SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH



Similar documents
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Ensuring the security of your mobile business intelligence

Testing & Assuring Mobile End User Experience Before Production. Neotys

LBSEC.

Weak Spots in Enterprise Mobility Management Dennis Schröder

Data Storage Security in Cloud Computing

Mobile Connect & FIDO

Improve your mobile application security with IBM Worklight

Introduction to Cyber Security / Information Security

Is Your SSL Website and Mobile App Really Secure?

ECE 646, CRYPTOGRAPHY PROJECT SPECIFICATION GEORGE MASON UNIVERSITY FALL, 2013

Chap. 1: Introduction

elearning for Secure Application Development

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

A Framework for Secure and Verifiable Logging in Public Communication Networks

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

SECURING MOBILE APPLICATIONS

Preparing for GO!Enterprise MDM On-Demand Service

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

WHITE PAPER Usher Mobile Identity Platform

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Ensuring the security of your mobile business intelligence

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Using Entrust certificates with VPN

Cryptography and Network Security

PCI Security Standards Council

Network Test Labs (NTL) Software Testing Services for igaming

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

Case Study for Layer 3 Authentication and Encryption

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime

Penetration Testing for iphone Applications Part 1

BYOD AND NEXT- GENERATION MOBILE SECURITY

Mobility Challenges & Trends The Financial Services Point Of View

OWASP Mobile Top Ten 2014 Meet the New Addition

Server Installation ZENworks Mobile Management 2.7.x August 2013

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Steelcape Product Overview and Functional Description

If you can't beat them - secure them

Systems Manager Cloud Based Mobile Device Management

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Application Development Best Practices

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

05.0 Application Development

Server Software Installation Guide

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

SENSE Security overview 2014

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Introduction to Mobile Access Gateway Installation

Securing Office 365 with MobileIron

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Dirty use of USSD codes in cellular networks

The Security Behind Sticky Password

Goals. Understanding security testing

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

544 Computer and Network Security

Keeping SCADA Networks Open and Secure DNP3 Security

TLS/SSL in distributed systems. Eugen Babinciuc

DIVISION OF INFORMATION SECURITY (DIS)

IQProtector Mobile Application

SpiderCloud E-RAN Security Overview

Sync Security and Privacy Brief

BLOOMBERG ANYWHERE FOR MOBILE CUSTOMERS

Apache Milagro (incubating) An Introduction ApacheCon North America

Load Testing Essentials

Lync SHIELD Product Suite

Configuration Guide BES12. Version 12.3

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Secure Your Enterprise with Usher Mobile Identity

Defending Behind The Device Mobile Application Risks

Transcription:

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH Suhas Desai Aujas Information Risk Services Session ID: MBS-T02 Session Classification: Intermediate

Agenda Trends in Mobile Technology Mobile App SDLC Challenges Security Risks in mobile applications Secure SDLC Approach

Trends in Mobile Technology

Trends in Mobile Technology By 2014, over 3 billion adults will be able to transact electronically By 2013, mobile phones will overtake PCs (Source : Gartner) Fig : Mobile in Marketing Industry, Forecast : 2009-2014 Fig: Mobile App Download Market, Forecast : 2009-2015

Mobile Apps are everywhere!

Mobile App SDLC Challenges over traditional application SDLC

Mobile App SDLC Challenges Support for various displays and screen sizes Effective usage of local device database & memory Releasing secure (signed) application executables Rich user interfaces with push notifications (Wherever applicable) Effective usage of communication channels SMS / USSD (Unstructured Supplementary Service Data) / IP and web services

Security Risks in Mobile Applications

Stats : Mobile threats "The Smartphone OS will become a major security target," said Android Security Leader Rich Cannings, speaking at the Usenix Security Symposium.

Risks in Mobile Applications Fraudulent Transactions through message tampering Weak Cryptography Mobile Application Server Issues Reverse Engineering Threats Communication Channel Attacks SMS / USSD Web Services Attacks Device lost/theft case scenarios

Mobile Application Architecture 1. Install XYZ Telecom s Money Application (J2ME Application) Request/Response processing towards Bank s Interfaces / Payment Gateways 2. Payment Service Providers Mobile Validation Layer Transaction Requests Request/Response Validation Request/Response Authentication 5. Txn Respo nse Request Message Processin g 3. Bank Interfaces/Payment Gateways Protocol Errors/Co mmunicat ion Errors Success Response Message Failure Response Message Request Message Validati on User Authenticatio n and Validation

Attack vector Reverse engineering of mobile application Transactions Request/Response Attacks Message Replay Attack Fraudulent Transactions through Data storage Verify strong Cryptographic Implementation Improper Session Management Authentication Attacks Web Services Attacks

PoC SMS Req/Res Attacks Figure 1. Application SMS Req / Res Attack

PoC Message Replay Attacks Figure 1. Proxy Settings Figure 2. Intercepted Message Figure 3. Message Replay Attack

PoC Local data modification Figure 1. Original application Figure 2. Local database modification Figure 4. Modified application Figure 3. Local database modified

PoC USSD Gateway Attack Figure 1. USSD Gateway Emulator

PoC: ios App R/R capture Figure 1. Request/Response Capture

PoC: ios App R/R Tampering Figure 1. Entering Credentials Figure 2. Intercepted Message

Secure SDLC Approach

Secure SDLC Approach Requirements Design Development Release Sustenance Software risk profile Security requirement definition Security investment analysis Threat modeling Security arch design Security controls Developer training Secure coding best practices Secure code libraries Pair programmin g / peer reviews Functional, architecture, code & deployment testing Security controls validation Remediation Security metrics analysis Change management Incident & consequence management

Secure SDLC Best Practices Secure data transmission Secure data storage Ensure to implement proper session management Validate all trusted and un-trusted inputs Ensure to implement strong authentication mechanism

Contd.. Ensure to implement response and request messages encryption Ensure to implement proper message authentication mechanism to validate requests/responses are generated through authenticated users Ensure to implement and use Secure SMS/USSD/IP communication channels Secure Interface between payment gateways and mobile payment application

Thank You! www.aujas.com