Mobile Application Security
|
|
|
- Judith Hall
- 10 years ago
- Views:
Transcription
1 EECS Fall 2012 Mobile Application Security Himanshu Dwivedi Chris Clark David Thiel Presented by Bharath Padmanabhan
2 The Authors Himanshu Dwivedi is a co- founder of isec Partners, an informa5on security firm specializing in applica5on security. He is also a renowned industry author with six security books published. Chris Clark is a principal security consultant at isec Partners, where he writes tools, performs penetra5on tests, and serves as a Windows and Mobile expert. David Thiel is a Principal Security Consultant with isec Partners. His areas of exper5se are web applica5on penetra5on tes5ng, network protocols, fuzzing, Unix, and Mac OS X.
3 Contents Part I Mobile Pla:orms Top Issues Facing Mobile Devices Tips for Secure Mobile Applica8on Development Apple iphone Google Android Part II Mobile Services WAP and Mobile HTML Security Bluetooth Security SMS Security Mobile Geoloca8on Enterprise Security on the Mobile OS
4 Part I Mobile Platforms
5 Top Issues Facing Mobile Devices Physical Security Secure Data Storage (on Disk) Strong Authen8ca8on with Poor Keyboards Mul8ple- User Support with Security Safe Browsing Environment Secure Opera8ng Systems Applica8on Isola8on Informa8on Disclosure Virus, Worms, Trojans, Spyware, and Malware Difficult Patching/Update Process Strict Use and Enforcement of SSL Phishing Cross- Site Request Forgery (CSRF) Loca8on Privacy/Security Insecure Device Drivers Mul8factor Authen8ca8on
6 Top Issues Facing Mobile Devices Physical Security Loss of informa5on from lost or stolen devices Unauthorized usage by borrower Physical security has always meant likle- to- no security Secure Data Storage (on Disk) Sensi5ve informa5on stored locally (password files, tokens, etc.) Prevent unauthorized access while making it accessible to certain applica5ons on an as- needed basis 6
7 Top Issues Facing Mobile Devices Strong AuthenBcaBon with Poor Keywords Password or passphrase that uses a combina5on of lekers, numbers, special characters, and a space Same standard on a mobile keyboard is difficult, if not impossible MulBple- User Support with Security Unlike tradi5onal client opera5ng systems that support mul5ple users with different opera5ng environments, no such thing as logging into a mobile device as a separate user No dis5nc5on between applica5ons for business purpose vs. personal Need unique security model by applica5on to prevent data exposure 7
8 Top Issues Facing Mobile Devices Safe Browsing Environment Lack of real estate makes phishing akempts easier Inability to view the en5re URL or the URL at all Links are followed a lot more on mobile devices Secure OperaBng Systems Securing an OS is no easy task but should s5ll be undertaken by all mobile vendors Security oten correlates to data loss but can also correlate to system down5me and diminished user experience 8
9 Top Issues Facing Mobile Devices ApplicaBon IsolaBon Very common to see various types of applica5ons (corporate, gaming, social, etc) on a mobile device Ability to isolate these applica5ons and the data they require is cri5cal InformaBon Disclosure Data stored on a device (desktop, laptop, server, mobile) is worth more than the device itself, however, mobile device more likely to be lost or stolen Access from mobile device to other networks (say VPN) is another area of concern if authen5ca5on mechanisms are not strong 9
10 Top Issues Facing Mobile Devices Virus, Worms, Trojans, Spyware, and Malware Mobile devices also face threat of viruses, worms, Trojans, spyware, and malware Lessons to learn from the desktop world but also need to adjust to the mobile environment and new akack classes Difficult Patching/Update Process Patching and upda5ng not a technical challenge but several considera5ons make it a difficult problem for mobile Carriers have big problems with immediate system updates and patching due to likle response 5me for tes5ng Requires coordina5on among OS developer, carriers, and handset vendors 10
11 Top Issues Facing Mobile Devices String Use and Enforcement of SSL Older devices lacked horsepower to enforce SSL without affec5ng user experience; some s5ll allowed for backwards- compa5bility Some organiza5ons defaul5ng to clear- text protocols assuming increased complexity of sniffing on 3G network Abundance of transi5ve networks between mobile device and the end system Phishing Users more prone to clicking links on mobile without safety concerns Lack of real estate to show en5re URL or the URL itself 11
12 Top Issues Facing Mobile Devices Cross- Site Request Forgery (CSRF) Big problem for mobile HTML sites that are vulnerable Easy to get vic5ms to click on links due to previously men5oned factors Allows akacker to update a vic5m's informa5on (address, , password, etc) on a vulnerable applica5on LocaBon Privacy/Security Most mobile users have assumed their loca5on privacy was lost as soon as they started carrying a mobile device Users willingly give away their loca5on- specific informa5on through applica5ons like Google La5tude, Foursquare etc. 12
