OWASP Mobile Top Ten 2014 Meet the New Addition



Similar documents
Table of Contents 7 8

Consolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality

PCI Security Standards Council

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Where every interaction matters.

Passing PCI Compliance How to Address the Application Security Mandates

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Elevation of Mobile Security Risks in the Enterprise Threat Landscape

The Top Web Application Attacks: Are you vulnerable?

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

5th Annual State of Application Security Report Perception vs. Reality

Testing the OWASP Top 10 Security Issues

Mobile & Security? Brice Mees Security Services Operations Manager

Mobile Application Security Study

Enterprise Application Security Workshop Series

90% of data breaches are caused by software vulnerabilities.

4th Annual State of Application Security Report

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

elearning for Secure Application Development

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Strategic Information Security. Attacking and Defending Web Services

Rational AppScan & Ounce Products

How To Protect A Web Application From Attack From A Trusted Environment

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Digital Enterprise Unit. White Paper. Securing Patient Information HIPAA and Mobile Healthcare Applications

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Mobile Application Security Sharing Session May 2013

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

A Developer s Guide to Securing Mobile Applications

The monsters under the bed are real World Tour

BYOD: End-to-End Security

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Mobile Application Security Report 2015

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

05.0 Application Development

SAST, DAST and Vulnerability Assessments, = 4

BYOD AND NEXT- GENERATION MOBILE SECURITY

Reducing Application Vulnerabilities by Security Engineering

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Overview of the Penetration Test Implementation and Service. Peter Kanters

An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai

Application Intrusion Detection

The State of Mobile Application Insecurity

Web Engineering Web Application Security Issues

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Common Criteria Web Application Security Scoring CCWAPSS

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

SECURING MOBILE APPLICATIONS

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Hardware Security Modules for Protecting Embedded Systems

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Security Implications Associated with Mass Notification Systems

Information Security Services

Database security issues PETRA BILIĆ ALEXANDER SPARBER

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright Security Compass. 1

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Network Test Labs (NTL) Software Testing Services for igaming

Table of Contents. Page 2/13

Web Application Security

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Security Testing Guidelines for mobile Apps

OWASP Top Ten Tools and Tactics

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Making your web application. White paper - August secure

Secure Web Applications. The front line defense

Thick Client Application Security

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

MovieLabs Specification for Enhanced Content Protection Version 1.0

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

SECURITY CONSIDERATIONS FOR LAW FIRMS

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

What is Web Security? Motivation

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

THE HACKERS NEXT TARGET

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Developing Secure Software in the Age of Advanced Persistent Threats

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

External Supplier Control Requirements

Advanced ANDROID & ios Hands-on Exploitation

Application Security 101. A primer on Application Security best practices

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Secure your ios applications and uncover hidden vulnerabilities by conducting penetration tests

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Pentesting iphone Applications. Satishb3

Certified Ethical Hacker Exam Version Comparison. Version Comparison

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Running Secure Server Software on Insecure Hardware without a Parachute

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

Juniper Networks Secure

WEB APPLICATION SECURITY

Transcription:

OWASP Mobile Top Ten 2014 Meet the New Addition

Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further Guidance 2"

What s Lack of Binary Protections All About? OWASP MOBILE TOP 2014 3"

OWASP Mobile Top Ten 2014 Unveiled at AppSec California 2014 January 2014; Categories based on data collected by a number of different security vendors, consultancies; New Category Introduced: Lack of Binary Protections 4"

Mobile Top Ten 2013 -> 2014 Category 2013 2014 M1 Insecure Data Storage 2013 M2 + 2013 M10 M2 Weak Server Side Controls 2013 M1 M3 Insufficient Transport Layer Protection 2013 M3 M4 Client Side Injection 2013 M8 + 2013 M10 M5 Poor Authorization and Authentication 2013 M5 M6 Improper Session Handling 2013 M9 M7 Security Decisions via Untrusted Input 2013 M4 M8 Side Channel Data Leakage 2013 M7 M9 Broken Cryptography 2013 M6 M10 Sensitive Information Disclosure Lack of Binary Protections 5"

What is Lack of Binary Protections All About? 1. Software in untrusted environments is exposed to reverse-engineering, analysis, modification, and exploitation by attackers 2. Attackers can directly access the binary and compromise its integrity with various tools and techniques 3. Attackers may cause brand, revenue, or IP loss through reverse-engineering 6"

