Android Security Evaluation Framework



Similar documents
Introducing A S E F - Android Security Evaluation Framework

Running a Program on an AVD

Allow Installation from Unknown Sources

M100 System File Manager Help

Mobile Application Security and Penetration Testing Syllabus

The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.

Hacking your Droid ADITYA GUPTA

How To Develop Android On Your Computer Or Tablet Or Phone

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Android Programming and Security

How to Install Applications (APK Files) on Your Android Phone

International Journal of Advance Research in Computer Science and Management Studies

AppUse - Android Pentest Platform Unified

Hello World. by Elliot Khazon

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

Beginners Guide to Android Reverse Engineering

Pentesting Android Apps. Sneha Rajguru

What else can you do with Android? Inside Android. Chris Simmonds. Embedded Linux Conference Europe Copyright 2010, 2net Limited.

Introduction to Android. CSG250 Wireless Networks Fall, 2008

Технологии Java. Android: Введение. Кузнецов Андрей Николаевич. Санкт-Петербургский Государственный Политехнический Университет

The OWASP Foundation

Fahim Uddin 1. Java SDK

Introduction to Android Development. Jeff Avery CS349, Mar 2013

Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department. Mobile Computing ECOM Eng. Wafaa Audah.

How To Run A Hello World On Android (Jdk) On A Microsoft Ds.Io (Windows) Or Android Or Android On A Pc Or Android 4 (

Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release

Configuring Security for FTP Traffic

Android Setup Phase 2

Frequently Asked Questions Enterprise Mobile Manager

l What is Android? l Getting Started l The Emulator l Hello World l ADB l Text to Speech l Other APIs (camera, bitmap, etc)

Android Development Setup [Revision Date: 02/16/11]

CS378 -Mobile Computing. Android Overview and Android Development Environment

XenMobile Logs Collection Guide

Android Development. Marc Mc Loughlin

Silk Test Testing Mobile Web Applications

Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty

Android Tutorial. Larry Walters OOSE Fall 2011

Getting Started with Android Development

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

ADT Plugin for Eclipse

Introduction to Android

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Junos Pulse for Google Android

Android Application Repackaging

Developing for MSI Android Devices

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Malware Analysis for Android Operating

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App

Setting Up Your Android Development Environment. For Mac OS X (10.6.8) v1.0. By GoNorthWest. 3 April 2012

Board also Supports MicroBridge

Introduction to Android

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone

Android Programming: Installation, Setup, and Getting Started

Lab 4 In class Hands-on Android Debugging Tutorial

Android Environment SDK

Mercury User Guide v1.1

Android Geek Night. Application framework

WA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

MOBILE APPS. QA Testing for mobile applications

Pentesting Android Mobile Application

Norton Mobile Privacy Notice

Popular Android Exploits

Pentesting Mobile Applications

Silk Test Testing Mobile Applications

How To Use Titanium Studio

Introduction to Android Android Architecture Software Development Purpose of the project Location Based Service (LBS) Android. Location class Google

01. Introduction of Android

NAS 242 Using AiMaster on Your Mobile Devices

Android Development. 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系

Chapter 12: Finale! Publishing Your Android App

Developing NFC Applications on the Android Platform. The Definitive Resource

Debugging Android App

Mobile Malware and Spyware: Working Through the Bugs. Detective Cindy Murphy

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide

Sophos Endpoint Security and Control Help

the cross platform mobile apps dream Click to edit Master title style Click to edit Master text styles Third level Fourth level» Fifth level

ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)

Wiley Publishing, Inc.

Title: Appium Automation for Mac OS X. Created By: Prithivirajan M. Abstract. Introduction

How To Create A Bada App On Android (Mainfest) On Android And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black

Intel Integrated Native Developer Experience (INDE): IDE Integration for Android*

Bypassing SSL Pinning on Android via Reverse Engineering

Super Manager User Manual. English v /06/15 Copyright by GPC

McAfee Network Security Platform 8.2

ANDROID DEVELOPER TOOLS TRAINING GTC Sébastien Dominé, NVIDIA

Example Connection between USB Host and Android

Developing with Android Studio

Introduction to Android

Qualcomm IR-I 2 C Bridge Demo

Software development. Development requirements. Java. Android SDK. Eclipse IDE (optional)

CTERA Agent for Mac OS-X

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Analysis of advanced issues in mobile security in android operating system

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Transcription:

INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel

$ whoami_

Agenda Manual Research Automation - A S E F Let s solve problems Conclusion

Android OS Open Source

Security Evaluation of Android Apps

Developer Android APP Store Developer Attacker Developer Attacker User

Developer Android APP Store Developer Attacker Developer Attacker Bouncer?

Developer Android APP Store Developer Attacker Attacker Developer Bouncer?

