Mobilitics Inria-CNIL project: privacy and smartphones



Similar documents
Smartphone Security Overview

Enterprise Apps: Bypassing the Gatekeeper

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Penetration Testing for iphone Applications Part 1

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

Pentesting ios Apps Runtime Analysis and Manipulation. Andreas Kurtz

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

ios Testing Tools David Lindner Director of Mobile and IoT Security

Enterprise Mobility Management

BYPASSING THE ios GATEKEEPER

WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER

Privacy Policy Version 1.0, 1 st of May 2016

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Novell Filr 1.0.x Mobile App Quick Start

Mobile Device Management

Mobile Application Security Testing ASSESSMENT & CODE REVIEW

Android Architecture. Alexandra Harrison & Jake Saxton

Pentesting iphone Applications. Satishb3

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

User Manual for Version Mobile Device Management (MDM) User Manual

Managing and Securing the Mobile Device Invasion IBM Corporation

Mobile Application Security and Penetration Testing Syllabus

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Defending Behind The Device Mobile Application Risks

AppPulse Mobile. Whitepaper: Overhead, Privacy, and Security. March 2016

BYOD Guidance: BlackBerry Secure Work Space

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Norton Mobile Privacy Notice

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

Android v ios Mobile Operating Systems

01. Introduction of Android

Mobile Driver s License Solution

Example of Standard API

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

Mobile Phone & Website Tracking Platform Operation Guide

Everything is Terrible

Kaspersky Security for Mobile Administrator's Guide

When Security Gets in the Way. PenTesting Mobile Apps That Use Certificate Pinning

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

ADF Mobile Overview and Frequently Asked Questions

How-To Guide SAP NetWeaver Document Version: How To Guide - Configure SSL in ABAP System

Enterprise Application Security Workshop Series

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Android vs. Apple ios Security Showdown Tom Eston

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Mobile Application GPS-Based

Tutorial on Smartphone Security

Threat Model for Mobile Applications Security & Privacy

Mobile Application Security

Android Programming and Security

DEF CON 19: Getting SSLizzard. Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

BYOD in the Enterprise

DOCUMENT REFERENCE: SQ EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014

THEODORA TITONIS VERACODE Vice President Mobile

Affiliate Marketing for Mobile Apps. Peter Hamilton Partner / CMO peter@hasoffers.com #AMDays

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Pentesting Mobile Applications

Mobile App Testing Process INFLECTICA TECHNOLOGIES (P) LTD

Cloud Computing for Education Workshop

When enterprise mobility strategies are discussed, security is usually one of the first topics

ios SDK possibilities & limitations

Absolute Manage MDM. John Wu Systems Engineer

Mobile Phones Operating Systems

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

Guidance End User Devices Security Guidance: Apple ios 7

The increasing popularity of mobile devices is rapidly changing how and where we

999GPS.net Tracking Platform Operation Guide

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Adobe Marketing Cloud Bloodhound for Mac 3.0

BRING YOUR OWN DEVICE

SSL Inspection Step-by-Step Guide. June 6, 2016

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

AXON Mobile for ios Devices User Manual

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

Native mobile apps: The wrong choice for business?

Analysis of Native and Cross-Platform Methods for Mobile Application Development. [ Whitepaper] Praveen Kumar S

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Workday Mobile Security FAQ

Mobile Devices Using Without Losing

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Building cross-platform Modern Apps: the Design perspective. Amit Bahree, Senior Director,

Pentesting iphone & ipad Apps Hack In Paris 2011 June 17

AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview

Transcription:

Mobilitics Inria-CNIL project: privacy and smartphones Privatics team (Jagdish Achara, Claude Castelluccia, James Lefruit, Vincent Roca) Inria Rhone-Alpes CAPPRIS Reunion, Lyon Sept 10 th, 2013

Outline l Motivations l Private Data Leak Detection methodology and results l Conclusions Inria / Photo H. Raguet 2

Motivations (1) : The revolutionary arrival of AppStore model of App distribution l A large number of actors present on the device No more the presence of merely smartphone provider Both first (App server itself) & third-party (trackers, A&A etc.) Both first&third-party(very dangerous) Flurry first-party(policy&pi) third-party(dangerous) 3

Motivations (2) : The arrival of App stores l More opportunities for personal information leakage to various parties Not only limited to web browsers as is the case in desktops/laptops Apps for dedicated services (FB, LeMonde, SNCF etc.) 4

Motivations (2) l Difficult to trust all these parties various scandals in the past For example, Twitter and Path uploading users all contacts to their servers [1] [2] WSJ: What they know Mobile [3] [1] http://mclov.in/2012/02/08/path-uploads-your-entire-address-book-to-their-servers.html [2] http://www.theregister.co.uk/2012/02/15/twitter_stores_address_books/ [3] http://blogs.wsj.com/wtk-mobile/ 5