13 Top Issues Facing Mobile Devices Insecure Device Drivers Most applica5ons should not have system access to mobile device but device drivers need such access Exposure to akackers if third- party drivers provide methods to get around protec5on schemes via poten5ally insecure code MulBfactor AuthenBcaBon SoT mul5factor authen5ca5on schemes (same browser, IP range, HTTP headers) used by mobile web applica5ons very vulnerable to spoofing Typical to create a device signature using a combina5on of HTTP headers and proper5es of the device's connec5on but s5ll not good enough compared to na5ve mobile applica5ons 13
14 Tips for Secure Mobile Application Development Leverage TLS/SSL Follow Secure Programming Prac5ces Validate Input Leverage the Permissions Model Used by the OS Use the Least Privilege Model for System Access Figure out a Secure and Strong Update Process Understand the Mobile Browser s Security Strengths and Limita5ons Zero Out the Non- Threats User Secure/Intui5ve Mobile URLs Store Sensi5ve Informa5on Properly Sign the Applica5on s Code
15 Tips for Secure Mobile Application Development Leverage TLS/SSL Turn on Transport Layer Security (TLS) or Secure Sockets Layer (SSL) by default Both confiden5ality and integrity protec5ons should be enabled; many environments oten enforce confiden5ality, but do not correctly enforce integrity protec5on Follow Secure Programming PracBces Big rush (and a small budget) to get a product out the door, forcing developers to write code quickly and not make the necessary security checks and balances Leverage the abundance of security frameworks and coding guidelines available 15
16 Tips for Secure Mobile Application Development Validate Input Valida5ng input is impera5ve for both na5ve mobile applica5ons and mobile web applica5ons Mobile devices do not have host- based firewalls, IDS, or an5virus sotware, so basic sani5za5on of input is a must Leverage the Permissions Model Used by the OS Permissions model is fairly strong on the base device, however, external SD card may not be as secure Applica5on isola5on provided by systems like ios and Android should be leveraged 16
17 Tips for Secure Mobile Application Development Use the Least Privilege Model for System Access The least privilege model involves only asking for what is needed by the applica5on One should enumerate the least amount of services, permissions, files, and processes the applica5on will need and limit the applica5on to only those items The least privilege model ensures the applica5on does not affect others and is run in the safest way possible Store SensiBve InformaBon Properly Do not store sensi5ve informa5on (usernames, passwords, etc.) in clear text on the device; use na5ve encryp5on schemes instead 17
18 Tips for Secure Mobile Application Development Sign the ApplicaBon s Code Although signing the code does not make the code more secure, it allows users to know that an applica5on has followed the prac5ces required by the device s applica5on store Unsigned applica5on may have a much reduced number of privileges on the system and will be unable to be widely disturbed through the various applica5on channels of the devices Depending on whether or not the applica5on is signed, or what type of cer5ficate is used, the applica5on will be given different privileges on the OS 18
19 Tips for Secure Mobile Application Development Figure Out a Secure and Strong Update Process Much like in the desktop world, an applica5on that is not fully patched is a big problem for the applica5on, the underlying OS, and the user A secure update process needs to be figured out where an applica5on can be updated quickly, easily, and without a lot of bandwidth Understand the Mobile Browser s Security Strengths and LimitaBons Understand the limita5ons of cookies, caching pages locally to the page, the Remember Password check boxes, and cached creden5als Do not treat the mobile browser as you would treat a regular web browser on a desktop opera5ng system 19
20 Tips for Secure Mobile Application Development Zero Out the Non- Threats Although the threats to mobile devices and their applica5ons are very real, it is important to understand which ones maker to a given applica5on The best way to start this process is to enumerate the threats that are real, design mi5ga5on strategies around them, and note the others as accepted risks ("threat model") Threat model should allow applica5on developers to understand all the threats to the system and enable them to take ac5on on those that are too risky to accept 20
21 OWASP Mobile Threat Model 21
22 OWASP Mobile Threat Model 22
23 Tips for Secure Mobile Application Development Use Secure/IntuiBve Mobile URLs Some organiza5ons use third- par5es to host their mobile sites whose domain will be different from the organiza5on Many organiza5ons have mobile- op5mized sites separate from their regular websites but it is important to keep the URLs intui5ve IntuiBve m.isecpartners.com Not So IntuiBve isecpartners.mobi isecpartners.mobilevendor.com 23
24 Apple iphone Development Security Tes5ng Applica5on Format Permissions and User Controls Local Data Storage Networking Push No5fica5ons, Copy/Paste, and Other IPC
