BYOD AND NEXT- GENERATION MOBILE SECURITY



Similar documents
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

How we keep harmful apps out of Google Play and keep your Android device safe

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

The Value of Physical Memory for Incident Response

Enterprise Mobility Management

CEH Version8 Course Outline

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

OWASP Mobile Top Ten 2014 Meet the New Addition

Guidance End User Devices Security Guidance: Apple ios 7

Defending Behind The Device Mobile Application Risks

Security Considerations in Cloud Deployments Matthew Garrett

PULSE SECURE FOR GOOGLE ANDROID

Mobile App Management:

Practical Attacks against Mobile Device Management Solutions

LBSEC.

Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Securing Office 365 with MobileIron

Guidance End User Devices Security Guidance: Apple OS X 10.9

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Spyware Analysis. Security Event - April 28, 2004 Page 1

BYOD Guidance: BlackBerry Secure Work Space

BYOD: End-to-End Security

Mobile Device Management

Improve your mobile application security with IBM Worklight

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

Protecting Android Mobile Devices from Known Threats

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

ipad in Business Security

Loophole+ with Ethical Hacking and Penetration Testing

Analysis of advanced issues in mobile security in android operating system

FileCloud Security FAQ

Hacking Database for Owning your Data

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

End User Devices Security Guidance: Apple OS X 10.10

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Securing Mobile App Data - Comparing Containers and App Wrappers

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Patterns for Secure Boot and Secure Storage in Computer Systems

Certified Ethical Hacker Exam Version Comparison. Version Comparison

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001

Deploying iphone and ipad Security Overview

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

[CEH]: Ethical Hacking and Countermeasures

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH

Getting Started - MDM Setup

Chris Boykin VP of Professional Services

FORBIDDEN - Ethical Hacking Workshop Duration

Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/

BYOD: BRING YOUR OWN DEVICE.

Application Intrusion Detection

BYPASSING THE ios GATEKEEPER

Cisco Trust Anchor Technologies

Jort Kollerie SonicWALL

Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Security Testing Guidelines for mobile Apps

Why you need. McAfee. Multi Acess PARTNER SERVICES

Advanced ANDROID & ios Hands-on Exploitation

FACING SECURITY CHALLENGES

CRYPTUS DIPLOMA IN IT SECURITY

Mobile Device Management:

Analyzing the Security Schemes of Various Cloud Storage Services

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Tom Schauer TrustCC cell

Prerequisites Guide for ios

Description: Objective: Attending students will learn:

Enterprise Apps: Bypassing the Gatekeeper

Mobile Application Security and Penetration Testing Syllabus

Secure your ios applications and uncover hidden vulnerabilities by conducting penetration tests

company policies are adhered to and all parties (traders,

SSL implementieren aber sicher!

iphone in Business Security Overview

Delivering corporate data securely. Delivering corporate data securely on employee ipads. A technical how-to guide.

Mobile Application Security

Transcription:

BYOD AND NEXT- GENERATION MOBILE SECURITY Joseph Gan V-Key Inc Session ID: MBS-W02 Session Classification: General Interest

Next-Generation Computing Mobile enterprise apps Mobile payments Mobile authentication Mobile banking

Mobile: Secure?

Mobile OS: Different?

Motivations for Mobile Attacks

Mobile Spywares + more!

SSL: Encrypted?

Problematic Data Security Have we solved mobile data security? Passcode locks ios: Keychain Full Disk Encryption App-specific encryption Ummm no. OS has access to all encrypted data Apps have access to their own data of course! and therefore, so do the trojans and spyware. We only have lost device data protection. Problem: apps and data moving to the mobile device.

State of Mobile Security Mobile OS Rootkits / Backdoors Mobile Apps Application Tampering Mobile Data Lack of Controls Large Attack Surface Insecure Processing Insecure Storage

Existing Best Practices Mobile application development Data-at-Rest Don t store data on the mobile device by yourself! If you do, at least use the encrypted storage and Keychain Data-in-Transit SSL certificate pinning to guard against MITM Risk Mitigation Consider blocking jailbroken / rooted devices, especially for inhouse apps Consider using second-factor authentication Not perfect solutions, but raise the bar for attackers

Existing Third-Party Solutions What users are supported? Public / Consumers Mobile Anti-Virus Sandboxed Apps Device Virtual. App Wrapping Enterprise / Employees How well does it work? Control over apps and data Blocking common threats Blocking advanced attacks How is the user experience? Little visible impact to user Supports any mobile device

App Wrapping: Pros and Cons Pros Arguably the best solution available Provides protection for any mobile application Various options available for source code Provides the best security control with the least user impact Cons Lack of support for public-facing applications Limited protected against even common threats Lack of protection against advanced threats

Background: V-Key s Approach Application virtual machine acts as reverse sandbox Protection layer guards against advanced threats Secure Mobile Applications Mobile Apps V-Guard Secure Mobile Application Middleware Protection Tamper Protection V-OS Secure Processing and Functions Tamper Detection Secure Mobile Middleware Secure Data and Keys Storage Tamper Response Secure Cryptographic Module Mobile OS

Advanced Threats Backdoors / Trojans Remote Access Rootkits Hacking of Apps RE / Modification Debuggers Code Injection API Hooking Spywares Spoofing

Backdoors / Trojans Threats Remote access trojans Rootkits Protections Running daemon detection e.g., checking the launchctl list of running daemons Checking root services and files e.g., check for root-privilege files, not just /bin/su Checking ports, system processes e.g., extracting ports and processes using sysctlnametomib()

Hacking of Apps Threats Reverse engineering / modification Debugger misuse / code injection Protections Anti-debugging mechanisms e.g., various ptrace calls and checks Application integrity checks e.g., checking hash of entire application package Runtime code injection detection e.g., hooking onto dyld_callback_add() Secure processing in virtual sandbox

API Hooking Threats Spywares (e.g., keyloggers) Device / location spoofing Protections Load-time library detection e.g., looking for ikg.dylib Function call integrity checks e.g., verifying [UIKeyboardImpl callshouldinserttext:] Check for misused permissions (Android) e.g., heuristics could include android.permission.receive_sms

Conclusion Mobile threats to your apps and data are very real Existing mobile best practices help to some extent Limited options to counter advanced mobile threats Security is tough approach your vendors for help! Also, check out our 2 nd talk tomorrow on Developing an Enterprise Mobile Security Strategy Come to our booth (G1) to find out more

Questions?