication code is chosen by the handset that is requesting authentication and the WhatsApp-server simply echoes it back to the handset by a SMS. This authentication code consists of the string WhatsApp code followed by a PIN generated by the phone. In our analysis, we were able to intercept and modify the transmission of the PIN from the phone to the server. The modified SMS was even delivered when the PIN was replaced by any alphanumerical string, allowing an attacker to send SMS messages with nearly arbitrary content to the target handset. These techniques can either be used for free communication, or for sending spam. In fact, the verification messages can be sent by requesting the URL smsproxy.php?to=\<receiver\> &auth=\<text message\>. Figure 9 details the relevant parts of the authentication protocol that are abused in this attack. Sender 1. (HTTPS): Request Registration + Message WhatsApp - 2. (SMS): Request + Message Figure 9. Free SMS with WhatsApp Recipient 5.5 Enumeration Another security-relevant aspect of this type of messaging applications is their ability to automatically import the user s contacts. All tested applications except HeyTell allow the user to upload the entire address book to the system s server and compare the contained phone numbers to already registered phone numbers stored on the server. The server returns a subset of the user s contact list containing only phone numbers that are registered. A possible threat resulting from a user account enumeration is the identification of active phone numbers. Furthermore, an attacker could try to identify the operating system of the user, based on the applications installed on the phone and their availability for a certain operating system. This enables an attacker to target a system with OS-specific exploits. We tested the feasibility of such an enumeration attack with WhatsApp. To this end, we selected the US area code 619, which covers the southern half of the city of San Diego, CA and enumerated the entire number range from to A similar approach for Facebook is described by Balduzzi et al. [1]. In their paper, the authors tested the validity of mail addresses by uploading them to the friendfinder feature of Facebook. Based on the return value of Facebook, they were able to determine the status of a mail address. In our evaluation, we split the entire number range of the San Diego area code 619 into chunks of 5000 phone numbers each and simulated a standard address book upload as performed by WhatsApp during device registration. While we noticed some slowdowns in server response time during our evaluation, the WhatsApp server did not prevent us from uploading ten million phone numbers and returned valid phone numbers that are using the WhatsApp application as well as their status messages. The entire process finished in less than 2.5 hours. Figure 10 shows the distribution of phone numbers that are linked to a WhatsApp account over the entire number range. As the figure indicates, active phone numbers of the area code 619 start at We believe that the mobile number range starts above this value, but have not independently confirmed that. A simple countermeasure would be the introduction of a rate limit. Clearly, no regular user would upload ten million phone numbers and such an attempt could be easily detected and blocked by the server. HeyTell HeyTell does not support upload of a whole address book for enumeration, but enumeration can be done number by number by requesting to send a voice message for every single number in the address book. This, however, is restricted by a privacy setting that allows users to
8 Number of Users Number Ranges Figure 10. Distribution of phone numbers in area code 619 that are registered with Whats- App. limit their visibility. 5.6 Other Vulnerabilities WhatsApp An additional feature of WhatsApp is the possibility to set a status message, similar to instant messaging clients like Skype, that can be read by the user s contacts. Changing this status message does not require any authentication. In fact, everyone can change anyone else s status message by sending an HTTPS request to cc=<country code>&me=<phone number> &s=<status message>. WowTalk Like WhatsApp, WowTalk offers the feature of setting a status message. A user can change the status message for an arbitrary user by issuing a POST-request to containing action=user_status_update&username=<user id> &status=<new Status> Voypi We were able to identify two other vulnerabilities in Voypi. It is possible to request Voypi users in the address book of other users. To this end, a simple HTTP request with the phone number of the victim is sent to the server: phone=<phone number>&version=1.2 No further authentication is required to perform this query. The server responds with the subset of Voypi users from the victim s address book containing names and phone numbers. The second vulnerability allows an attacker to request messages of other users without authentication. The Voypi client has to be running in order to be able to receive messages. When active, Voypi pulls new messages in an interval of seven seconds from the server: dbname=<phone number>8&version=1.2 As long as the client has not pulled messages, an attacker can do so and thus steal another user s messages. The term stealing fits this scenario, because the victim is not able to retrieve the messages from the server once the attacker has done so. 6 Conclusion In this paper, we assessed nine mobile messaging and VoIP applications for smartphones. Our evaluation showed that many applications have broken authentication mechanisms and thus are vulnerable to account hijacking attacks. Most applications also suffer from other vulnerabilities such as account enumeration. We practically demonstrated an attacker s capability to enumerate any number of active WhatsApp accounts with a given area code (US area code 619 in our example, which corresponds to Southern San Diego, CA). All identified flaws stem from well-known software design and implementation errors. Although these vulnerabilities may not endanger human lives, they might have a severe impact on the privacy of millions of users. Future work might include security assessments of upcoming solutions slated for mass adoption such as Apple s imessage. Furthermore, research towards an authentication scheme suitable as a best practice template for newly developed applications would be a welcome addition. 7 Acknowledgements This work has been supported by the Austrian Research Promotion Agency under grant (Kiras) and the Austrian COMET Program (FFG). References [1] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings, volume 6307, page 422. Springer-Verlag New York Inc, [2] M. Bishop. Computer Security: Art and Science. Addison- Wesley, [3] L. Davi, A. Dmitrienko, A. Sadeghi, and M. Winandy. Privilege escalation attacks on android. Information Security, pages , [4] W. Diffie and M. Hellman. New directions in cryptography. Information Theory, IEEE Transactions on, 22(6): , [5] M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting privacy leaks in ios applications. In Network and Distributed System Security Symposium (NDSS), 2011.