25 Development Performed with Xcode and the iphone SDK Can be run either within the emulator or on a physical device Debugging is done within Xcode via gdb Objec5ve- C code can be decompiled fairly easily using standard OS X developer tools It is not possible to prevent reverse- engineering of the code 25
26 Security Testing Threat of classic C exploits is reduced, but not eliminated, by using high- level Objec5ve- C APIs To avoid buffer overflows, avoid manual memory management and use Cocoa objects such as NSString for string manipula5on (Integer overflows s5ll possible even when using NSInteger) Double- frees, where a segment of memory is already freed from use and an akempt is made to deallocate it again, are a problem Most commercial sta5c analysis tools haven t matured to detect Objec5ve- C specific flaws, but simple free tools can be used to fine C API abuses 26
27 Application Format Applica5ons are compiled via Xcode using the GNU GCC compiler, cross- compiled for the ARM processor and local machine (emulator) Each applica5on bundle includes a unique ID, a plist of en5tlements and preferences, a code signature, any required media assets, and the executable itself All iphone applica5ons have to be distributed through the App Store which have to be approved by Apple prior to distribu5on and can be revoked any5me at Apple s discre5on All iphone applica5ons have to be signed by a valid code- signing cer5ficate; requires membership with the iphone Developer Program On jailbroken iphones, using Cydia and Installer are the two most popular ways to install unauthorized third- party sotware 27
28 Permissions and User Controls Apple uses Mandatory Access Control (MAC) as its mechanism for restric5ng the capabili5es of applica5ons The iphone OS and OS X permission system ( sandboxing ) is based on the TrustedBSD framework which allows for wri5ng policy files that describe what permissions an applica5on should have Each applica5on is installed into its own directory (GUID); they are allowed limited read access to some system areas but not allowed to read/write directories belonging to other applica5ons Both the heap and stack are non- executable by default; newer versions support ASLR (Address Space Layout Randomiza5on) Permissions gran5ng for specific func5onality (loca5on, contacts) is granted via popups to the user at the 5me of API use 28
29 Local Data Storage SQLite Storage: This is a popular way to persist applica5on data but is subject to injec5on akacks like any type of SQL database. Parameterized queries should be used to ensure third- party SQL is not accidentally executed by the applica5on. Keychain Storage: The iphone includes the Keychain mechanism from OS X (with some differences) to store creden5als and other data. The API is simpler compared to the Cocoa API and all the data is stored in a dic5onary of key/value pairs. It is to be noted that Keychain APIs only work on a physical device. Shared Keychain Storage: ios 3.0 introduced this ability allowing for separate applica5ons to share data by defining addi5onal en5tlements. The developer has to explicitly specify this when adding the akribute and also define the en5tlement. 29
30 Networking URL Loading API: Supports HTTP, HTTPS, FTP, and file resource types using the NSURLConnec5on and NSURLDownload APIs with an NSURL object as the input. It is to be noted that HTTP and HTTPS request results are cached on the device by default and all cookies stored are accessible by any applica5on that uses the URL loading system. NSStreams: Useful when using network sockets for protocols other than those handled by the URL loading system, or in places where you need more control over how connec5ons behave. Peer to Peer (P2P): ios 3.0 introduced this ability to do P2P networking between devices via Bluetooth. Opportuni5es for data thet are increased since game and non- game applica5ons use it for collabora5on and data exchange. Also, because data can poten5ally be streamed to the device by a malicious program or user, it is another untrusted input to be dealt with. 30
31 Push NotiFications, Copy/Paste, and Other IPC Push NoBficaBons: ios 3.0 introduced this ability allowing applica5ons to provide users with no5fica5ons when they are not running. The device and push service plakorm perform mutual cer5ficate authen5ca5on. No5fica5on types can include popups or upda5ng the badge. It should be noted that push no5fica5ons are not guaranteed to be delivered. UIPasteboard: Similar to OS X, this can be implemented to handle copying and pas5ng of objects within an applica5on, or to handle data to share among applica5ons. Copied and pasted data is stored in item groupings with various representa5ons. Any informa5on on shared pasteboards should be considered untrusted and poten5ally malicious and needs to be sani5zed before use. 31
32 Google Android Development Plakorm Security Architecture Security Model Permissions Securable IPC Mechanisms Applica5on Signing Memory Management Security Enhancements Files, Preferences, and Mass Storage