Motivations (3) l Smartphones are well suited to marketers/trackers contain a lot of info on user interests and behaviors much more than on desktop/laptop because various sensors (GPS, Camera etc) and comm technologies (WiFi, GSM etc.) generate PI because smartphones are at the center of our cyber activities, and very personal (it s not shared usually) because smartphones have almost all-time Internet connectivity Because they re barely turned off à leads to accurate and detailed user profiling 6

Motivations(4) l A direct consequence is a large presence of online advertisers/trackers Flurry and many others à à à This requires scrutinizing smartphones for privacy risks tracking the trackers 7

Mobilitics project and its goals l started in January 2012 " " " " " " l focuses on Android and ios the leading mobile OS " " " " l Goal: investigate smartphone Apps and OS for potential privacy risks 8

Outline l Motivations l Private Data Leak Detection methodology and results l Conclusions Inria / Photo H. Raguet 9

General approach (ios & Android) 1. Run Apps on instrumented versions of Android and ios 2. Collect data in a local sqlite database 3. Analyze the data offline for potential private data leakage 10

ios (1) : Some background l Closed source and only code signed from Apple can be executed enforced by secure boot chain l Instrumenting ios requires Jailbreaking essentially a way to bypass Apple s secure boot chain l Also, no App source available à only binary rewriting is possible 11

ios (2) : Some Background l ios Apps are written in Objective-C, C, C++ l Private data can only be accessed by Apple defined frameworks written in Objective-C/C/C++ l Enforcement of user privacy by ios 1. Apple vetting process when Apps are submitted to AppStore 2. Users are asked before ios gives access to PI to an App 12

ios (3) : General Idea l Idea: change the implementation of the APIs responsible for private data access in order to: detect the App accessing the private data collect the data so that it can be searched later if it s transmitted to the network Apps (to be analyzed) dylib (tweak) accesses intercepts ios Frameworks stores Sqlite database 13

ios (4) : But how to do it? l As source code is not available, binary patching? It s a nightmare, I think! l Dynamically, at runtime? Fortunately, yes! Use Objective-C runtime method method_setimplementation Replace the C/C++ functions at assembly level. *NB: we use a third-party framework (MobileSubstrate) which makes it lot simpler http://iphonedevwiki.net/index.php/mobilesubstrate 14

ios (5) : But how to do it? l Whole code (modified implementation of the methods) is compiled in a dylib and loaded at launch time in a process of interest 15

ios (6) : But how to do it? l We capture relevant info (method args, return values) and store it in a local sqlite DB l In order to confirm privacy leaks We also need to dump whole network data follows the same technique (method/function interception) done at BSD Socket level to ensure no App can bypass it 16

ios (7) : Post Analysis of data collected 1. Identify private data accessed by Apps 2. Search for private data in the network traffic to see if it s sent, and where 3. Search for private data in the input to cryptographic / hash functions, and if there s some, search the output in the network traffic 4. Find out if Apps use cross-app tracking techniques by using the UIPasteBoard class 17

ios (8) : Limitations l Are private data manipulations (hash, encryption etc.) done with custom functions rather than using standard ios API? if yes, we cannot detect it as we don t know what to search in the network traffic L For example, a simple XOR with a static key is sufficient à a fundamental limitation of our approach hard to evaluate if this is current practice or not But this means results obtained using our technique would be lower-bound 18

ios (9) : Tests and results l We chose 78 representative free ios Apps Goal is to be representative of the main App categories Same set of Apps would be tested on Android (chosen Apps are available on both platoforms): to have a behavioral comparision 19

ios (10) : Trackers disguise device tracking l 59% Apps bypass the official ios6 AdvertisingID should not be the case the AdID is supposed to let the end-user control tracking by resetting it as desired it s just an illusion L l 37% Apps will still bypass the AdID with future ios7 that bans the access to MAC address this % will increase as more companies will shift to other types of permanent identifiers for tracking 20

Android (1) : Overview of methodology l We benefit from the open-source nature of Android for instrumentation Change the Android source code itself l Same technics as with ios: Add all events captured in a local sqlite database Dump the network data at BSD Socket level Dump the encryption/hash data Perform post-analysis l Still in progress 21

Outline l Motivations l Private Data Leak Detection methodology and results l Conclusions Inria / Photo H. Raguet 22

Conclusions and remarks l Trackers disguise device tracking 59% Apps are employing techniques they are not supposed to, in order to track users makes ios6 AdvertisingID almost useless little progress in future ios7 Apple can t ignore this trend l Private data is sent to various parties As shown in the Table before l Live experiment to be conducted at CNIL with various users 23

Improvements to make (version 2) l We still need to distinguish between first and third-party (would require manual interception to some extent?) l Increase the number of Apps being tested (with paid Apps too this time to verify if some difference exist wrt. privacy) l Some known glitches to be fixed (access to serial number, bluetooth MAC Address etc.) 24

Last but not least: Don t believe naively what you read l The RATP App, v5.4.1 We don t collect any personal information l Really? list of active Apps, MAC address, device name, position (20m accuracy), permanent ID sent to Adgoji (SSL) or Sofialis (cleartext) l See our blog: : part-1 et part-2 25

Questions/Remarks? Thanks 26