What Do Binary Attacks Result In? Compromise (disable, circumvent) of security controls, e.g., authentication, encryption, license management / checking, DRM, root / jailbreak detection Exposure of sensitive application information, e.g., keys, certificates, credentials, metadata Tampering with critical business logic, control flows, and program operations 7"

What Do Binary Attacks Result In? Insertion of malware or exploits in the application and repackaging Exposure of application internals (logic, vulnerabilities) via reverse-engineering IP theft (e.g., proprietary algorithms) via reverse-engineering Piracy and unauthorized distribution 8"

How Prevalent Are Binary Attacks? HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack, 18 November 2013: 86 percent of applications tested lacked binary hardening, leaving applications vulnerable to information disclosure, buffer overflows and poor performance. Arxan Research - State of Security in the App Economy, Volume 2, November 2013: Adversaries have hacked 78 percent of the top 100 paid Android and ios apps in 2013. 9"

2013 Arxan Study Analyzed Top 100 Apps for Android / iphone for serious flaws Binary / HTML Modification extremely common 10"

Goals of Binary Attacks What were the hackers interested in doing with these cracked apps? Security Control Bypass Adware / Spyware Code Injection Repackaging (IP Theft) Stealing Information About Users 11"

2012 Arxan Study Android Banking Vulnerabilities 100%" 90%" 80%" 70%" 60%" 50%" 40%" 30%" 20%" 10%" 0%" Not"vulnerable" Vulnerable" 12"

Technical Risks and Solutions WHAT RISKS NEED TO BE MITIGATED? 13"

Android / iphone Technical Risks <Business"Risk>" <OperaEonal"Risk>" <Technical"Risk>" <ConfidenEality"Risk>" <Integrity"Risk>" <Reverse"Engineering"and" Code"Analysis"Risk>" <Code"ModificaEon"/"InjecEon"Risk>" 14"

Reverse Engineering Risks Reverse Engineering Risks Exposed Method Signatures API Monitoring Exposed Data Symbols Exposed String Tables Algorithm Decompilation and Analysis Application Decryption 15"

Cryptographic Key Theft Flag hardcoded keys that could be easily found by an attacker through static or dynamic analysis. 16"

AntiDebugger Checks Common app entrypoints should check for the unauthorized presence of a debugger. 17"

Code Modification Risks Code Modification Technical Risks Repackaging Method Swizzle With Behavioral Change Security Control Bypass Automated Jailbreak / Root Detection Disable Presentation Layer Modification Cryptographic Key Replacement 18"

Swizzling w/behavioral Change This method will likely be swizzled and modified by an attacker // Transaction-request delegate - (IBAction)performTransaction:(id)sender { if([self loginuserwithusername:username incomingpassword:password]!= true) { UIAlertView *alert = [[UIAlertView alloc] initwithtitle:@"invalid User" message:@"authentication Failure" delegate:self cancelbuttontitle:@"ok" otherbuttontitles:nil]; } [alert show]; return; } // Perform sensitive operation here 19"

Automated Jailbreak Bypass NOTE: Methods that appear to return a simple yes/no response and appear to be doing something sensitive are excellent candidates for simple code modification. 20"

Useful OWASP Projects FURTHER GUIDANCE 21"

Practical Solutions 1. Implement Adequate Algorithms for Jailbreak / Root Detection (see xcon); Checksum Controls; Certificate Pinning Controls; and Debugger Detection Controls 2. Protect these algorithms from: Reverse Engineering Unauthorized Code Modifiation 22"

Practical Solutions Your mobile app must be able to: 1. Prevent an adversary from reverse engineering sensitive parts of your app; 2. Detect at runtime that code modification has occurred; 3. React appropriately at runtime to integrity violations 23"

Practical Solutions: Follow a Defense in Depth Approach 24"

Conclusions Binary attacks are extremely common and are much riskier than you think OWSAP Mobile Top Ten 2014 Category Lack of Binary Protections is new and directly addresses this new threat To mitigate this threat, your app must strive to prevent reverse engineering and code modifications by an adversary 25"

Useful OWASP Projects Check out OWASP Mobile Top Ten 2014 Project M10 For More Information https://www.owasp.org/index.php/mobile_top_10_2014-m10 For more specific guidance and recommendations: Reverse Engineering and Code Modification Prevention OWASP Project https://www.owasp.org/index.php/owasp_reverse_engineering_and_code_modification_prevention_project 26"

For more info on Arxan Technologies: http://www.arxan.com THANK YOU! 27"