33 Development SDK provides free tools for building and debugging applica5ons, suppor5ng developers on Linux, Windows, and OS X SDK provides an emulator that emulates ARM- based device and also alternate virtual hardware configura5ons Debugging support is built into Android and working with a device or with the emulator is mostly interchangeable Code developed using the SDK generally runs in the Dalvik VM 33
34 Platform Security Architecture Android seeks to be the most secure and usable opera8ng system for mobile plauorms by re- purposing tradi8onal opera8ng system security controls to: Protect user data Protect system resources (including the network) Provide applica8on isola8on To achieve these objec8ves, Android provides these key security features: Robust security at the OS level through the Linux kernel Mandatory applica8on sandbox for all applica8ons Secure interprocess (IPC) communica8on Applica8on signing Applica8on- defined and user- granted permissions 34
35 Security Model Android is based on the Linux security model with some abstrac5ons unique to it and leverages Linux user accounts to silo applica5ons Android permissions are rights given to applica5ons to allow them to take pictures, use the GPS, make phone calls, and so on When installed, applica5ons are given a unique user iden5fier (UID); the UID is used to protect an applica5on s data The need for permissions minimizes the impact of malicious sotware, unless a user grants powerful rights to dubious sotware Android s run5me system tracks which permissions each applica5on has; these permissions are granted either when the OS was installed or upon installa5on of the applica5on by the user 35
36 Permissions Android uses manifest permissions to track what the user allows applica5ons to do, such as sending SMS, using the camera, etc. Prior to installa5on of any applica5on, the user is shown the different permissions the applica5on is reques5ng. Once installed, an applica5on s permissions cannot be changed. Permissions of an Installed Applica1on Permissions at Applica1on Install 36
37 Permission Protection Levels 37
38 Securable IPC Mechanisms AcBviBes are interac5ve screens used to communicate with users. Intents are used to specify an Ac5vity. Broadcasts provide a way to send messages between applica5ons. When sending a broadcast, an applica5on puts the message to be sent into an Intent. Services are background processes that toil away quietly in the background. ContentProviders provide a way to efficiently share rela5onal data between processes securely. They are based on SQL. Binder provides a highly efficient communica5on mechanism. It is commonly used to bridge Java and na5ve code running in separate processes. 38
39 Application Signing Every applica5on that is run on the Android plakorm must be signed by the developer. Applica5ons that akempt to install without being signed will rejected by either Google Play or the package installer on the Android device. The signed applica5on cer5ficate defines which user id is associated with which applica5on. Applica5on signing ensures that one applica5on cannot access any other applica5on except through well- defined IPC. Applica5ons can be signed by a third- party or self- signed. Android provides code signing using self- signed cer5ficates that developers can generate without external assistance or permission. 39
40 Memory Management Security Enhancements ProPolice to prevent stack buffer overruns safe_iop to reduce integer overflows Extensions to OpenBSD dlmalloc to prevent double free() vulnerabili8es and to prevent chunk consolida8on a\acks OpenBSD calloc to prevent integer overflows during memory alloca8on Format string vulnerability protec8ons Hardware- based No execute (NX) to prevent code execu8on on the stack and heap Linux mmap_min_addr to mi8gate null pointer dereference privilege escala8on Address Space Layout Randomiza8on (ASLR) to randomize key loca8ons in memory 40
41 Files, Preferences, and Mass Storage UNIX- style file permissions are present in Android; each applica5on runs as its own user so files created by one applica5on cannot be read or altered by another applica5on (unless user allows it) SharedPreferences is a system feature that is backed by a file with permissions like any others Android devices may support larger add- on file systems mounted on memory cards since devices typically have limited amount of memory Data stored on memory cards is unprotected and cannot be accessed by any program on the device 41
42 Contents Part I Mobile Pla:orms Top Issues Facing Mobile Devices Tips for Secure Mobile Applica8on Development Apple iphone Google Android Part II Mobile Services WAP and Mobile HTML Security Bluetooth Security SMS Security Mobile Geoloca8on Enterprise Security on the Mobile OS
43 Part II Mobile Services
44 WAP and Mobile HTML Security WAP and Mobile HTML Basics Authen5ca5on on WAP/Mobile HTML Sites Encryp5on Applica5on AKacks on Mobile HTML Sites WAP and Mobile Browser Weaknesses
45 WAP and Mobile HTML Basics WAP is a method to access the Internet from mobile devices WAP gateway acts like a proxy server transla5ng content WAP 2.0 does not require a WAP gateway WAP Architecture 45