9 [6] W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1 6. USENIX Association, [7] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proc. of the 20th USENIX Security Symposium, [8] W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, pages ACM, [9] W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. Security & Privacy, IEEE, 7(1):50 57, [10] A. Felt, H. Wang, A. Moshchuk, S. Hanna, E. Chin, K. Greenwood, D. Wagner, D. Song, M. Finifter, J. Weinberger, et al. Permission re-delegation: Attacks and defenses. In 20th Usenix Security Symposium, San Fansisco, CA, [11] K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and Don ts of Client Authentication on the Web. In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, pages USENIX Association, [12] Intrepidus Group. Intrepidus group, [Online; retrieved Aug 21st, 2011], http: //intrepidusgroup.com/insight/2011/08/ dropbox-for-android-vulnerability-breakdown/. [13] B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems (TOCS), 10(4): , [14] M. Marlinspike. Website of sslsniff tool, [Online; retrieved Jun 21st, 2011], Online at thoughtcrime.org/software/sslsniff. [15] B. Neuman and T. Ts o. Kerberos: An authentication service for computer networks. Communications Magazine, IEEE, 32(9):33 38, [16] W. Stallings. Cryptography and network security: principles and practice. Prentice Hall Press, [17] Whisper Systems. Whisper systems, [Online; retrieved Aug 21st, 2011], com/. [18] A. Whitten and J. Tygar. Why Johnny can t encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages , [19] XMPP Foundation. XMPP Standard, [Online; retrieved Jun 21st, 2011],
Re-evaluating Smartphone Messaging Application Security
Re-evaluating Smartphone Messaging Application Security Robin Müller University of Technology Vienna, Austria [email protected] Abstract During the last two years mobile messaging and VoIP applications for
Big Data & Security. Edgar Weippl SBA Research
Big Data & Security Edgar Weippl SBA Research Security Challenges Confidentiality Cloud storage (e.g. Dropbox) Authentication (e.g. WhatsApp) Open data vs. unintended data leaks Availability Dependability
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015
Lynn Margaret Batten IT Security Research Services & Deakin University, Melbourne, Australia June 2015 Smart devices versus PCs WebView versus Web 2.0 Tracking Certificates Mallory Countermeasures. On
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Threema security assessment
Threema security assessment Research project for Security of Systems and Networks Master System and Network Engineering Hristo Dimitrov, Jan Laan, Guido Pineda December 22, 2013 1 Abstract The research
EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.
EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Sectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Secure Data Transmission Technique for iphone using Quick Response (QR) Code
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 53-62 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions...
Page 1 Table of Contents Introduction... 2 Configuration & Spam Detection... 2 WinWare Webmail... 3 Email Accounts... 3 Email Account Notes... 4 Definitions... 5 Sender Policy Framework (SPF)... 5 Email
UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny
132 3089 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny In the Matter of DOCKET
Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study
The Internet of Things: Security Research Study Introduction As the Internet of Things (IoT) continues to gain traction and more connected devices come to market, security becomes a major concern. Businesses
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
A Practical Attack to De Anonymize Social Network Users
A Practical Attack to De Anonymize Social Network Users Gilbert Wondracek () Thorsten Holz () Engin Kirda (Institute Eurecom) Christopher Kruegel (UC Santa Barbara) http://iseclab.org 1 Attack Overview
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
About Sectra Communications
Panthon About Sectra Communications We provide secure communication solutions for European government authorities, defence departments and other critical functions of society. We have a solid core expertise
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder Skycure @AdiSharabani
ios Security The Never-Ending Story of Malicious Profiles SESSION ID: BR-R02 Adi Sharabani CEO & Co-Founder Skycure @AdiSharabani Yair Amit CTO & Co-Founder Skycure @YairAmit About the Presenters Yair
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
CNT4406/5412 Network Security Introduction
CNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 35 Introduction What is Security? Protecting information
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT Namzak Labs White Paper, 2002-02 Version 1 September 30, 2002 Overview As deployment of computer applications over the Internet becomes more prevalent, companies
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga
Riga, Latvia Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga What We Do? Data Security Solutions business card Endpoints
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS By Suhas Desai CONTENTS Executive Summary The Need for Mobile Application Security 3 USSD-based Mobile Payment Application
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Enumerating and Breaking VoIP
Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware
