Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC

Similar documents
Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014

Securely Managing Cryptographic Keys used within a Cloud Environment

Mobile Deployment Guide For Apple ios

Cloud Services MDM. Windows 8 User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

Integrating With incontact dbprovider & Screen Pops

iphone Mobile Application Guide Version 2.2.2

Addressing Mobile Device Security and Management Requirements in the Enterprise

WatchDox Server Administrator's Guide

Data Protection Policy & Procedure

RSA SecurID Software Token Security Best Practices Guide. Version 3

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

MaaS360 for Mobile Devices

Ensuring end-to-end protection of video integrity

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice.

Cloud Services Frequently Asked Questions FAQ

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

CareLink Connectivity Options Introduction and Comparison Updated June 2013

1)What hardware is available for installing/configuring MOSS 2010?

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, Infoblox NIOS Page 1 of 8

Attunity RepliWeb SSL Guide

Treasury Gateway Getting Started Guide

NEC CLOUD STORAGE. User Guide. Version: R03.1

Configuring SSL and TLS Decryption in ngeniusone

EA-POL-015 Enterprise Architecture - Encryption Policy

Deployment Overview (Installation):

FO and OTHER FOES - A Guide to Cmmerce

Restricted Document. Pulsant Technical Specification

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Personal Data Security Breach Management Policy

Ten Steps for an Easy Install of the eg Enterprise Suite

Serv-U Distributed Architecture Guide

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform

Using PayPal Website Payments Pro UK with ProductCart

Tips & Tricks. Table of Contents. Browser Update - WebEx Plugin. Updated Global Access Numbers

Telelink 6. Installation Manual

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

GUIDANCE FOR BUSINESS ASSOCIATES

Magenta HR in partnership with breath ehr

VCU Payment Card Policy

Getting started with Android

CSC IT practix Recommendations

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

2. When logging is used, which severity level indicates that a device is unusable?

Serv-U Distributed Architecture Guide

Instant Chime for IBM Sametime Quick Start Guide

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

RSA Authentication Manager 5.2 and 6.1 Security Best Practices Guide. Version5

Junos Pulse Instructions for Windows and Mac OS X

In addition to assisting with the disaster planning process, it is hoped this document will also::

Aladdin HASP SRM Key Problem Resolution

For students to participate in BYOD please follow these two steps

Bitrix Intranet. Product Requirements

Valley Transcription Service I-Phone/I-Pod App User s Guide

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Configuring and Monitoring Network Elements

Information Services Hosting Arrangements

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6

BackupAssist SQL Add-on

Strategies for Embracing Consumerization

Connecting to

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Mobile Workforce. Improving Productivity, Improving Profitability

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Using McAllister Payment Solutions and Updating to AVImark version

Fermilab Time & Labor Desktop Computer Requirements

HIPAA HITECH ACT Compliance, Review and Training Services

Click Studios. Passwordstate. RSA SecurID Configuration

BASIC TECHNICAL FEATURE DESCRIPTION

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption

Cloud Services MDM. Device Management Admin Guide

Sony Xperia Configurator User Instructions

Transcription:

Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC

Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device Management

Mbile Device Encryptin Systems 1. Different appraches t encrypt assets File encryptin vs file system encryptin Key derivatin mechanisms 2. Different cnfiguratin strategies Develper cnfiguratin End user r MDM cnfiguratin 3. Different strategies applied by app develpers Rely n platfrm security functins Develpment f prprietary slutins

Key Derivatin Mdule user input secure element KDF Encryptin Mdule Carse grained encryptin Fine grained encryptin file system keystre

Assumptins and attack scenaris Assumptins 1. Cryptgraphic algrithms are crrectly implemented 2. Stlen device is nt jailbreaked/rted yet 3. Attacker steals with gal t retrieve data, and is security expert Attack scenaris 1. Attacks n the encryptin system 2. Attacks n the key derivatin mechanism 3. Attacks n unfeasible cnfiguratin r weak develpment Key Derivatin Mdule user input secure element KDF Carse grained encryptin Encryptin Mdule Fine grained encryptin file system keystre

The Andrid encryptin system Key Derivatin Mdule user input KDF Encryptin Mdule Carse grained encryptin file system keystre

The Andrid encryptin system Encryptin system file system encryptin based n dm-crypt in Linux kernel keychain encrypted with AES key sme vendrs have extended Andrid functinality t supprt encryptin f external strage media Key derivatin PIN/passcde cmbined with salt PBKDF2 (i.e. repeating SHA1 many times) 128 bit AES key used t decrypt master key Offline attacks are pssible!!!