46 Authentication on WAP/Mobile HTML Sites One of the many problems that WAP and Mobile HTML developers have with mobile devices is the keyboard. PDA- style keyboard Non- PDA- style keyboard Strong passwords (consis5ng of lekers, numbers, and special characters) difficult to type on Non- PDA- style keyboards. 46
47 Authentication on WAP/Mobile HTML Sites Mobile PIN, an alterna5ve to complex passwords, increases the user experience at the cost of lowering the security of the authen5ca5on process PIN typically consists of only 4-8 digit numbers, making it easier for brute- force akempts Crossover use of SMS and WAP/Mobile HTML applica5ons is another avenue of exposure. Ex: Sending an SMS message to a predefined number will return an account balance as long as the caller ID value is correct. Spoofing of caller ID ( trusted value ) is quite simple 47
48 Encryption SSL/TLS is a cri5cal aspect of online security to keep sensi5ve informa5on private over the Internet WAP 1.0 used TLS but not end to end due to the limited horsepower on mobile devices WTLS is similar to TLS; used for low- bandwidth data channels that cannot support full- blown TLS implementa5on WAP 1.0 and transport encryp1on 48
49 Encryption WAP 2.0 supports full end to end TLS to eliminate the WAP gap WAP gateway op5onal (can be used for op5miza5on purposes) WTLS is no longer needed WAP 2.0 and transport encryp1on 49
50 Application Attacks on Mobile HTML Sites Many tradi5onal web applica5on akacks will work on mobile browsers/devices suppor5ng WAP 2.x/Mobile HTML sites Cross- Site Scrip5ng (XSS) SQL Injec5on Cross- Site Request Forgery (CSRF) HTTP Redirects Phishing Session Fixa5on Non- SSL Login 50
51 WAP and Mobile Browser Weaknesses Known limita5ons of WAP and mobile browsers: Lack of HTTPOnly Flag Support Lack of SECURE Flag Support Handling Browser Cache WAP Limita5ons 51
52 Bluetooth Security Overview of the Technology Bluetooth Security Features Pairing Authen5ca5on Authoriza5on Confiden5ality Threats to Bluetooth Devices and Networks Bluetooth Vulnerabili5es Recommenda5ons
53 Overview of the Technology Conceived at Ericsson Mobile Communications to create a wireless keyboard system and then adapted for more generic purposes Common Uses include: Wireless keyboard, mouse, and printer connectivity Device synchronization (phone to desktop) File transfer (phone to desktop or photo printer) Gaming console integration (Nintendo Wii remotes and Sony PS3 headsets) Tethering for Internet access (using data-enabled mobile phone as a modem for Internet access from a laptop with Bluetooth providing inter-device connectivity) Hands-free and voice-activated mobile phone kits for cars 53
54 Bluetooth Security Features - Pairing Pairing, the process whereby two Bluetooth devices establish a link and agree to communicate, is cri5cal to the overall security architecture and is 5ghtly integrated with other security features During pairing, the communica5ng devices agree on and generate keys used to iden5fy and relate to other devices; these keys are also used for device authen5ca5on and communica5on encryp5on Prior to Bluetooth v2.1, pairing between devices is accomplished through the entry of a PIN with a maximum length of 128 bits. Bluetooth v2.1 introduced Secure Simple Pairing to improve security through the use of Ellip5c Curve Diffie- Hellman for key exchange and link key genera5on 54
55 Bluetooth Security Features - Authentication Authen5ca5on is the process whereby one device verifies the iden5ty of another device A tradi5onal challenge- response mechanism is used between the claimant device and the verifier device Response to challenge based on a func5on involving a random number, the claimant s Bluetooth device address, and a secret key generated during device pairing To prevent repeated akacks in a limited 5meframe, on an authen5ca5on failure the verifier will delay its next akempt to authen5cate the claimant 55
56 Bluetooth Security Features - Authorization Authoriza5on allows for decision making about resource access and connec5on configura5on based on permissions granted a given device or service Device Trust Levels: Bluetooth devices can be trusted (previously been paired and have full access) or untrusted (not previously paired and have restricted access) in rela5on to other Bluetooth devices Service Security Levels: Level 1 services require authen5ca5on and authoriza5on Level 2 services require authen5ca5on only Level 3 services have no security and are open to all devices 56
57 Bluetooth Security Features - ConFidentiality Confiden5ality is provided through the use of encryp5on Bluetooth uses E 0, a stream cipher, as the basis for encryp5on and provides three different encryp5on modes Mode 1 does not do any encryp5on; all traffic is unencrypted Mode 2 encrypts traffic between individual endpoints but broadcast traffic is unencrypted Mode 3 encrypts both broadcast and point- to- point traffic 57
58 Threats to Bluetooth Devices and Networks Bluetooth devices and networks are also subject to threats like eavesdropping, impersona5on, denial of service, and man- in- the- middle akacks Addi5onal Bluetooth threats include: Loca5on tracking Key management issues Bluejacking Implementa5on issues (Bluesnarfing, Bluebugging, Car whispering) 58
