Symbian phone Security



Similar documents
Symbian Operating System

Mobile Operating Systems Lesson 07 Symbian OS

Analysis of advanced issues in mobile security in android operating system

Important Notice Baracoda products works with all Bluetooth devices accepting both SPP connection and sniff mode.

Python for Series 60 Platform

SIM900_Custom Application Building Tutorial_Application Note_V1.00

This guide will help you with setting up an Apple Macintosh for a GPRS connection to O 2 Mobile Web

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

<t base Trusted Application Development

Lecture 25 Symbian OS

Workshop on Android and Applications Development

Symbian C++ Application Programming Overview

GIVE WINGS TO YOUR IDEAS TOOLS MANUAL

Getting started with ARM-Linux

Eddy Integrated Development Environment, LemonIDE for Embedded Software System Development

Sierraware Overview. Simply Secure

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance

Spyware Analysis. Security Event - April 28, 2004 Page 1

Inserting the SIM card in the MobiGater device. Connecting the MobiGater Device

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

An Embedded Wireless Mini-Server with Database Support

ios Testing Tools David Lindner Director of Mobile and IoT Security

A Perspective on the Evolution of Mobile Platform Security Architectures

Android Programming and Security

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

M-Shield mobile security technology

M85 OpenCPU Solution Presentation

Example of Standard API

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Windows Phone 8 Security deep dive

2 Selecting Operating System - Symbian OS

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Overview. Open source toolchains. Buildroot features. Development process

rich mobile applications made easy

Smart Card APDU Analysis

Silk Test Testing Mobile Web Applications

Embedded Software development Process and Tools: Lesson-4 Linking and Locating Software

Mobile Platform Security Architectures A perspective on their evolution

VoIP support on Qtopia. Vladimir Minenko, Ph.D.

Embedded Linux Platform Developer

Programación de Sistemas Empotrados y Móviles (PSEM)

Computer and Set of Robots

An Introduction to Android

Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF

ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

file://d:\webs\touch-base.com\htdocs\documentation\androidplatformnotes52.htm

Pentesting Android Mobile Application

Thingsquare Technology

Mobile Development Discovery Document

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

An Introduction to CODE SIGNING

Embedded Linux development training 4 days session

Integrating Mobile into Your Cross- Platform Strategy with Qt

Criteria for web application security check. Version

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

OF 1.3 Testing and Challenges

Operating System Today s Operating Systems File Basics File Management Application Software

ANDROID AND SYMBIAN OPERATING SYSTEM

Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited

Introduction to ARM. Bobby Clarke, ARM Eclipse Members Meeting Sept 06

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

ESX 4 Patch Management Guide ESX 4.0

SecureDoc Disk Encryption Cryptographic Engine

Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22.

ONE Mail Direct for Mobile Devices

Track One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink

CSE 265: System and Network Administration

UForge 3.4 Release Notes

Advanced ANDROID & ios Hands-on Exploitation

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

MOBILE APPLICATION DEVELOPMENT

Android Virtualization from Sierraware. Simply Secure

Potential Threats to WAP Enabled Devices

The R380s The first smartphone from the Ericsson Symbian partnership

Dynamic Honeypot Construction

Hi and welcome to the Microsoft Virtual Academy and

Tutorial on Smartphone Security

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Mobile Testing in a Fast Paced World

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Getting Started Guide with WIZ550web

Network Based Intrusion Detection Using Honey pot Deception

Application Note: AN00141 xcore-xa - Application Development

End User Devices Security Guidance: Apple OS X 10.10

Getting Started with Tizen SDK : How to develop a Web app. Hong Gyungpyo 洪 競 杓 Samsung Electronics Co., Ltd

Embedded Linux development with Buildroot training 3-day session

NVIDIA CUDA GETTING STARTED GUIDE FOR MAC OS X

Transcription:

ITSX

Overview Symbian OS. Risks and Features. Taking it apart. Conclusions.

Symbian History Psion owner of EPOC OS, originally from 1989, released EPOC32 in 1996 EPOC32 was designed with OO in C++ 1998: Symbian Ltd. formed by Ericsson, Nokia, Motorola and Psion. EPOC renamed to Symbian OS Currently ~30 phones with Symbian and 15 licensees.