Developer Attacker A A A? User

Permissions

Manual Research

Behavioral Analysis of Apps

Utilities for Behavioral Analysis Android SDK - Emulator (Android Virtual Device - AVD) - Android Debug Bridge - adb - Android Asset Packaging Tool - aapt Wireshark dex2jar IDE - eclipse

Limitations of Manual Research

Introducing... A S E F

A S E F as a Black Box Malware Aggressive Adware A S E F Bandwidth Vulnerabilities

A S E F Passive Active Interpret Initialization Launch Parsing Normalization Test Cycle Analyzing Organization Results

i/p A S E F Phase 1: Passive Initialization Mode Configurator adb refresh Device Detect (virtual/physical) Default Virtual Device = Google Safe Browsing API = Host IP = interface = Session cleanup Enable USB debugging Creates Virtual Device

Location of an APP Location of APPs A S E F Phase 1: Passive Normalization Mode Array of.apk path Extractor Extracted APPs

A S E F Phase 1: Passive Organization Mode Converter Test Result Archive %HAPK->{$apk} = ( { pkgnm => $PKGNM, launchact => $LAUNCHACT, vercode => $VERCODE, vername => $VERNAME, applable => $APPLABLE, adbstart => "", adbstop => ""}, ); TEST_05_11_12-19:53:56 TEST_05_11_12-20:20:19 TEST_05_13_12-11:38:28 TEST_NIGHTLY_SCAN2 1.apk 2.apk 3.apk adb_log.txt network_traffic.txt adb_log.txt network_traffic.txt adb_log.txt network_traffic.txt

A S E F Phase II : Active Launch Mode Virtual Not Running Boot Boot check Display unlock Device Launcher Running

start - adb log start - tcpdump start-timestamp Extensive mode kernel log memory dump services running Tm Tm Tm Installation mode Launch mode Activity mode Uninstallation mode kernel log memory dump services running kernel log memory dump services running kernel log memory dump services running stop - adb logcat stop - tcpdump stop-timestamp A S E F Phase II : Active Test Cycle

A S E F Phase III : Interpret Parsing Mode Analyzing Mode Results Network Activity Traffic Analyzer URLs/IPs Data tx / BandWidth Google s Safe Browsing API Access rate of URL/IP malware aggressive adware Data usage Bandwidth Vulnerability Detector Associated Permissions Decompilation / APIs used Signatures %HVULN %HAPK Unique permissions of Apps Reconstructing source code Unique APIs Vulnerabilities Permission mapping API mapping apk unzip dex2jar jar2class class2jad Source Code Black listing Found/Add App to the blacklist Black listed

A S E F Demo

Statistics & Results

Apps leaking private information

6 Apps - Leaking private data Safe Apps- 74 Total Apps = 80

phone number IMIE number

Bandwidth Usage

bytes Data usage - 3 min Test Cycle

Aggressive Adware

(No of Servers accessed) / App 3 min Test Cycle

(Access-rate) / App 3 min Test Cycle Threshold

Ad Requests @ 1.333 req/sec Aggressive Adware

Permission mapping

mount/unmount filesystem Send SMS Write Contacts Internet Read Contacts Vibrate Permission distribution - 1000 game apps

Vulnerability Scanning

No of total Apps No of Vulnerable Apps 80 75 60 40 20 0 No of Apps Non-updated Android Apps

No of total Apps No of Vulnerable Apps 80 75 60 40 20 Adobe Flash Player Mozilla Firefox 12 0 No of Apps A S E F Scan - Before updates

No of total Apps No of Vulnerable Apps 80 75 60 40 20 0 No of Apps

No of total Apps No of Vulnerable Apps 80 75 60 40 20 0 No of Apps A S E F Scan - After updates 6

Extending the Framework

start - cmd line tool start-timestamp start - adb log start - tcpdump Installation mode Command line tools Launch mode Activity mode Uninstallation mode stop - adb logcat stop - tcpdump stop - cmd line tool stop-timestamp

Extending the Framework

Let s solve problems...

A S E F to scan an APP STORE Protect & Promote

A S E F in Large Organizations

Android APP THE NIGHT PHOENIX

NIGHT PHOENIX & A S E F Package Manager NIGHT PHOENIX Extractor of A S E F @ of.apk path apkzip A S E F Server unzip ANDROID

NIGHT PHOENIX?? Alarm Manager

Who watches THE WATCHMEN

THE NIGHT PHOENIX Internet Write external storage

THE DARK PHOENIX

It is just the beginning...

Next Generation of A S E F Scalability - Load balancer module Automated/Custom signature generation Distinguishing updates - Security Fixes UI reporting with correlated results and statistics A S E F in cloud Offline scanning - Crawler module

Conclusion?

Thank You Twitter : @parth_84 email : pdpatel@qualys.com http://code.google.com/p/asef/ https://community.qualys.com/blogs/securitylabs/2012/07/25/ android-security-evaluation-framework--a-s-e-f A S E F