59 Bluetooth Vulnerabilities Bluetooth Versions Prior to v1.2 The unit key is reusable and becomes public when used Bluetooth Versions Prior to v2.1 Short PINs are permiked The encryp5on keystream repeats All Versions Unknown RNG strength for challenge- response Nego5able encryp5on key length (as small as one byte!) Shared master key Weak E 0 stream cipher (theore5cal known- plaintext akack) 59
60 Recommendations Use complex PINs for Bluetooth devices In sensi5ve and high- security environments, configure Bluetooth devices to limit the power used by the Bluetooth radio Limit the services and profiles available on Bluetooth devices to only those required Configure Bluetooth devices as non- discoverable except during pairing Enable mutual authen5ca5on for all Bluetooth communica5ons Configure the maximum allowable size for encryp5on keys Unpair devices that had previously paired with a device if a Bluetooth device is lost or stolen 60
61 SMS Security Overview of Short Message Service Overview of Mul5media Messaging Service Protocol AKacks Applica5on AKacks
62 Overview of Short Message Service SMS is designed for one mobile subscriber to send a short message (up to 160 characters) to another mobile subscriber SMS message between phones using the same carrier SMS message between phones on different carriers 62
63 Overview of Short Message Service A raw SMS message is known as a Protocol Data Unit (PDU) A basic SMS PDU contains several header fields as wells as message contents 63
64 Overview of Multimedia Messaging Service MMS can send various types of images, audio, and video in addi5on to text MMS is fundamentally different from SMS although they may look exactly the same from a user s perspec5ve MMS from a user standpoint Detailed MMS diagram 64
65 Protocol Attacks Abusing Legi5mate Func5onality AKacks targe5ng func5onality that is meant to be hidden from the end user. Ex: Administra5ve and provisioning communica5ons such as updates and voic no5fica5ons. AKacking Protocol Implementa5ons AKacks targe5ng vulnerabili5es in the implementa5ons of the popular SMS protocols with the intent of sending a corrupted message to a vic5m s phone resul5ng in the phone running hos5le code. 65
66 Protocol Attacks - Abusing Legitimate Functionality WAP Push AKack MMS No5fica5on BaKery- Draining AKack Silent Billing AKack OTA Sesngs AKack 66
67 Application Attacks Targets applica5ons that use SMS as a delivery mechanism Unlike protocol akacks that are mostly version agnos5c, applica5on akacks are very specific to sotware versions running on phones Applica5on vulnerabili5es tend to fall into browser, MMS client, or image categories Examples: iphone Safari vulnerability results in heap overflow ater viewing a malicious page within mobile Safari, allowing akacker to execute arbitrary code on the iphone Motorola RAZR JPG overflow vulnerability due to the way the RAZR parsed thumbprints in the JPG EXIF header, allowing arbitrary code execu5on using malicious JPG image 67
68 Mobile Geolocation Geoloca5on Methods Geoloca5on Implementa5on Android iphone Risks of Geoloca5on Services End User Service Providers Geoloca5on Best Prac5ces
69 Geolocation Methods Tower Triangula5on (Accuracy: 50m - 1,000m) Oldest widely used method of geoloca5on via cell phone Uses rela5ve power levels of radio signals between cell phone and cell tower; requires at least two cell towers Fairly inexact due to distance from cell towers and signal strength GPS (Accuracy: 5m - 15m) Uses satellite signals instead of cell phone or wireless infrastructure; recep5on may be poor indoors Can provide con5nuous tracking updates, useful for real- 5me applica5ons 69
70 Geolocation Methods (Accuracy: 10m - 200m but poten5ally erroneous) iphone was the first smartphone to use this approach, using an API from Skyhook Wireless which uses data from wireless access points to create a large wardriving database Allows for devices without GPS to get poten5ally highly accurate loca5on data Faster and more accurate than tower triangula5on Drawbacks due to dependency on wireless access points which could be moved Google s La5tude service provides a newer implementa5on of Skyhook s technology 70
71 Geolocation Implementation - Android Permission to use geoloca5on features is requested via the program manifest and is granted by the user at install 5me ACCESS_COARSE_LOCATION (for cell triangula5on or Wi- Fi) ACCESS_FINE_LOCATION (for GPS) A permissions request for only fine loca1on services A permissions request for coarse and fine loca1on services 71
72 Geolocation Implementation - iphone Requires user approval every 5me an applica5on that uses geoloca5on APIs is launched CLLoca5onAccuracyBest CLLoca5onAccuracyNearestTenMeters CLLoca5onAccuracyHundredMeters CLLoca5onAccuracyThreeKilometers The iphone loca1on permissions dialog 72