The Andrid encryptin system Cnfiguratin ptins and develper decisins User (BYOD) r administratr (MDM) file system encryptin is nt enabled by default Length f passwrd r PIN impact n security MDM can enfrce minimum passwrd lenghts Applicatin develpers Needs t decide where t stre cnfidential data May nt assume that users cnfigure device well

The ios encryptin system Key Derivatin Mdule secure element KDF Key Derivatin Mdule user input secure element KDF Encryptin Mdule Carse grained encryptin Encryptin Mdule Fine grained encryptin file system keystre file system keystre

The ios encryptin system ios Hardware Security Features Every ios device has AES256 crypt engine in DMA path between flash strage and RAM UID en GID are 256 bit AES keys fused in applicatin prcessr N direct access by SW r firmware Keys cannt be tampered All ther keys are generated by RNG based n Yarrw

The ios encryptin system Encryptin system File system encryptin system (since ios 3.x) File system encryptin with EMF key EMF key is encrypted by UID that is stred in secure element Offline attacks are very hard!!! Decryptin pssible by jailbreaking/rting device!!! Data Prtectin API (since ios 4) Encryptin based n prtectin classes defined by develpers Prtectin class defines when encryptin keys are available - File prtectin NSFilePrtectin - KeyChain prtectin ksecattaccessible

The ios encryptin system NSFilePrtectin ksecattraccessible Nne Always N file prtectin Cmplete WhenUnlcked Keys available until device is lcked UntilFirstUserAuth AfterFirstUnlck Keys available until shutdwn CmpleteUnlessOpen --- Keys available as lng as files are pen Secure element and passcde required except fr Nne and Always Remark: KeyChain prtectin classes DeviceOnly versin: keys cannt be transferred t backups

The ios encryptin system Key derivatin File system encryptin system Attack by jailbreaking, key derivatin nt relevant Data Prtectin system PBKDF2 with input based n passwrd, UID key and salt 10.000 time SHA (90 msec per trial) - 6 character alphanumeric passcde 5,5 years t try all cmbinatins - 9 digit passcde 2,5 years t try all cmbinatins Brute frce attack is slwed dwn Brute frce attack cannt be perfrmed ffline

The ios encryptin system Key derivatin different security level fr backups PBKDF2 functin is used but n UID invlved Hence, ffline attacks are pssible Hw t attack backup n itunes device? Unencrypted backup cpy whle backup Encrypted backup brute frce attack (ffline)

The ios encryptin system Cnfiguratin/develper File system based encryptin system enabled by default Data prtectin system is activated if: 1. Device passcde is set 2. Develper has chsen crrect prtectin classes fr app files Rule 1: select high cmplexity class f passcde pwd length, screen lck, time-uts, Rule 2: cnfigure gd backup ptins Encrypted versus plain backups n itunes Activating/deactivating itunes/iclud backups Strength f passcde is imprtant!

The ios encryptin system Cnfiguratin/develper Develpers influences vital aspects f encryptin system security 1. Specifies prtectin classes fr files and KeyChain entries NSFilePrtectin ksecattraccessible Nne Always N file prtectin Cmplete WhenUnlcked Keys available until device is lcked UntilFirstUserAuth AfterFirstUnlck Keys available until shutdwn CmpleteUnlessOpen --- Keys available as lng as files are pen 2. Decides whether a file is included in itunes/iclud backup - Backup flags (kcfurlisexcludedfrmbackupkey)

Prtectin f keychain items defined by ios

ios passcde and lck cnfiguratin

Lessns learnt Decrypting files and credentials in the Andrid Platfrm Master secret is encrypted with key based n passcde Offline brute-frce attack t reveal passcde pssible N file system encryptin by default Decrypting files and credentials in the ios Platfrm Security based n passcde and secure element Offline brute-frce attacks are hard feasible develper and cnfiguratin ptins are crucial

Lessns learnt ios platfrm ffers a better level f prtectin KDF based n passcde & secure element High security level can be achieved if right decisins are taken Develper: prtectin classes + backup flags User/administratr: passcde cmplexity + backup ptins Prblem: user/administratr d nt knw if right develpment ptins are taken

Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device Management

2. App Distributin Andrid Marketplace Little applicatin vetting Pssible t install apps utside Ggle Play Apps are asking t much privileges Apple App Stre Strng identificatin f app develpers Static analysis f binaries Little app permissins shwn t users

3. App Islatin Sandbxing Each app runs with a distinct system identity N peratins allwed that wuld impact ther apps Each app is installed in its wn cntainer Malicius app is limited t that cntainer Permissins/entitlements Little cntrl n permissins Permissins are displayed t user at install time Sharing data thrugh external strage Larger cntrl n permissins Very little app permissins shwn t users N SD cards allwed

4. Mbile Device Management Mbile Device Management 1. Remte wiping 2. Plicy enfrcement Ggle Apps Device Plicy (full MDM) FindMyPhne (remte wipe + find lst device)

references 1. Peter Teufl, Thmas Zefferer, Christf Strmberger - "Mbile Device Encryptin Systems" - 28th IFIP TC-11 SEC 2013 Internatinal Infrmatin Security and Privacy Cnference 2. Andrid vs. Apple ios Security Shwdwn Tm Estn 3. ios Security, May 2012 4. Apple ios 4 Security Evaluatin Din A. Dai Zvi 5. Lst iphne? Lst Passwrds! Practical Cnsideratin f ios Device Encryptin Security Jens Heider, Matthias Bll 6. Ggle Andrid: A Cmprehensive Security Assessment - Shabtai, A., Fledel, Y., Kannv, U., Elvici, Y., Dlev, S., Glezer, C.