Symbian Organization Symbian licenses the main OS Two GUI s on top of Symbian: Series 60, led by Nokia UIQ, subsidiary of Symbian Ownership: Nokia 47.5% Panasonic 10.5% Ericsson 15.6% Siemens 8.4% SonyEricsson 13.1% Samsung 4.5%

Symbian Versions EPOC32 EPOC R5 Symbian v6.0 Symbian v7.0 Symbian v8.0 Symbian v9.0 announced for Q3 05

Series60 versions 1 st edition 2 nd edition 3 rd edition, announced feb. 2005

UIQ versions UIQ 1.0 UIQ 2.1 UIQ 3.0 released feb 2005

Symbian OS

Symbian OS Multitasking, preemptive kernel. MMU protection of kernel and process spaces. Strong Client Server architecture Plug-in patterns Filesystem in ROM, Flash, RAM and on SD-card

Symbian development Symbian v6 and v7 are compiled with a modified GCC. The base environment consists of a set of Perl scripts and command line tools. IDE s interface to that: Metrowerks CodeWarrior MS Visual Studio Borland C++ Builder

Symbian development Emulator on x86 runs a majority of the native code base. Compiled to x86 (so not running ARM) Emulator is one windows process.

Symbian development Limited support for on-target debugging It does not work on all devices. Uses a gdb stub. Metrowerks provides MetroTRK. Future: v9 will move to ARM Real View (RVCT) and the EABI standard.

Mobile phone risks Toll fraud: Auto dialers. High cost SMS/MMS. Phone Proxy. Loss or theft: Data loss. Data compromise. Loss of Identity (caller ID)

Mobile phone risks Availability: SPAM. Destruction of the device (flash) Destruction of data. Risks induced by usage: Mobile banking. Confidential e-mail, documents. Device present at confidential meetings: snooping

Attack vectors Too many entry points to list: Executables Bluetooth GPRS / GSM OTA IrDa Browser SMS / MMS SD card WAP E-mail

features Crypto: Algorithms Certificate framework Protocols: HTTPS, WTLS, Symbian signed: Public key signatures on applications Root CA s in ROM

Symbian security features Separation Kernel vs. user space; process space Secured wallet storage Access controls SIM PIN, device security code Bluetooth pairing

Symbian security features Artificial Limitations / patches Preventing loading device drivers in the kernel (Nokia). Disallowing overriding of ROM based plug-ins.

Risks covered / mitigated Fraud: hardly, user should not accept unsigned apps. Loss/theft: In practice, none. Availability: hardly, any application can render phone unusable (skulls trojan).

What goes wrong? So-far all of known attacks have needed user confirmation. Often more than once. People loose a hell of a lot devices. Not that much so-far actually.

Viruses and Trojans Skulls Trojan: theme that replaces all icons and can not be de-installed. Caribe: Installs itself as a Recognizer to get activated at boot time and starts broadcasting itself over Bluetooth.

Problems in Symbian No concept of roles or users. No access controls in the file system. No user confirmation needed for access by applications. User view on device is limited: partial filesystem, selected processes. Majority of interesting applications is unsigned.

Symbian security features Future: v9: Data caging : per application file system access Capabilities tied to signing: Limited access to sound. Only signed apps get access to keys. OMA DRM v2.0 Suspect: tying to ARM TrustZone: hardware assisted code protection.

Risk improvements Limits the damage an application can do. Improvements for data access and integrity. Will also limit what you (as a developer) can access on the phone without going through certification.

Still things go wrong February 23, 2005 a notice appeared on the Nokia site:

Their work around

Unraveling a ROM Obtaining ROMs: Vendor upgrades Reading them from the device Understanding the ROM structure: Base porting guide (7.0 help file) Header files

Extracting the ROM Creating a Device driver on a P900 Read the MMU Page tables. Copy physical memory out to memory card

Unpacking a ROM Small toolkit with Python scripts Extracts files from a ROM Creates a browse-able interface with details and relation between files.

Demo

Examining binaries (OS) Use the emulator versions with debug info. Translate names to ordinals with Libs. Import them in IDA Load the full ROM at once or use a DB to name direct references to other files.

Conclusions Currently Symbian is not prepared for serious attacks. Embeddedness and OO implementation raised the bar for attacks. Relatively few tools available for dissecting Symbian ROMs and applications. V9 promises much needed improvements