73 Risks of Geolocation Services - End User Posi5onal data stored on remote servers, when it can be 5ed to an individual, introduces a new avenue for data thet Along with other sensi5ve data, not only could this be a breach of user privacy, but also a poten5al source of informa5on in court Broadcas5ng user s loca5on voluntarily (think Foursquare) may also lead to stalking or harassment Few points to ponder: Privacy and data reten5on policies for posi5onal informa5on Third- party sharing and data transfer channels Course of ac5on for law enforcement requests 73
74 Risks of Geolocation Services - Service Providers Risk of nega5ve publicity from a data breach, legal or congressional subpoenas, and poten5al assistance to criminal acts by allowing third par5es to track individual users OTen 5mes, the stored geoloca5on data is not really necessary to provide the required func5onality Legal obliga5on to follow privacy guidelines in countries like the UK ( Data Protec5on Act ) 74
75 Geolocation Best Practices Use the least precise measurement necessary Discard data ater use Keep data anonymous Indicate when tracking is enabled Use an opt- in model Have a privacy policy Do not share geoloca5on data with other users or services Familiarize yourself with local laws 75
76 Enterprise Security on the Mobile OS Device Security Op5ons PIN Remote Wipe Secure Local Storage Encryp5on Applica5on Sandboxing Applica5on Signing Buffer Overflow Protec5on
77 Device Security Options - PIN Enabling the PIN is the first step in securing a mobile device Unmo5vated akacker could wipe and sell it instead of trying to break into the OS Data on the device (or data that phone has access to) is at 5mes worth more than the device Although a four- digit PIN only needs 10,000 akempts to brute- force it, many mobile devices have a 5me delay ater ten failed akempts On some devices like the iphone, the SIM card also has PIN protec5on 77
78 Device Security Options - Remote Wipe The ability to remote wipe data on a mobile device (especially if its a corporate one) is impera5ve Remote wipe func5onality makes the loss of such devices a lot less stressful Both iphone and Android support remote wipe func5onality 78
79 Secure Local Storage Ability to store sensi5ve informa5on locally in a secure fashion is also an impera5ve security feature for mobile devices Many applica5ons store login informa5on, such as username and password, locally on the device in clear text (without encryp5on) The iphone addresses this need via the use of Keychain which can be used to store, retrieve, and read sensi5ve informa5on, such as passwords, cer5ficates, and secrets 79
80 Encryption Full Disk Encryp5on Unlike desktop OSes, mobile OSes have likle or no solu5ons for full disk encryp5on. ios4 and Android ICS supposedly have this feature Encryp5on None of the most popular mobile OSes provide na5ve support for local Good for Enterprise supports both iphone and Android File Encryp5on Most major mobile OSes support file encryp5on 80
81 Application Sandboxing The primary goals are: ensure one applica5on is protected from another protect the underlying OS from the applica5on ensure a bad applica5on is isolated from the good ones New applica1on isola1on model Tradi1onal applica1on isola1on model 81
82 Application Signing It is a vesng process to provide users some level of assurance concerning the applica5on and to associate authorship and privileges to an applica5on It is not a measure of the security of the applica5on or its code Depending on whether or not the applica5on is signed, and what type of cer5ficate is used, different privileges are granted on the OS Most mobile OSes, including the iphone and Android, require applica5on signing; Android allows self- signed cer5ficates whereas the iphone does not It is assumed that malware authors would not be able to bypass the appropriate levels of controls by a signing authority to get a cer5ficate 82
83 Buffer OverFlow Protection Major akack class for mobile OSes wriken in C, Objec5ve- C, or C++ The iphone mi5gates buffer overflows by making the stack and heap on the OS non- executable; any akempts to do so would cause applica5on excep5on Stack- based protec5on on the iphone is performed using the NX Bit that marks certain areas of memory as non- executable The Android OS mi5gates buffer overflow akacks by leveraging the use of ProPolice, OpenBSD malloc/calloc, and the safe_iop func5on ProPolice provides stack smasher protec5on; OpenBSD s malloc/ calloc make heap- based buffer overflows more difficult; safe_iop library provides func5ons to perform safe integer opera5ons 83
84
85 OWASP Mobile Security Project Our primary focus is at the applica1on layer. While we take into considera1on the underlying mobile plaporm and carrier inherent risks when threat modeling and building controls, we are targe1ng the areas that the average developer can make a difference. Addi1onally, we focus not only on the mobile applica1ons deployed to end user devices, but also on the broader server- side infrastructure which the mobile apps communicate with. We focus heavily on the integra1on between the mobile applica1on, remote authen1ca1on services, and cloud plaporm- specific features. 85
86 Top 10 Mobile Risks 1. Insecure Data Storage 2. Weak Server Side Controls 3. Insufficient Transport Layer Protec5on 4. Client Side Injec5on 5. Poor Authoriza5on and Authen5ca5on 6. Improper Session Handling 7. Security Decisions Via Untrusted Inputs 8. Side Channel Data Leakage 9. Broken Cryptography 10. Sensi5ve Informa5on Disclosure 86
87 1. Insecure Data Storage Store ONLY what is absolutely required Never use public storage areas (like SD card) Leverage secure containers and plakorm- provided encryp5on APIs Do not grant files world- readable or world- writeable permissions 87
88 2. Weak Server Side Controls Understand the addi5onal risks mobile apps introduce into exis5ng architectures Leverage the wealth of knowledge that is already out there OWASP Web Top 10, Cloud Top 10, Web Services Top 10 Cheat sheets, development guides, ESAPI 88
89 3. InsufFicient Transport Layer Protection Ensure that all sensi5ve data leaving the device is encrypted This includes data over carrier networks, WiFi, and even NFC When security excep5ons are thrown, it s generally for a reason - - DO NOT ignore them! 89
90 4. Client Side Injection Sani5ze or escape untrusted data before rendering/execu5ng it Use prepared statements for database calls; concatena5on is s5ll bad, and always will be bad Minimize the sensi5ve na5ve capabili5es 5ed to hybrid web func5onality 90
91 5. Poor Authorization and Authentication Contextual info can enhance things, but only as part of mul5- factor implementa5on Out- of- band doesn t work when it s all the same device Never use device ID or subscriber ID as sole authen5cator 91
92 6. Improper Session Handling Don t be afraid to make users re- authen5cate every so oten Ensure that tokens can be revoked quickly in the event of a lost/ stolen device U5lize high entropy, tested token genera5on resources 92
93 7. Security Decisions Via Untrusted Inputs Check caller s permissions at input boundaries Prompt the user for addi5onal authoriza5on before allowing Where permission checks cannot be performed, ensure addi5onal steps required to launch sensi5ve ac5ons 93
94 8. Side Channel Data Leakage Never log creden5als, PII, or other sensi5ve data to system logs Remove sensi5ve data before screenshots are taken, disable keystroke logging per field, and u5lize an5- caching direc5ves for web content Debug your apps before releasing them to observe files created, wriken to, or modified in any way Carefully review any third- party libraries you introduce and the data they consume Test your applica5ons across as many plakorm versions as possible 94
95 9. Broken Cryptography Storing the key with the encrypted data negates everything Leverage bakle- tested crypto libraries instead of wri5ng your own Take advantage of what your plakorm already provides! 95
96 10. Sensitive Information Disclosure Private API keys are called that for a reason - - keep them away from the client Keep proprietary and sensi5ve business logic on the server Almost never a legi5mate reason to hardcode a password 96
97
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Please Complete Speaker Feedback Surveys. SecurityTube.net
Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net [email protected] Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones
Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Overview of SOTI. www.so%.net
Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves
Security testing the Internet-of-things
Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech [email protected] Contents State of security
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Pentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
CSA SDP Working Group
CSA SDP Working Group An Open Source Code Project for a Software Defined Perimeter to Defend Cloud Applications from DDoS CSA Conference - Berlin November 2015 DHS Problem Addressing the Changing Perimeter
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases
The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases Elba Horta Regional Sales Manager, Southern Europe SSH Communica1ons Security [email protected] ENABLE,
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Threat Model for Mobile Applications Security & Privacy www.datatheorem.com
Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
NETWORK DEVICE SECURITY AUDITING
E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001
CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services
MOBILE SECURITY As seen by FortConsult Lars Syberg Head of Security Services FortConsult A/S Tranevej 16, 2400 Copenhagen, Denmark + 45 70207527 www.fortconsult.net About FortConsult Founded in 2002,
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Alexander Polyakov CTO ERPScan
Invest in security to secure investments ERP Security. Myths, Problems, Solu6ons Alexander Polyakov CTO ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
Phone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
How To Manage A Mobile Device Management At Harvard
Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas
Defending Against Web App A0acks Using ModSecurity Jason Wood Principal Security Consultant Secure Ideas Background Info! Penetra?on Tester, Security Engineer & Systems Administrator!!!! Web environments
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
